A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol.
Tarek CherifiLatifa HamamiPublished in: Int. J. Crit. Infrastructure Prot. (2018)
Keyphrases
- control system
- cyber security
- smart grid
- key management
- cryptographic protocols
- critical infrastructure
- security protocols
- information security
- security issues
- security properties
- rfid systems
- provably secure
- mobile payment
- elliptic curve
- security analysis
- key distribution
- network security
- denial of service attacks
- diffie hellman
- key agreement protocol
- key exchange protocol
- contractual obligations
- protocol specification
- electronic voting
- physical layer
- communication protocols
- authentication protocol