New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions.
Aamir ShahzadMalrey LeeHyung Doo KimSeon-Mi WooNaixue XiongPublished in: Symmetry (2015)
Keyphrases
- key management
- security requirements
- security issues
- security mechanisms
- human operators
- security level
- critical infrastructure
- real time
- security analysis
- information security
- security protocols
- security measures
- resource constrained
- supervisory control
- cyber security
- sensor technology
- key distribution
- provably secure
- data acquisition
- authentication mechanism
- key exchange protocol
- security architecture
- mobile agent system
- integrity verification
- security model
- ad hoc networks
- intrusion detection
- wireless sensor networks
- user authentication
- authentication protocol
- diffie hellman
- security policies
- digital rights management
- security patterns
- access control
- sensor networks