CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems
Pramod T. C.,
Thejas G. S.,
S. S. Iyengar and
N. R. Sunitha
Additional contact information
Pramod T. C.: Department of Computer Technology, Dayananda Sagar University, Bangalore, Karnataka 560078, India
Thejas G. S.: School of Computing and Information Sciences, Florida International University, Miami, FL 33199, USA
S. S. Iyengar: School of Computing and Information Sciences, Florida International University, Miami, FL 33199, USA
N. R. Sunitha: Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur, Karnataka 572103, India
Future Internet, 2019, vol. 11, issue 6, 1-25
Abstract:
Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches. Many security breaches have been reported impacting society severely. Hence, it is essential to achieve secure communication between the devices for creating a secure environment. For this to be effective, the keys used for secure communication must be protected against unauthorized disclosure, misuse, alteration or loss, which can be taken care of by a Key Management Infrastructure. In this paper, by considering the generic industrial automation network, a comprehensive key management infrastructure (CKMI) is designed for IACS. To design such an infrastructure, the proposed scheme employs ECDH, matrix method, and polynomial crypto mechanisms. The proposed design handles all the standard key management operations, viz. key generation, device registration, key establishment, key storage, device addition, key revocation, key update, key recovery, key archival, and key de-registration and destruction. The design supports secure communication between the same and different levels of IACS devices. The proposed design can be applied for major industrial automation networks to handle the key management operations. The performance analysis and implementation results highlight the benefits of the proposed design.
Keywords: cybersecurity; industrial automation and control systems; key management; key pre-distribution; SCADA; SCADA security (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2019
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1999-5903/11/6/126/pdf (application/pdf)
https://www.mdpi.com/1999-5903/11/6/126/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:11:y:2019:i:6:p:126-:d:237164
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().