CASPIAN JOURNAL

MANAGEMENT AND HIGH TECHNOLOGIES

Routing and managing encryption keys in wireless sensor networks of SCADA systems

Read Kamaev Valeriy A., РљuР°ng Vin Рўhay, Finogeev Alexey G., Nefedova Irina S., Finogeev Anton A., Botvinkin Pavel V. Routing and managing encryption keys in wireless sensor networks of SCADA systems // Caspian journal : management and high technologies. — 2014. — №3. — pp. 197-215.

Kamaev Valeriy A. - D.Sc. (Engineering), Professor, Volgograd State Technical University, 28 Lenin av., Volgograd, 400005, Russian Federation, kamaev@unix.cad.vstu.ru

РљuР°ng Vin Рўhay - Director, Institute of Information Technology, Hanoi, Vietnam, tqvinh@ioit.ac.vn

Finogeev Alexey G. - D.Sc. (Engineering), Professor, Penza State University, 40 Krasnaya St., Penza, 440026, Russian Federation, finogeev@sura.ru

Nefedova Irina S. - postgraduate student, Penza State University, 40 Krasnaya St., Penza, 440026, Russian Federation, nefedya2008@yandex.ru

Finogeev Anton A. - Ph.D. (Engineering), Associate Professor, Penza State University, 40 Krasnaya St., Penza, 440026, Russian Federation, antonfinogeev@mail.ru

Botvinkin Pavel V. - postgraduate student, Volgograd State Technical University, 28 Lenin av., Volgograd, 400005, Russian Federation, pavel.botvinkin@gmail.com

Functioning of the automated control systems in various branches of industry, transport, utilities, and other scientific activities is carried out on the basis of computer technology. One the degree of vulnerability of these systems depends not only the success of organizations, but also the security of regions, national security. Therefore, protection of corporate information systems from security threats is an important element of nearly any IT-project, including systems for supervisory control and data acquisition. On compliance of information, provided by the SCADA-systems, to the requirements of reliability and efficiency, depends the effective functioning of the whole enterprise. This article discusses the definition of term "SCADA-systems" and explains the need to ensure their safety. The paper examines the problems, goals and objectives of key management in the data encryption at wireless sensor networks (WSN) SCADA systems. The structure of the key information in the ZigBee network and methods receiving the keys. The application of the hybrid encryption and managing encryption keys in WSN, when a session symmetric key used to encrypt data, and asymmetric keys to encrypt the session key. To solve the problems of authentication and verification data hash function is used. Proposed three schemes of hybrid managing encryption keys, depending on the routing method and WSN topology with the transfer of key information in the route frames. Analyzed advantages and disadvantages of these methods for different conditions of use.

Key words: обеспечение безопасности, беспроводная сенсорная сеть, SCADA-система, управление ключами, шифрование данных, WSN, маршрутизация, ассиметричное и симметричное шифрование, гибридная схема шифрования, security, wireless sensor network, SCADA systems, managin