Efficient Key Management Scheme for SCADA System

  • Jian Shen
  • Jin Wang
  • Yongjun Ren
  • Jianwei Zhang
  • Shunfeng Wang
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 260)


Currently Supervisory Control And Data Acquisition (SCADA) system intends to be connected to the open operating environment. Thus, protecting SCADA systems from malicious attacks is getting more and more attention. A key management scheme is essential for secure SCADA communications. In this paper, we propose an efficient key management scheme for SCADA systems with good security properties and performance.


Supervisory control and data acquisition (SCADA) Key management Secure SCADA communications 



This work was supported by the research fund from Nanjing University of Information Science and Technology under Grant No. S8113003001, National Science Foundation of China under Grant No. 61272421.


  1. 1.
    Beaver C, Gallup D, Neumann W, Torgerson M (2002) Key Management for SCADA. Available: scada/documnets/013252.pdf
  2. 2.
    Colin RD, Boyd C, Manuel J, Nieto G (2006) SKMAA key management architecture for SCADA systems. In: 4th Australasian information security workshop, pp 138–192Google Scholar
  3. 3.
    Choi D, Kim H, Won D, Kim S (2009) Advanced key management architecture for secure SCADA communications. IEEE Trans Power Del 24(3):1154–1163Google Scholar
  4. 4.
    Boneh D, Franklin M (2001) Identity-based encryption from weil pairing. In: Advances in Cryptology-CRYPTO01, Lecture Notes in Computer Science, vol 2139, pp 213–229Google Scholar
  5. 5.
    Kim Y, Perrig A, Tsudik G (2004) Group key agreement efficient in communication. IEEE Trans Comput 53(7):905–921CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  • Jian Shen
    • 1
  • Jin Wang
    • 1
  • Yongjun Ren
    • 1
  • Jianwei Zhang
    • 2
  • Shunfeng Wang
    • 3
  1. 1.School of Computer and Software, Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science and TechnologyNanjingChina
  2. 2.School of Mathematics and StatisticsNanjing University of Information Science and TechnologyNanjingChina
  3. 3.College of Bin Jiang, Nanjing University of Information Science and TechnologyNanjingChina

Personalised recommendations