Distributed Identity Based Private Key Generation for Scada Systems
| dc.contributor.author | Kılınç, Görkem | |
| dc.contributor.author | Nai Fovino, Igor | |
| dc.coverage.doi | 10.1007/978-3-642-41485-5_11 | |
| dc.date.accessioned | 2021-01-24T18:28:55Z | |
| dc.date.available | 2021-01-24T18:28:55Z | |
| dc.date.issued | 2013 | |
| dc.description.abstract | The security of the ICT (Information Communications Technology) components of industrial systems is gaining great importance in the context of their criticality for society at large. There is an urgent need for the consideration of security in their design, and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to such threats is mainly due to the intrinsic weakness of the communication protocols used to control the process network. The peculiarities of the industrial protocols (low computational power, large geographical distribution, near to real-time constraints) make hard the effective use of traditional cryptographic schemes and in particular the implementation of a effective key management infrastructure supporting a cryptographic layer. In this paper we present the first working prototype of a distributed key generation infrastructure for SCADA systems based on the well known identity based crypto-paradigm. © 2013 Springer-Verlag. | en_US |
| dc.identifier.doi | 10.1007/978-3-642-41485-5_11 | en_US |
| dc.identifier.isbn | 978-364241484-8 | |
| dc.identifier.issn | 0302-9743 | |
| dc.identifier.issn | 1611-3349 | |
| dc.identifier.scopus | 2-s2.0-84893062439 | |
| dc.identifier.uri | https://doi.org/10.1007/978-3-642-41485-5_11 | |
| dc.identifier.uri | https://hdl.handle.net/11147/9879 | |
| dc.language.iso | en | en_US |
| dc.publisher | Springer | en_US |
| dc.relation.ispartof | Lecture Notes in Computer Science | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Distributed private key generation | en_US |
| dc.subject | Identity based cryptography | en_US |
| dc.subject | Key management | en_US |
| dc.subject | SCADA protocols | en_US |
| dc.subject | SCADA security | en_US |
| dc.title | Distributed Identity Based Private Key Generation for Scada Systems | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication | |
| gdc.author.institutional | Kılınç, Görkem | |
| gdc.bip.impulseclass | C5 | |
| gdc.bip.influenceclass | C5 | |
| gdc.bip.popularityclass | C5 | |
| gdc.coar.access | metadata only access | |
| gdc.coar.type | text::conference output | |
| gdc.collaboration.industrial | false | |
| gdc.description.department | İzmir Institute of Technology. Computer Engineering | en_US |
| gdc.description.endpage | 129 | en_US |
| gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| gdc.description.scopusquality | Q3 | |
| gdc.description.startpage | 118 | en_US |
| gdc.description.volume | 7722 LNCS | en_US |
| gdc.description.wosquality | N/A | |
| gdc.identifier.openalex | W25412759 | |
| gdc.index.type | Scopus | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 0.0 | |
| gdc.oaire.influence | 2.7668214E-9 | |
| gdc.oaire.isgreen | false | |
| gdc.oaire.popularity | 7.133572E-10 | |
| gdc.oaire.publicfunded | false | |
| gdc.openalex.collaboration | National | |
| gdc.openalex.fwci | 0.0 | |
| gdc.openalex.normalizedpercentile | 0.01 | |
| gdc.opencitations.count | 0 | |
| gdc.plumx.mendeley | 5 | |
| gdc.plumx.scopuscites | 1 | |
| gdc.scopus.citedcount | 1 | |
| relation.isOrgUnitOfPublication.latestForDiscovery | 9af2b05f-28ac-4003-8abe-a4dfe192da5e |
