메뉴 건너뛰기




Volumn 57, Issue 11, 2010, Pages 3622-3630

Security in building automation systems

Author keywords

Building automation; embedded networks; integration; security

Indexed keywords

BUILDING AUTOMATION; BUILDING AUTOMATION SYSTEMS; CONTROL APPLICATIONS; EMBEDDED NETWORK; SECURE COMMUNICATIONS; SECURE EXECUTION; SECURITY; SECURITY IN BUILDINGS; SECURITY MECHANISM; SECURITY THREATS;

EID: 77956599919     PISSN: 02780046     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIE.2009.2036033     Document Type: Article
Times cited : (106)

References (41)
  • 1
    • 21644438416 scopus 로고    scopus 로고
    • Communication systems for building automation and control
    • Jun
    • W. Kastner, G. Neugschwandtner, S. Soucek, and H. M. Newman, "Communication systems for building automation and control", Proc. IEEE, vol. 93, no. 6, pp. 1178-1203, Jun. 2005.
    • (2005) Proc. IEEE , vol.93 , Issue.6 , pp. 1178-1203
    • Kastner, W.1    Neugschwandtner, G.2    Soucek, S.3    Newman, H.M.4
  • 2
    • 10444250021 scopus 로고    scopus 로고
    • Life safety and security systems
    • Weinheim, Germany: Wiley-VCH
    • M. Thuillard, P. Ryser, and G. Pfister, "Life safety and security systems", in Sensors in Intelligent Buildings, vol. 2. Weinheim, Germany: Wiley-VCH, 2001, pp. 307-397.
    • (2001) Sensors in Intelligent Buildings , vol.2 , pp. 307-397
    • Thuillard, M.1    Ryser, P.2    Pfister, G.3
  • 3
    • 47849131182 scopus 로고    scopus 로고
    • Common approach to functional safety and system security in building automation and control systems
    • T. Novak, A. Treytl, and P. Palensky, "Common approach to functional safety and system security in building automation and control systems", in Proc. IEEE Int. Conf. Emerging Technol. Factory Autom., 2007, pp. 1141-1148.
    • (2007) Proc. IEEE Int. Conf. Emerging Technol. Factory Autom. , pp. 1141-1148
    • Novak, T.1    Treytl, A.2    Palensky, P.3
  • 8
    • 70349619163 scopus 로고    scopus 로고
    • Industrial wireless sensor networks: Challenges, design principles, and technical approaches
    • Oct
    • V. Gungor and G. Hancke, "Industrial wireless sensor networks: Challenges, design principles, and technical approaches", IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258-4265, Oct. 2009.
    • (2009) IEEE Trans. Ind. Electron. , vol.56 , Issue.10 , pp. 4258-4265
    • Gungor, V.1    Hancke, G.2
  • 11
    • 21644434346 scopus 로고    scopus 로고
    • Konnex Assoc., Diegem, Belgium, Ver. 2.0
    • KNX Specification, Konnex Assoc., Diegem, Belgium, 2009, Ver. 2.0.
    • (2009) KNX Specification
  • 13
    • 54849429055 scopus 로고    scopus 로고
    • ZigBee Alliance, San Ramon, CA
    • ZigBee Specification 2007, ZigBee Alliance, San Ramon, CA, 2007.
    • (2007) ZigBee Specification 2007
  • 15
    • 77958008993 scopus 로고    scopus 로고
    • ANSI/ASHRAE Addendum 135-2008 g: May, Status: 5th public review. Online. Available
    • ANSI/ASHRAE Addendum 135-2008 g: Updating BACnet Network Security, May 2010, Status: 5th public review. [Online]. Available: http://bacnet.org/Addenda/ index.html
    • (2010) Updating BACnet Network Security
  • 19
    • 31444441499 scopus 로고    scopus 로고
    • Elliptic curve cryptography engineering
    • Feb
    • A. Cilardo, L. Coppolino, N. Mazzocca, and L. Romano, "Elliptic curve cryptography engineering", Proc. IEEE, vol. 943, no. 2, pp. 395-406, Feb. 2006.
    • (2006) Proc. IEEE , vol.943 , Issue.2 , pp. 395-406
    • Cilardo, A.1    Coppolino, L.2    Mazzocca, N.3    Romano, L.4
  • 20
