A Survey on Key management for SCADA

SCADA systems are used for control various infrastructures. While SCADA system depends mainly on exchanging the messages (which sometimes may be sensitive), so any capture or modify of the messages can be case damage sometime could be catastrophe. Therefore, unencrypted data are vulnerable which can produce several threats for the system. So, a secure data over communication channels is required. According to the various malicious attacks possible on SCADA and its features (which containing a variety of devices), therefore no such scheme can be adopting to achieve best security for SCADA systems. The most important methods for security is encrypted the data using encryption system. Encryption systems rely mainly on several keys used for encryption and decryption. It has become necessary to find a way to manage efficient keys to obtain an efficient encryption system. Several of key management scheme where proposed for SCADA systems, our survey presents the most popular schemes for key management in SCADA system, that may contribute to giving brief status, challenges and future trends.

[1]  Zhigang Zhao,et al.  Long term key management architecture for SCADA systems , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).

[2]  Aarsha Unni,et al.  Cyber Security Analysis of Substation Automation System , 2016 .

[3]  Sattar B. Sadkhan,et al.  Hybrid Method to Implement a Parallel Search of the Cryptosystem Keys , 2019, 2019 International Conference on Advanced Science and Engineering (ICOASE).

[4]  Hyoung-Kee Choi,et al.  An efficient and versatile key management protocol for secure smart grid communications , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[5]  Sattar B. Sadkhan,et al.  Security Issues of Cognitive Radio Network , 2019, 2019 2nd International Conference on Engineering Technology and its Applications (IICETA).

[6]  Zahra Moravej,et al.  Secure SCADA communication by using a modified key management scheme. , 2013, ISA transactions.

[7]  Ed Dawson,et al.  SKMA - A Key Management Architecture for SCADA Systems , 2006 .

[8]  M. Deshpande,et al.  International Research Journal of Engineering and Technology (IRJET) , 2016 .

[9]  Farokh B. Bastani,et al.  Scalable Authentication and Key Management in SCADA , 2010, 2010 IEEE 16th International Conference on Parallel and Distributed Systems.

[10]  D. J. Marihart Communications technology guidelines for EMS/SCADA systems , 2001 .

[11]  M. Hadi Amini,et al.  Key pre-distribution scheme with join leave support for SCADA systems , 2019, Int. J. Crit. Infrastructure Prot..

[12]  Andrew K. Wright,et al.  Low-Latency Cryptographic Protection for SCADA Communications , 2004, ACNS.

[13]  Dongho Won,et al.  Advanced Key-Management Architecture for Secure SCADA Communications , 2009, IEEE Transactions on Power Delivery.

[14]  N. R. Sunitha,et al.  Polynomial Based Scheme for Secure SCADA Operations , 2015 .

[15]  Baheeja K. Al-Shukur,et al.  Survey of biometrie based key generation to enhance security of cryptosystems , 2016, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).

[16]  Dhilal M. Reda,et al.  Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory , 2018, 2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT).

[17]  Cheryl L. Beaver,et al.  Key Management for SCADA , 2002 .

[18]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[19]  Tai-hoon Kim Securing Communication of SCADA Components in Smart Grid Environment , 2022 .

[20]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[21]  Om Pal,et al.  Cryptographic Key Management for SCADA System: An Architectural Framework , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[22]  Dongho Won,et al.  Efficient Secure Group Communications for SCADA , 2010, IEEE Transactions on Power Delivery.

[23]  Dong-Joo Kang,et al.  Proposal strategies of key management for data encryption in SCADA network of electric power systems , 2009 .

[24]  Parviz Keshavarzi,et al.  Advance hybrid key management architecture for SCADA network security , 2016, Secur. Commun. Networks.

[25]  L. Pietre-Cambacedes,et al.  Cryptographic Key Management for SCADA Systems-Issues and Perspectives , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[26]  Tai-hoon Kim,et al.  Communication security for SCADA in smart grid environment , 2010 .

[27]  S. S. Iyengar,et al.  CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems , 2019, Future Internet.

[28]  Seungjoo Kim,et al.  An Efficient Key Management Scheme for Secure SCADA Communication , 2008 .