Abstract
The industrial control and SCADA systems that are responsible for monitoring and controlling our critical infrastructures and manufacturing processes historically have operated in isolated environments. These control systems and devices communicated with each other almost exclusively, and rarely shared information with systems outside their environment. As more components of control systems become interconnected with the outside world using IP-based standards, the probability and impact of a cyber attack will heighten. There is an increasing concern among both government officials and control systems experts about potential cyber threats to the control systems that govern critical infrastructures. With the posted threats and listed vulnerabilities, a retrofit for these threats through the crossed cipher scheme is the main contribution of this study. To get the best of both types of cipher (symmetric and asymmetric) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.