Networked critical infrastructures improve our lives, but they are attractive targets for adversaries. In such infrastructures, to secure sensitive data is vital, as the information system is a foundation of today¿s critical infrastructures, and data security is a main concern in such systems. Cryptography is an approach for data security, but this method should be altered according to various features of infrastructure networks. Since complex and distributed critical infrastructures usually spread over large geographic areas, different parts of those infrastructures have different levels of perimeter defense. Devices in weakly protected zones are more likely to be captured than those in well protected zones. If an adversary captures devices, s/he can bypass cyber security measures and obtain secret information directly. Such a threat requires a layered security mechanism that can prevent adversaries from invading the whole infrastructure network from these weak zones. In this article, we propose a layered encryption mechanism based on hash chain technology for protecting sensitive data. Besides showing the layered defense, the mechanism is also lightweight and has convenient key management. It can be used independently or as a supplement to existing security measures. We evaluate performance of the proposed mechanism over different kinds of devices.
[1]
Nei Kato,et al.
An early warning system against malicious activities for smart grid communications
,
2011,
IEEE Network.
[2]
Igor Nai Fovino,et al.
A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems
,
2011,
IEEE Transactions on Industrial Informatics.
[3]
George W. Arnold,et al.
Challenges and Opportunities in Smart Grid: A Position Article
,
2011,
Proceedings of the IEEE.
[4]
Xiaoyun Wang,et al.
How to Break MD5 and Other Hash Functions
,
2005,
EUROCRYPT.
[5]
Leslie Lamport,et al.
Password authentication with insecure communication
,
1981,
CACM.
[6]
Juan Manuel González Nieto,et al.
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA
,
2010,
2010 24th IEEE International Conference on Advanced Information Networking and Applications.