SCADA system security, complexity, and security proof

Reda Shbib*, Shikun Zhou, Khalil Alkadhimi

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

419 Downloads (Pure)


Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems were designed without security functionality. Nowadays, as a demand for connecting the SCADA system to the open network growths, the study of SCADA system security is an issue. A key-management scheme is critical for securing SCADA communications. Numerous key-management structures for SCADA also have been suggested. 11770-2 Mechanism 9 Key establishment Protocol has been used in SCADA communication however a security proof for the 11770-2 Mechanism 9 protocol is needed. The purpose of this paper is to provide a general overview about SCADA system, and its related security issues. Furthermore, we try to investigate the importance of key management protocol and the need of formal security poof.

Original languageEnglish
Title of host publicationPervasive Computing and the Networked World
Subtitle of host publicationJoint International Conference, ICPCA/SWS 2012, Istanbul, Turkey, November 28-30, 2012, Revised Selected Papers
EditorsQiaohong Zu, Bo Hu, Atilla Elçi
Number of pages6
ISBN (Electronic)9783642370151
ISBN (Print)9783642370144
Publication statusPublished - 2013
EventJoint International Conference on Pervasive Computing and the Networked World, ICPCA/SWS 2012 - Istanbul, Turkey
Duration: 28 Nov 201230 Nov 2012

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


ConferenceJoint International Conference on Pervasive Computing and the Networked World, ICPCA/SWS 2012


  • 11770-2 Mechanism 9
  • Formal security poof
  • key management


Dive into the research topics of 'SCADA system security, complexity, and security proof'. Together they form a unique fingerprint.

Cite this