Distributed Identity Based Private Key Generation for Scada Systems
Loading...
Date
2013
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Springer
Open Access Color
Green Open Access
No
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
The security of the ICT (Information Communications Technology) components of industrial systems is gaining great importance in the context of their criticality for society at large. There is an urgent need for the consideration of security in their design, and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to such threats is mainly due to the intrinsic weakness of the communication protocols used to control the process network. The peculiarities of the industrial protocols (low computational power, large geographical distribution, near to real-time constraints) make hard the effective use of traditional cryptographic schemes and in particular the implementation of a effective key management infrastructure supporting a cryptographic layer. In this paper we present the first working prototype of a distributed key generation infrastructure for SCADA systems based on the well known identity based crypto-paradigm. © 2013 Springer-Verlag.
Description
Keywords
Distributed private key generation, Identity based cryptography, Key management, SCADA protocols, SCADA security
Fields of Science
Citation
WoS Q
N/A
Scopus Q
Q3

OpenCitations Citation Count
N/A
Source
Lecture Notes in Computer Science
Volume
7722 LNCS
Issue
Start Page
118
End Page
129
PlumX Metrics
Citations
Scopus : 1
Captures
Mendeley Readers : 5
SCOPUS™ Citations
1
checked on Apr 27, 2026
Page Views
465
checked on Apr 27, 2026
Google Scholar™



