DOI QR코드

DOI QR Code

Key Distribution Process for Encryption of SCADA Communication using Game Theory applied Multiagent System

  • Kim, Hak-Man (Department of Electrical Engineering, Incheon City College) ;
  • Kang, Dong-Joo (Korea Electro-technology Research Institute)
  • Published : 2009.11.30

Abstract

SCADA (Supervisory Control and Data Acquisition) system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks, SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, flexible key distribution concept is proposed for improving the security of SCADA network using Multiagent System (MAS).

Keywords

References

  1. A.B. Smith, IEEE Std C37.1-1994, IEEE Standard Definition, Specification, and Analysis of Systems Used for Supervisory Control, Data Acquisition, and Automatic Control ,IEEE Power Engineering Society, Sponsored by the Substations Committee, Institute of Electrical and Electronics Engineers, Inc., New York, 1994
  2. G.G. Helmer, J.S.K Wong, V. Honavar and L. Miller, "Intelligent Agents for Intrusion Detection", Proc. of the IEEE Information Technology Conference, Syracuse, NT, pp.121-124, September 1999
  3. V. Gorodetski, O.Karsaev, A. Karsaev, A. Khabalov, I. Kotenko, L. Popyack, V. Skormin, "Agent-based Model of Computer Network Security System : A Case Study" Proc. of the International Workshop "Mathematical Methods, Models and Architectures for Computer Network Security", LNCS, Vol. 2052, pp.39-50, Springer, 2001
  4. C.C. Liu, J. Jung, G. Heydt, V. Vittal and A.G. Phadke, "The Strategic Power Infractructure Defense (SPID) System: A Conseptual Design", IEEE Control Systems Magazine, pp. 40-52, August 2000
  5. C. Rehtanz, Autonomous Systems and Intelligent Agents in Power System Control and Operation, Springer, New York, 2003
  6. Rolf Carlson, Sandia SCADA Program: High-Security SCADA LDRD Final Report, Sandia Report, SAND 2002-0729, April 2002
  7. Thomas Kropp, "System Threats and Vulnerabilities - An EMS and SCADA Security System Overview", IEEE Power and Energy Magazine, pp.46-50, March 2006
  8. V.M. Igure, S.A. Laughter, R.D. Williams, "Security issues in SCADA networks", Computer & Society, Vol. 25, pp.498-506, 2006 https://doi.org/10.1016/j.cose.2006.03.001
  9. Avinash Dixit, Susan Skeath, "Games of Strategy", W. W. Norton
  10. Sheldon M. Ross, "Introduction to Probability Medels", Academic Press, Inc