메뉴 건너뛰기




Volumn , Issue , 2010, Pages 381-386

Challenges and direction toward secure communication in the SCADA system

Author keywords

SCADA cyber security; Security protocol; Smart device; Smart grid

Indexed keywords

COMMUNICATION FUNCTIONS; CYBER SECURITY; INTERNATIONAL STANDARD ORGANIZATIONS; POWER GRIDS; RESEARCH COMMUNITIES; SCADA SECURITY; SECURE COMMUNICATIONS; SECURITY FUNCTIONS; SECURITY ISSUES; SECURITY MECHANISM; SECURITY PROTOCOLS; SMART DEVICES; SMART GRID; STANDARD DOCUMENTS; SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS; TECHNOLOGICAL CHALLENGES;

EID: 77955220046     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CNSR.2010.52     Document Type: Conference Paper
Times cited : (29)

References (30)
  • 3
    • 77955226337 scopus 로고    scopus 로고
    • DNP User Group
    • DNP User Group, http://www.dnp.org.
  • 9
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • B. Clifford Neuman and T. Tso, "Kerberos: An authentication service for computer networks", IEEE Communications Magazine, Vol.32, No.9, pp33-28, September 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-28
    • Clifford Neuman, B.1    Tso, T.2
  • 14
    • 84874453480 scopus 로고    scopus 로고
    • Detecting attacks in power plant interfacing substations through probabilistic validation of attack-effect bindings
    • J.L. Rrushi and R. H. Campbell, "Detecting Attacks in Power Plant Interfacing Substations through Probabilistic Validation of Attack-Effect Bindings," SCADA Security Scientific Symposium, 2008.
    • (2008) SCADA Security Scientific Symposium
    • Rrushi, J.L.1    Campbell, R.H.2
  • 15
  • 17
    • 77955222095 scopus 로고    scopus 로고
    • Data and communications security
    • IEC technical committee 57, December, Part 5: Security for IEC 60870-5 and derivatives
    • IEC technical committee 57, "Data and Communications Security, Part 5: Security for IEC 60870-5 and derivatives," IEC 62351-62355 Second Committee Draft, December 2005.
    • (2005) IEC 62351-62355 Second Committee Draft
  • 21
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • February
    • H. Krawcryk, M. Bellare, and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", RFC 2104, February 1997.
    • (1997) RFC , vol.2104
    • Krawcryk, H.1    Bellare, M.2    Canetti, R.3
  • 23
    • 0003195066 scopus 로고
    • The MD5 Message-Digest algorithms
    • April
    • R. Rivest, "The MD5 Message-Digest Algorithms", RFC 1321, April 1992.
    • (1992) RFC , vol.1321
    • Rivest, R.1
  • 24
    • 0031199999 scopus 로고    scopus 로고
    • Eliminating receive livelock in an interrupted-driven kernel
    • J. C. Mogul and K. K. Ramakrishnanl "Eliminating receive livelock in an interrupted-driven kernel," ACM Trans. On Computer System, Vol.15, No 3, pp217-252, 1997.
    • (1997) ACM Trans. on Computer System , vol.15 , Issue.3 , pp. 217-252
    • Mogul, J.C.1    Ramakrishnanl, K.K.2
  • 25
    • 77955177566 scopus 로고    scopus 로고
    • Device polling support for freeBSD
    • L. Rizzo, "Device Polling support for FreeBSD," the EuroBSDCon 2001.
    • (2001) The EuroBSDCon
    • Rizzo, L.1
  • 28
    • 38049136694 scopus 로고    scopus 로고
    • Packet capture in 10-gigabit ethernet environments using contemporary commodity hardware
    • F. Schneider, J. Wallerich, and A. Feldmann, "Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware," LNCS 4427, pp207-217, 2007.
    • (2007) LNCS , vol.4427 , pp. 207-217
    • Schneider, F.1    Wallerich, J.2    Feldmann, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.