메뉴 건너뛰기




Volumn 253, Issue , 2007, Pages 133-146

Security enhancements for distributed control systems

Author keywords

DNP3; Role based authorization; RTU security; Secure communication

Indexed keywords


EID: 36248934250     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-75462-8_10     Document Type: Conference Paper
Times cited : (12)

References (36)
  • 1
    • 27744449156 scopus 로고    scopus 로고
    • Ten principles for securing control systems
    • J. Abshier, Ten principles for securing control systems, Control, vol. 18(10), pp. 77-81, 2005.
    • (2005) Control , vol.18 , Issue.10 , pp. 77-81
    • Abshier, J.1
  • 2
    • 1642282656 scopus 로고    scopus 로고
    • Securing control systems: What you need to know
    • J. Abshier and J. Weiss, Securing control systems: What you need to know, Control, vol. 17(2), pp. 43-48, 2004.
    • (2004) Control , vol.17 , Issue.2 , pp. 43-48
    • Abshier, J.1    Weiss, J.2
  • 4
    • 85052559033 scopus 로고    scopus 로고
    • Cryptographic Protection of SCADA Communications; Part 1: Background, Policies and Test Plan
    • American Gas Association, No. 12 Part 1, Draft 5, Washington, DC
    • American Gas Association, Cryptographic Protection of SCADA Communications; Part 1: Background, Policies and Test Plan, AGA Report No. 12 (Part 1), Draft 5, Washington, DC (www.gtiservices.org/security/ AGA12Draft5r3.pdf), 2005.
    • (2005) AGA Report
  • 5
    • 36249015425 scopus 로고    scopus 로고
    • Cryptographic Protection of SCADA Communications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications
    • American Gas Association, No. 12 Part 2, Draft, Washington, DC
    • American Gas Association, Cryptographic Protection of SCADA Communications; Part 2: Retrofit Link Encryption for Asynchronous Serial Communications, AGA Report No. 12 (Part 2), Draft, Washington, DC (www.gtiservices.org/security/aga-12p2-draft-0512.pdf), 2005.
    • (2005) AGA Report
  • 7
    • 20844463674 scopus 로고    scopus 로고
    • Security in SCADA systems: How to handle the growing menace to process automation
    • T. Brown, Security in SCADA systems: How to handle the growing menace to process automation, Computing and Control Engineering Journal, vol. 16(3), pp. 42-47, 2005.
    • (2005) Computing and Control Engineering Journal , vol.16 , Issue.3 , pp. 42-47
    • Brown, T.1
  • 8
    • 33847264121 scopus 로고    scopus 로고
    • The myths and facts behind cyber security risks for industrial control systems
    • presented at the
    • E. Byres and J. Lowe, The myths and facts behind cyber security risks for industrial control systems, presented at the VDE Congress, 2004.
    • (2004) VDE Congress
    • Byres, E.1    Lowe, J.2
  • 9
    • 36248931003 scopus 로고    scopus 로고
    • The White House, Washington, DC
    • W. Clinton, Presidential Decision Directive 63, The White House, Washington, DC (www.fas.org/irp/offdocs/pdd/pdd-63.htm), 1998.
    • (1998) Presidential Decision Directive , vol.63
    • Clinton, W.1
  • 13
    • 0039675763 scopus 로고
    • SCADA communication techniques and standards
    • D. Gaushell and W. Block, SCADA communication techniques and standards, Computer Applications in Power, vol. 6(3), pp. 45-50, 1993.
    • (1993) Computer Applications in Power , vol.6 , Issue.3 , pp. 45-50
    • Gaushell, D.1    Block, W.2
  • 14
    • 31944451961 scopus 로고    scopus 로고
    • Security of critical control systems sparks concern
    • D. Geer, Security of critical control systems sparks concern, IEEE Computer, vol. 39(1), pp. 20-23, 2006.
    • (2006) IEEE Computer , vol.39 , Issue.1 , pp. 20-23
    • Geer, D.1
  • 17
    • 36248989664 scopus 로고    scopus 로고
    • Instrumentation Systems and Automation Society, Security Technologies for Manufacturing and Control Systems (ANSI/ISA-TR99.00.01-2004), Research Triangle Park, North Carolina, 2004.
    • Instrumentation Systems and Automation Society, Security Technologies for Manufacturing and Control Systems (ANSI/ISA-TR99.00.01-2004), Research Triangle Park, North Carolina, 2004.
  • 18
    • 36248966509 scopus 로고    scopus 로고
    • Instrumentation Systems and Automation Society, Integrating Electronic Security into the Manufacturing and Control Systems Environment (ANSI/ ISA-TR99.00.02-2004), Research Triangle Park, North Carolina, 2004.