    • 33645091897 scopus 로고    scopus 로고
    • Sizzle: A standards-based end-to-end security architecture for the embedded Internet
    • Dec
    • V. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle, and S. C. Shantz, "Sizzle: A standards-based end-to-end security architecture for the embedded Internet", Pervasive Mobile Comput., vol. 1, no. 4, pp. 425-445, Dec. 2005.
    • (2005) Pervasive Mobile Comput. , vol.1 , Issue.4 , pp. 425-445
    • Gupta, V.1    Wurm, M.2    Zhu, Y.3    Millard, M.4    Fung, S.5    Gura, N.6    Eberle, H.7    Shantz, S.C.8
  • 21
    • 62549133356 scopus 로고    scopus 로고
    • Robust and efficient passwordauthenticated key agreement using smart cards
    • Jun
    • W.-S. Juang, S.-T. Chen, and H.-T. Liaw, "Robust and efficient passwordauthenticated key agreement using smart cards", IEEE Trans. Ind. Electron., vol. 55, no. 6, pp. 2551-2556, Jun. 2008.
    • (2008) IEEE Trans. Ind. Electron. , vol.55 , Issue.6 , pp. 2551-2556
    • Juang, W.-S.1    Chen, S.-T.2    Liaw, H.-T.3
  • 22
    • 56349147514 scopus 로고    scopus 로고
    • Key set management in networked building automation systems using multiple key servers
    • W. Granzer, C. Reinisch, and W. Kastner, "Key set management in networked building automation systems using multiple key servers", in Proc. IEEE Int. Workshop Factory Commun. Syst., 2008, pp. 205-214.
    • (2008) Proc. IEEE Int. Workshop Factory Commun. Syst. , pp. 205-214
    • Granzer, W.1    Reinisch, C.2    Kastner, W.3
  • 28
    • 77957992139 scopus 로고    scopus 로고
    • A tutorial on physical security and sidechannel attacks
    • Berlin, Germany: Springer-Verlag, Sep
    • F. Koeune and F.-X. Standaert, "A tutorial on physical security and sidechannel attacks", in Foundations of Security Analysis and Design III. Berlin, Germany: Springer-Verlag, Sep. 2005, pp. 78-108.
    • (2005) Foundations of Security Analysis and Design III , pp. 78-108
    • Koeune, F.1    Standaert, F.-X.2
  • 29
    • 10944267118 scopus 로고    scopus 로고
    • Static analysis for security
    • Nov
    • B. Chess and G. McGraw, "Static analysis for security", IEEE Security Privacy, vol. 2, no. 6, pp. 76-79, Nov. 2004.
    • (2004) IEEE Security Privacy , vol.2 , Issue.6 , pp. 76-79
    • Chess, B.1    McGraw, G.2
  • 35
    • 33846644420 scopus 로고    scopus 로고
    • Hardware-assisted run-time monitoring for secure program execution on embedded processors
    • Dec
    • D. Arora, S. Ravi, A. Raghunathan, and N. K. Jha, "Hardware-assisted run-time monitoring for secure program execution on embedded processors", IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 14, no. 12, pp. 1295-1308, Dec. 2006.
    • (2006) IEEE Trans. Very Large Scale Integr. (VLSI) Syst. , vol.14 , Issue.12 , pp. 1295-1308
    • Arora, D.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 36
    • 38749115957 scopus 로고    scopus 로고
    • Towards scalable and secure execution platform for embedded systems
    • I. Hiroaki, M. Edahiro, and J. Sakai, "Towards scalable and secure execution platform for embedded systems", in Proc. Des. Autom. Conf., 2007, pp. 350-354.
    • (2007) Proc. Des. Autom. Conf. , pp. 350-354
    • Hiroaki, I.1    Edahiro, M.2    Sakai, J.3
  • 37
    • 0027029758 scopus 로고
    • Undecidability of static analysis
    • dec
    • W. Landi, "Undecidability of static analysis", ACM Lett. Program. Lang. Syst., vol. 1, no. 4, pp. 323-337, Dec. 1992.
    • (1992) ACM Lett. Program. Lang. Syst. , vol.1 , Issue.4 , pp. 323-337
    • Landi, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.