Abstract

There is an increasing concern among both government officials and control systems experts about potential cyber threats to the control systems that govern critical infrastructures. The industrial control and SCADA systems that are responsible for monitoring and controlling our critical infrastructures and manufacturing processes historically have operated in isolated environments. These control systems and devices communicated with each other almost exclusively, and rarely shared information with systems outside their environment. As more components of control systems become interconnected with the outside world using IP-based standards, the probability and impact of a cyber attack will heighten. With the posted threats and listed vulnerabilities, a retrofit for these threats through the crossed cipher scheme is the main contribution of this study. To get the best of both types of cipher (symmetric and asymmetric) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call