Abstract
The strength of cryptographic techniques depend on the security of keys and on the strength of encryption algorithms. In symmetric key encryption, two communicating parties share a secret key that should not be known to others. Furthermore, frequent key changes are needed to avoid the attackers from learning the key. Most of the networks are now connected to the Internet and all the information, including exchange of keys, flow through it. Therefore, key distribution is one of the major challenges in communication and network security. This problem becomes more complex when the systems have certain constraints like limited computation power, low bandwidth etc. This paper presents an efficient key distribution scheme for critical infrastructure such as SCADA (Supervisory Control and Data Acquisition) running on constraint environment.
Similar content being viewed by others
References
Arreymbi J. Modelling to enhance GSM network security. University of East London Essex, RM8 2AS
Beaver CL, Gallup DR, NeuMann WD, Torgerson MD (2002) Key management for SCADA (SKE). Printed at Sandia Lab. SAND2001-3252. March 2002
Burrows M, Abadi M, Needham R (1989) A logic of authentication. Proc R Soc, Ser A 426(1871):233–271 (Also appeared as SRC Research Report 39 and, in a shortened form, in ACM Transactions on Computer Systems 8, 1 (February 1990), 18—36)
Cremers C (2006) Scyther—semantics and verification of security protocols. PhD dissertation, Eindhoven University of Technology, Netherlands
Cremers C (2009) The Scyther tool: automatic verification of security protocols. http://people.inf.ethz.ch/cremersc/scyther/index.html
Dawson R, Boyd C, Dawson E, Manuel J, Nieto GP (2006) SKMA—a key management architecture for SCADA systems. In: 4th Australasian Information Security Workshop (AISW-NetSec 2006)
DNP User Group. https://www.dnp.org
Du X, Xiao Y, Ci S, Guizani M, Chen H-H (2007) A routing-driven key management scheme for heterogeneous sensor networks. In: Proceedings ICC 2007
Ellison C (2004) SPKI/SDSI, October 2004
Ezell BC (2007) Infrastructure vulnerability assessment model (IVAM). Risk Anal 27(3):571–583
Hentea M (2008) Improving security for SCADA control systems. Interdiscipl J Inf Knowl Manag 3:73–86
Jain P, Saquib Z (2011) Analysis of different key distribution schemes for distributed sensor networks. In: International conference on advances in communication, network, and computing, pp 440–445
Kadri B, Feham M, M’hamed A (2010) Lightweight PKI for WSN μPKI. Int J NetwSecur 10(3):194–200
Lee S, Choi D, Park C, Kim S (2008) An efficient key management scheme for secure SCADA communication. In: Proceedings of world academy of science, engineering and technology, November 2008, vol 35
Li M, Poovendran R, Berenstein C (2002) Design of secure multicast key management schemes with communication budget constraint. IEEE Commun Lett 6(3):108–110
Li Y, Chen Y, Ma T-J. Security in GSM 2003. https://www.gsmsecurity.net/papers/securityingsm.pdf
NCS Technical Information Bulletin 04-1, SCADA Systems, Oct 2004
Paukatong T (2005) SCADA security: a new concerning issue of an in-house EGAT-SCADA. In: 2005 IEEE/PES transmission & distribution conference & exposition: Asia and Pacific, Dalian, pp 1–5. https://doi.org/10.1109/TDC.2005.1547116
Pietre-Cambacedes L, Sitbon P (2008) Cryptographic key management for SCADA systems, issues and perspectives. In: Proceedings of the 2008 international conference on information security and assurance (ISA 2008), pp 156–161
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jain, P. “Sec-KeyD” an efficient key distribution protocol for critical infrastructures. CSIT 8, 385–394 (2020). https://doi.org/10.1007/s40012-020-00314-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40012-020-00314-3