{"id":"https://openalex.org/W2792743067","doi":"https://doi.org/10.1145/3174776.3174777","title":"Securing SCADA Applications Using OpenPLC With End-To-End Encryption","display_name":"Securing SCADA Applications Using OpenPLC With End-To-End Encryption","publication_year":2017,"publication_date":"2017-12-05","ids":{"openalex":"https://openalex.org/W2792743067","doi":"https://doi.org/10.1145/3174776.3174777","mag":"2792743067"},"language":"en","primary_location":{"id":"doi:10.1145/3174776.3174777","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3174776.3174777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd Annual Industrial Control System Security Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103044958","display_name":"Thiago Alves","orcid":"https://orcid.org/0000-0003-4440-8959"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Thiago Alves","raw_affiliation_strings":["Electrical and Computer Engineering, The University of Alabama in Huntsville, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, The University of Alabama in Huntsville, USA","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068153705","display_name":"Thomas H. Morris","orcid":"https://orcid.org/0000-0002-4854-5419"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thomas Morris","raw_affiliation_strings":["Electrical and Computer Engineering, The University of Alabama in Huntsville, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, The University of Alabama in Huntsville, USA","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029050875","display_name":"Seong-Moo Yoo","orcid":"https://orcid.org/0000-0002-2701-917X"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Seong-Moo Yoo","raw_affiliation_strings":["Electrical and Computer Engineering, The University of Alabama in Huntsville, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, The University of Alabama in Huntsville, USA","institution_ids":["https://openalex.org/I82495205"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103044958"],"corresponding_institution_ids":["https://openalex.org/I82495205"],"apc_list":null,"apc_paid":null,"fwci":1.207,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.81483642,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.8386496901512146},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8211858868598938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6568816304206848},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5650284886360168},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49929308891296387},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.47073566913604736},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.46310704946517944},{"id":"https://openalex.org/keywords/interconnectivity","display_name":"Interconnectivity","score":0.4349461793899536},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.22691965103149414},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.22287237644195557}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.8386496901512146},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8211858868598938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6568816304206848},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5650284886360168},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49929308891296387},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.47073566913604736},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.46310704946517944},{"id":"https://openalex.org/C25516864","wikidata":"https://www.wikidata.org/wiki/Q1665949","display_name":"Interconnectivity","level":2,"score":0.4349461793899536},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22691965103149414},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.22287237644195557},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3174776.3174777","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3174776.3174777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd Annual Industrial Control System Security Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6700000166893005,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G8386200534","display_name":null,"funder_award_id":"1623657","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W195300353","https://openalex.org/W849075951","https://openalex.org/W1544856668","https://openalex.org/W1557652964","https://openalex.org/W2102662195","https://openalex.org/W2189210968","https://openalex.org/W2460918602","https://openalex.org/W2542250650"],"related_works":["https://openalex.org/W2615977515","https://openalex.org/W174982720","https://openalex.org/W2151173140","https://openalex.org/W2115760278","https://openalex.org/W4386857536","https://openalex.org/W2146396794","https://openalex.org/W2809162650","https://openalex.org/W2511973026","https://openalex.org/W2807864071","https://openalex.org/W3117976988"],"abstract_inverted_index":{"During":[0],"its":[1],"nascent":[2],"stages,":[3],"Programmable":[4],"Logic":[5],"Controllers":[6],"(PLC)":[7],"were":[8],"made":[9],"robust":[10],"to":[11,21,47,87,109,136],"sustain":[12],"tough":[13],"industrial":[14],"environments,":[15],"but":[16],"little":[17],"care":[18],"was":[19,134],"taken":[20],"raise":[22],"defenses":[23],"against":[24],"potential":[25],"cyberthreats.":[26],"The":[27],"recent":[28],"interconnectivity":[29],"of":[30,77,146,160],"legacy":[31,120],"PLCs":[32],"and":[33,39,69,79],"SCADA":[34,67],"systems":[35],"with":[36],"corporate":[37],"networks":[38],"the":[40,45,66,70,91,143,147,154,158,161],"internet":[41],"has":[42,81],"significantly":[43],"increased":[44,157],"threats":[46],"critical":[48,75],"infrastructure.":[49],"To":[50],"counter":[51],"these":[52],"threats,":[53],"researchers":[54],"have":[55],"put":[56],"their":[57,102,113],"efforts":[58],"in":[59],"finding":[60],"defense":[61],"mechanisms":[62],"that":[63,133,153],"can":[64],"protect":[65,88],"network":[68],"PLCs.":[71],"Encryption":[72],"is":[73],"a":[74,165],"component":[76],"security":[78,159],"therefore":[80],"been":[82],"used":[83],"by":[84],"many":[85],"organizations":[86],"data":[89,139],"on":[90,119],"network.":[92],"However,":[93],"since":[94],"PLC":[95,132],"vendors":[96],"don't":[97],"make":[98],"available":[99],"information":[100],"about":[101],"hardware":[103],"or":[104],"software,":[105],"it":[106,140],"becomes":[107],"challenging":[108],"embed":[110],"encryption":[111,155],"into":[112],"devices,":[114],"especially":[115],"if":[116],"they":[117],"rely":[118],"protocols.":[121],"This":[122],"paper":[123],"describes":[124],"an":[125,129],"alternative":[126],"design":[127],"using":[128],"open":[130],"source":[131],"modified":[135],"encrypt":[137],"all":[138],"sends":[141],"over":[142],"network,":[144],"independently":[145],"protocol":[148],"used.":[149],"Experimental":[150],"results":[151],"indicated":[152],"layer":[156],"link":[162],"without":[163],"causing":[164],"significant":[166],"overhead.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
