Next Article in Journal
Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era
Previous Article in Journal
Joint Location-Dependent Pricing and Request Mapping in ICN-Based Telco CDNs For 5G
Article Menu

Export Article

Open AccessArticle

CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems

1,*,†, 2,3,*,†, 2,† and 3,†
1
Department of Computer Technology, Dayananda Sagar University, Bangalore, Karnataka 560078, India
2
School of Computing and Information Sciences, Florida International University, Miami, FL 33199, USA
3
Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur, Karnataka 572103, India
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Future Internet 2019, 11(6), 126; https://doi.org/10.3390/fi11060126
Received: 2 April 2019 / Revised: 15 May 2019 / Accepted: 27 May 2019 / Published: 4 June 2019
(This article belongs to the Special Issue Next-Generation Public-Key Infrastructures)
  |  
PDF [3444 KB, uploaded 4 June 2019]
  |  

Abstract

Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches. Many security breaches have been reported impacting society severely. Hence, it is essential to achieve secure communication between the devices for creating a secure environment. For this to be effective, the keys used for secure communication must be protected against unauthorized disclosure, misuse, alteration or loss, which can be taken care of by a Key Management Infrastructure. In this paper, by considering the generic industrial automation network, a comprehensive key management infrastructure (CKMI) is designed for IACS. To design such an infrastructure, the proposed scheme employs ECDH, matrix method, and polynomial crypto mechanisms. The proposed design handles all the standard key management operations, viz. key generation, device registration, key establishment, key storage, device addition, key revocation, key update, key recovery, key archival, and key de-registration and destruction. The design supports secure communication between the same and different levels of IACS devices. The proposed design can be applied for major industrial automation networks to handle the key management operations. The performance analysis and implementation results highlight the benefits of the proposed design. View Full-Text
Keywords: cybersecurity; industrial automation and control systems; key management; key pre-distribution; SCADA; SCADA security cybersecurity; industrial automation and control systems; key management; key pre-distribution; SCADA; SCADA security
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

T. C., P.; G. S., T.; Iyengar, S.S.; Sunitha, N.R. CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems. Future Internet 2019, 11, 126.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top