    • Instrumentation Systems and Automation Society, Integrating Electronic Security into the Manufacturing and Control Systems Environment (ANSI/ ISA-TR99.00.02-2004), Research Triangle Park, North Carolina, 2004.
  • 19
    • 33644653529 scopus 로고    scopus 로고
    • System threats and vulnerabilities (power system protection)
    • T. Kropp, System threats and vulnerabilities (power system protection), IEEE Power and Energy, vol. 4(2), pp. 46-50, 2006.
    • (2006) IEEE Power and Energy , vol.4 , Issue.2 , pp. 46-50
    • Kropp, T.1
  • 21
    • 36248933699 scopus 로고    scopus 로고
    • LynuxWorks (www.lynuxworks.com).
    • LynuxWorks
  • 22
    • 0037377597 scopus 로고    scopus 로고
    • SCADA and IP: Is network convergence really here?
    • R. McClanahan, SCADA and IP: Is network convergence really here? IEEE Industry Applications, vol. 9(2), pp. 29-36, 2003.
    • (2003) IEEE Industry Applications , vol.9 , Issue.2 , pp. 29-36
    • McClanahan, R.1
  • 23
    • 27644559364 scopus 로고    scopus 로고
    • Trends in process control systems security
    • A. Miller, Trends in process control systems security, IEEE Security and Privacy, vol. 3(5), pp. 57-60, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.5 , pp. 57-60
    • Miller, A.1
  • 25
    • 36248933698 scopus 로고    scopus 로고
    • Supervisory Control and Data Acquisition (SCADA) Systems
    • National Communications System, Arlington, Virginia
    • National Communications System, Supervisory Control and Data Acquisition (SCADA) Systems, Technical Bulletin 04-1, Arlington, Virginia, 2004.
    • (2004) Technical Bulletin , vol.4 -1
  • 26
    • 36248938653 scopus 로고    scopus 로고
    • Office of Energy Assurance, 21 Steps to Improve Cyber Security of SCADA Networks, U.S. Department of Energy
    • Office of Energy Assurance, 21 Steps to Improve Cyber Security of SCADA Networks, U.S. Department of Energy, Washington, DC, 2002.
    • (2002)
    • Washington, D.C.1
  • 29
    • 36248937170 scopus 로고    scopus 로고
    • Ph.D. Dissertation, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky
    • S. Patel, Secure Internet-Based Communication Protocol for SCADA Networks, Ph.D. Dissertation, Department of Computer Engineering and Computer Science, University of Louisville, Louisville, Kentucky, 2006.
    • (2006) Secure Internet-Based Communication Protocol for SCADA Networks
    • Patel, S.1
  • 30
    • 0003994024 scopus 로고    scopus 로고
    • Critical Foundations: Protecting America's Infrastructures
    • President's Commission on Critical Infrastructure Protection, Report Number 040-000-00699-1, United States Government Printing Office, Washington, DC
    • President's Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America's Infrastructures, Report Number 040-000-00699-1, United States Government Printing Office, Washington, DC, 1997.
    • (1997)
  • 32
    • 36248947246 scopus 로고    scopus 로고
    • W. Rush and A. Shah, Impact of Information Security Systems on Real-Time Process Control, Final Report, NIST Project SB1341-02-C-081, Gas Technology Institute, Des Plaines, Illinois (www.isd.mel.nist.gov/ projects/processcontrol/testbed/GTI_Final April2005.pdf), 2005.
    • W. Rush and A. Shah, Impact of Information Security Systems on Real-Time Process Control, Final Report, NIST Project SB1341-02-C-081, Gas Technology Institute, Des Plaines, Illinois (www.isd.mel.nist.gov/ projects/processcontrol/testbed/GTI_Final April2005.pdf), 2005.
  • 36
    • 33750391626 scopus 로고    scopus 로고
    • Low-latency cryptographic protection for SCADA communications
    • Applied Cryptography and Network Security, M. Jakobsson, M. Yung and J. Zhou Eds, Springer, Berlin-Heidelberg, Germany, pp
    • A. Wright, J. Kinast and J. McCarty, Low-latency cryptographic protection for SCADA communications, in Applied Cryptography and Network Security (LNCS 3089), M. Jakobsson, M. Yung and J. Zhou (Eds.), Springer, Berlin-Heidelberg, Germany, pp. 263-277, 2004.
    • (2004) LNCS , vol.3089 , pp. 263-277
    • Wright, A.1    Kinast, J.2    McCarty, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.