IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v11y2019i6p126-d237164.html
   My bibliography  Save this article

CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems

Author

Listed:
  • Pramod T. C.

    (Department of Computer Technology, Dayananda Sagar University, Bangalore, Karnataka 560078, India
    These authors contributed equally to this work.)

  • Thejas G. S.

    (School of Computing and Information Sciences, Florida International University, Miami, FL 33199, USA
    Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur, Karnataka 572103, India
    These authors contributed equally to this work.)

  • S. S. Iyengar

    (School of Computing and Information Sciences, Florida International University, Miami, FL 33199, USA
    These authors contributed equally to this work.)

  • N. R. Sunitha

    (Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur, Karnataka 572103, India
    These authors contributed equally to this work.)

Abstract

Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches. Many security breaches have been reported impacting society severely. Hence, it is essential to achieve secure communication between the devices for creating a secure environment. For this to be effective, the keys used for secure communication must be protected against unauthorized disclosure, misuse, alteration or loss, which can be taken care of by a Key Management Infrastructure. In this paper, by considering the generic industrial automation network, a comprehensive key management infrastructure (CKMI) is designed for IACS. To design such an infrastructure, the proposed scheme employs ECDH, matrix method, and polynomial crypto mechanisms. The proposed design handles all the standard key management operations, viz. key generation, device registration, key establishment, key storage, device addition, key revocation, key update, key recovery, key archival, and key de-registration and destruction. The design supports secure communication between the same and different levels of IACS devices. The proposed design can be applied for major industrial automation networks to handle the key management operations. The performance analysis and implementation results highlight the benefits of the proposed design.

Suggested Citation

  • Pramod T. C. & Thejas G. S. & S. S. Iyengar & N. R. Sunitha, 2019. "CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems," Future Internet, MDPI, vol. 11(6), pages 1-25, June.
  • Handle: RePEc:gam:jftint:v:11:y:2019:i:6:p:126-:d:237164
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/11/6/126/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/11/6/126/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. T. C., Pramod & Boroojeni, Kianoosh G. & Hadi Amini, M. & Sunitha, N.R. & Iyengar, S.S., 2019. "Key pre-distribution scheme with join leave support for SCADA systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 24(C), pages 111-125.
    2. Knowles, William & Prince, Daniel & Hutchison, David & Disso, Jules Ferdinand Pagna & Jones, Kevin, 2015. "A survey of cyber security management in industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 9(C), pages 52-80.
    3. Jarmakiewicz, Jacek & Parobczak, Krzysztof & Maślanka, Krzysztof, 2017. "Cybersecurity protection for power grid control infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 18(C), pages 20-33.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Hussain, Shahbaz & Hernandez Fernandez, Javier & Al-Ali, Abdulla Khalid & Shikfa, Abdullatif, 2021. "Vulnerabilities and countermeasures in electrical substations," International Journal of Critical Infrastructure Protection, Elsevier, vol. 33(C).
    2. Rodofile, Nicholas R. & Radke, Kenneth & Foo, Ernest, 2019. "Extending the cyber-attack landscape for SCADA-based critical infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 25(C), pages 14-35.
    3. Juntao Chen & Quanyan Zhu & Tamer Başar, 2021. "Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks," Dynamic Games and Applications, Springer, vol. 11(2), pages 294-325, June.
    4. Mohammed Alghassab, 2021. "Analyzing the Impact of Cybersecurity on Monitoring and Control Systems in the Energy Sector," Energies, MDPI, vol. 15(1), pages 1-21, December.
    5. Rajan, Rishabh & Rana, Nripendra P. & Parameswar, Nakul & Dhir, Sanjay & Sushil, & Dwivedi, Yogesh K., 2021. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management," Technological Forecasting and Social Change, Elsevier, vol. 170(C).
    6. Eric DuBois & Ashley Peper & Laura A. Albert, 2023. "Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach," Decision Analysis, INFORMS, vol. 20(3), pages 202-219, September.
    7. Zenonas Turskis & Nikolaj Goranin & Assel Nurusheva & Seilkhan Boranbayev, 2019. "A Fuzzy WASPAS-Based Approach to Determine Critical Information Infrastructures of EU Sustainable Development," Sustainability, MDPI, vol. 11(2), pages 1-25, January.
    8. Vlad Daniel SAVIN & Costel SERBAN, 2019. "Cybersecurity Vulnerabilities And Threats Of Scada Systems In Critical Infrastructures," Proceedings of the INTERNATIONAL MANAGEMENT CONFERENCE, Faculty of Management, Academy of Economic Studies, Bucharest, Romania, vol. 13(1), pages 234-237, November.
    9. SICARD, Franck & ZAMAI, Éric & FLAUS, Jean-Marie, 2019. "An approach based on behavioral models and critical states distance notion for improving cybersecurity of industrial control systems," Reliability Engineering and System Safety, Elsevier, vol. 188(C), pages 584-603.
    10. Jarmakiewicz, Jacek & Parobczak, Krzysztof & Maślanka, Krzysztof, 2017. "Cybersecurity protection for power grid control infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 18(C), pages 20-33.
    11. Juan Toctaquiza & Diego Carrión & Manuel Jaramillo, 2023. "An Electrical Power System Reconfiguration Model Based on Optimal Transmission Switching under Scenarios of Intentional Attacks," Energies, MDPI, vol. 16(6), pages 1-17, March.
    12. Mustafa, Faizan E & Ahmed, Ijaz & Basit, Abdul & Alvi, Um-E-Habiba & Malik, Saddam Hussain & Mahmood, Atif & Ali, Paghunda Roheela, 2023. "A review on effective alarm management systems for industrial process control: Barriers and opportunities," International Journal of Critical Infrastructure Protection, Elsevier, vol. 41(C).
    13. CHERIFI, Tarek & HAMAMI, Lamia, 2018. "A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol," International Journal of Critical Infrastructure Protection, Elsevier, vol. 20(C), pages 68-84.
    14. Randall, Rick G. & Allen, Stuart, 2021. "Cybersecurity professionals information sharing sources and networks in the U.S. electrical power industry," International Journal of Critical Infrastructure Protection, Elsevier, vol. 34(C).
    15. Xinzhan Li & Yang Zhou & Xin Li & Lijuan Xu & Dawei Zhao, 2022. "Protection Strategy Selection Model Based on Genetic Ant Colony Optimization Algorithm," Mathematics, MDPI, vol. 10(21), pages 1-24, October.
    16. Han, Choong-Hee & Park, Soon-Tai & Lee, Sang-Joon, 2019. "The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system," International Journal of Critical Infrastructure Protection, Elsevier, vol. 26(C).
    17. Athanasios Dagoumas, 2019. "Assessing the Impact of Cybersecurity Attacks on Power Systems," Energies, MDPI, vol. 12(4), pages 1-23, February.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:11:y:2019:i:6:p:126-:d:237164. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.