@inproceedings{98f2cdf5243748b084c195e4baa2947a,
title = "A deployable SCADA authentication technique for modern power grids",
abstract = "The modern power grid makes extensive use of automated data collection and control. These supervisory control and data acquisition (SCADA) systems often use communication protocols that were developed for isolated networks. However, the underlying SCADA systems often use the Internet for data transit, exposing these SCADA devices to remote, malicious adversaries. Unfortunately, these protocols are often vulnerable to impersonation attacks, and the devices can be susceptible to cryptographic key compromise. This allows adversaries to pollute the protocols with misinformation. In this paper, we propose an approach to authenticate the underlying SCADA protocols that combines a different approach to data authenticity and hardware-protected key distribution approach. Unlike prior work, our approach does not require modification to the SCADA end-points themselves, allowing the technique to be combined with legacy devices.",
keywords = "Authentication, SCADA, Security",
author = "Taylor, {Curtis R.} and Shue, {Craig A.} and Paul, {Nathanael R.}",
year = "2014",
doi = "10.1109/ENERGYCON.2014.6850502",
language = "English",
isbn = "9781479924493",
series = "ENERGYCON 2014 - IEEE International Energy Conference",
publisher = "IEEE Computer Society",
pages = "696--702",
booktitle = "ENERGYCON 2014 - IEEE International Energy Conference",
note = "2014 IEEE International Energy Conference, ENERGYCON 2014 ; Conference date: 13-05-2014 Through 16-05-2014",
}