@inproceedings{0bc9ee5bab224cdda1a58b027fa84342,
title = "SCADA system security, complexity, and security proof",
abstract = "Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems were designed without security functionality. Nowadays, as a demand for connecting the SCADA system to the open network growths, the study of SCADA system security is an issue. A key-management scheme is critical for securing SCADA communications. Numerous key-management structures for SCADA also have been suggested. 11770-2 Mechanism 9 Key establishment Protocol has been used in SCADA communication however a security proof for the 11770-2 Mechanism 9 protocol is needed. The purpose of this paper is to provide a general overview about SCADA system, and its related security issues. Furthermore, we try to investigate the importance of key management protocol and the need of formal security poof.",
keywords = "11770-2 Mechanism 9, Formal security poof, key management, SCADA",
author = "Reda Shbib and Shikun Zhou and Khalil Alkadhimi",
year = "2013",
doi = "10.1007/978-3-642-37015-1_35",
language = "English",
isbn = "9783642370144",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "405--410",
editor = "Qiaohong Zu and Bo Hu and Atilla El{\c c}i",
booktitle = "Pervasive Computing and the Networked World",
note = "Joint International Conference on Pervasive Computing and the Networked World, ICPCA/SWS 2012 ; Conference date: 28-11-2012 Through 30-11-2012",
}