Skip to main content
Log in

“Sec-KeyD” an efficient key distribution protocol for critical infrastructures

  • Original Research
  • Published:
CSI Transactions on ICT Aims and scope Submit manuscript

Abstract

The strength of cryptographic techniques depend on the security of keys and on the strength of encryption algorithms. In symmetric key encryption, two communicating parties share a secret key that should not be known to others. Furthermore, frequent key changes are needed to avoid the attackers from learning the key. Most of the networks are now connected to the Internet and all the information, including exchange of keys, flow through it. Therefore, key distribution is one of the major challenges in communication and network security. This problem becomes more complex when the systems have certain constraints like limited computation power, low bandwidth etc. This paper presents an efficient key distribution scheme for critical infrastructure such as SCADA (Supervisory Control and Data Acquisition) running on constraint environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Arreymbi J. Modelling to enhance GSM network security. University of East London Essex, RM8 2AS

  2. Beaver CL, Gallup DR, NeuMann WD, Torgerson MD (2002) Key management for SCADA (SKE). Printed at Sandia Lab. SAND2001-3252. March 2002

  3. Burrows M, Abadi M, Needham R (1989) A logic of authentication. Proc R Soc, Ser A 426(1871):233–271 (Also appeared as SRC Research Report 39 and, in a shortened form, in ACM Transactions on Computer Systems 8, 1 (February 1990), 18—36)

    MathSciNet  MATH  Google Scholar 

  4. Cremers C (2006) Scyther—semantics and verification of security protocols. PhD dissertation, Eindhoven University of Technology, Netherlands

  5. Cremers C (2009) The Scyther tool: automatic verification of security protocols. http://people.inf.ethz.ch/cremersc/scyther/index.html

  6. Dawson R, Boyd C, Dawson E, Manuel J, Nieto GP (2006) SKMA—a key management architecture for SCADA systems. In: 4th Australasian Information Security Workshop (AISW-NetSec 2006)

  7. DNP User Group. https://www.dnp.org

  8. Du X, Xiao Y, Ci S, Guizani M, Chen H-H (2007) A routing-driven key management scheme for heterogeneous sensor networks. In: Proceedings ICC 2007

  9. Ellison C (2004) SPKI/SDSI, October 2004

  10. Ezell BC (2007) Infrastructure vulnerability assessment model (IVAM). Risk Anal 27(3):571–583

    Article  Google Scholar 

  11. Hentea M (2008) Improving security for SCADA control systems. Interdiscipl J Inf Knowl Manag 3:73–86

    Google Scholar 

  12. Jain P, Saquib Z (2011) Analysis of different key distribution schemes for distributed sensor networks. In: International conference on advances in communication, network, and computing, pp 440–445

  13. Kadri B, Feham M, M’hamed A (2010) Lightweight PKI for WSN μPKI. Int J NetwSecur 10(3):194–200

    Google Scholar 

  14. Lee S, Choi D, Park C, Kim S (2008) An efficient key management scheme for secure SCADA communication. In: Proceedings of world academy of science, engineering and technology, November 2008, vol 35

  15. Li M, Poovendran R, Berenstein C (2002) Design of secure multicast key management schemes with communication budget constraint. IEEE Commun Lett 6(3):108–110

    Google Scholar 

  16. Li Y, Chen Y, Ma T-J. Security in GSM 2003. https://www.gsmsecurity.net/papers/securityingsm.pdf

  17. NCS Technical Information Bulletin 04-1, SCADA Systems, Oct 2004

  18. Paukatong T (2005) SCADA security: a new concerning issue of an in-house EGAT-SCADA. In: 2005 IEEE/PES transmission & distribution conference & exposition: Asia and Pacific, Dalian, pp 1–5. https://doi.org/10.1109/TDC.2005.1547116

  19. Pietre-Cambacedes L, Sitbon P (2008) Cryptographic key management for SCADA systems, issues and perspectives. In: Proceedings of the 2008 international conference on information security and assurance (ISA 2008), pp 156–161

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peeyush Jain.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jain, P. “Sec-KeyD” an efficient key distribution protocol for critical infrastructures. CSIT 8, 385–394 (2020). https://doi.org/10.1007/s40012-020-00314-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40012-020-00314-3

Keywords

Navigation