메뉴 건너뛰기




Volumn 5, Issue 3-4, 2012, Pages 154-174

Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems

Author keywords

Industrial control systems; Mitigation; Vulnerabilities; Wireless communications

Indexed keywords

CYBER SECURITY; DEFENSE INDUSTRIAL BASE; IEEE 802.11S; IEEE 802.15.4; INDUSTRIAL CONTROL SYSTEMS; MITIGATION; POTENTIAL VECTORS; RADIO TECHNOLOGIES; SHORT-RANGE WIRELESS COMMUNICATIONS; VULNERABILITIES; WATER SECTOR; WIRED COMMUNICATION; WIRELESS COMMUNICATIONS; WIRELESSHART;

EID: 84870338599     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2012.10.001     Document Type: Article
Times cited : (29)

References (56)
  • 7
    • 84871174221 scopus 로고    scopus 로고
    • A practical message falsification attack on WPA, Presented at the Joint Workshop on Information Security, 〈〉
    • T. Ohigashi, M. Morii, A practical message falsification attack on WPA, Presented at the Joint Workshop on Information Security, 2009 〈〉. http://jwis2009.nsysu.edu.tw/location/paper/A%20Practical%20Message%20Falsification%20Attack%20on%20WPA.pdf.
    • (2009)
    • Ohigashi, T.1    Morii, M.2
  • 8
    • 84871143058 scopus 로고    scopus 로고
    • 802.11 Attacks, Version 1.0, White Paper, Foundstone Professional Services, McAfee, Santa Clara, California, 〈〉
    • B. Antoniewicz, 802.11 Attacks, Version 1.0, White Paper, Foundstone Professional Services, McAfee, Santa Clara, California, 〈〉. http://www.mcafee.com/us/resources/white-papers/foundstone/wp-80211-attacks.pdf.
    • Antoniewicz, B.1
  • 9
    • 33645849314 scopus 로고    scopus 로고
    • Wi-Fi Net News 〈〉, (accessed 4.11.03).
    • R. Moskowitz, Weakness in passphrase choice in WPA interface, Wi-Fi Net News 〈〉, 2003 (accessed 4.11.03). http://wifinetnews.com/archives/2003/11/weakness_in_passphrase_choice_in_wpa_interface.html.
    • (2003) Weakness in passphrase choice in WPA interface
    • Moskowitz, R.1
  • 10
    • 84871174984 scopus 로고    scopus 로고
    • WPA too! Presented at DEF CON 18, 〈〉
    • M. Ahmad, WPA too! Presented at DEF CON 18, 2010 〈〉. http://www.defcon.org/images/defcon-18/dc-18-presentations/Ahmad/DEFCON-18-Ahmad-WPA-Too-WP.pdf.
    • (2010)
    • Ahmad, M.1
  • 12
    • 84871140261 scopus 로고    scopus 로고
    • Rogue AP 101 - Threat, detection and defense, Presented at the Black Hat Federal Conference, 〈〉
    • Beetle, B. Potter, Rogue AP 101 - Threat, detection and defense, Presented at the Black Hat Federal Conference, 2003 〈〉. http://www.blackhat.com/presentations/bh-federal-03/bh-fed-03-beetle/bh-fed-03-beetle-up.pdf.
    • (2003)
    • Potter, B.B.1
  • 13
    • 84871167947 scopus 로고    scopus 로고
    • PEAP: Pwned extensible authentication protocol, Presented at ShmooCon 2008 〈〉
    • J. Wright, B. Antoniewicz, PEAP: Pwned extensible authentication protocol, Presented at ShmooCon 2008, 2008 〈〉. http://www.willhackforsushi.com/presentations/PEAP_Shmoocon2008_Wright_Antoniewicz.pdf.
    • (2008)
    • Wright, J.1    Antoniewicz, B.2
  • 14
    • 84871145245 scopus 로고    scopus 로고
    • Asleap, Will Hack for SUSHI, 〈〉
    • J. Wright, Asleap, Will Hack for SUSHI, 2008 〈〉. http://www.willhackforsushi.com/?page_id=41.
    • (2008)
    • Wright, J.1
  • 15
    • 84871147433 scopus 로고    scopus 로고
    • eapmd5pass, Will Hack for SUSHI, 〈〉
    • J. Wright, eapmd5pass, Will Hack for SUSHI, 2008 〈〉. http://www.willhackforsushi.com/?page_id=67.
    • (2008)
    • Wright, J.1
  • 18
    • 84871112511 scopus 로고    scopus 로고
    • U.S. Computer Emergency Readiness Team, IEEE 802.11 wireless network protocol DSSS CCA algorithm vulnerable to denial of service, Vulnerability Note VU#106678, Department of Homeland Security, Washington, DC, 〈〉
    • U.S. Computer Emergency Readiness Team, IEEE 802.11 wireless network protocol DSSS CCA algorithm vulnerable to denial of service, Vulnerability Note VU#106678, Department of Homeland Security, Washington, DC, 2004 〈〉. http://www.kb.cert.org/vuls/id/106678.
    • (2004)
  • 20
    • 82155180812 scopus 로고    scopus 로고
    • Jamming and interference induced denial of service attacks on IEEE 802.15.4 based wireless networks
    • Digital Bond Press, Sunrise, Florida
    • J. Brodsky, A. McConnell, Jamming and interference induced denial of service attacks on IEEE 802.15.4 based wireless networks, in: Proceedings of the SCADA Security Scientific Symposium, Digital Bond Press, Sunrise, Florida, 2009.
    • (2009) Proceedings of the SCADA Security Scientific Symposium
    • Brodsky, J.1    McConnell, A.2
  • 25
    • 84871132282 scopus 로고    scopus 로고
    • Daintree Networks, Getting Started with ZigBee and IEEE 802.15.4, Mountain View, California, 〈〉
    • Daintree Networks, Getting Started with ZigBee and IEEE 802.15.4, Mountain View, California, 2008 〈〉. http://www.daintree.net/downloads/whitepapers/zigbee_primer.pdf.
    • (2008)
  • 26
    • 84870367577 scopus 로고    scopus 로고
    • ZigBee Alliance, ZigBee Specification, Zigbee Alliance Standard 053 474r17, San Ramon, California
    • ZigBee Alliance, ZigBee Specification, Zigbee Alliance Standard 053 474r17, San Ramon, California, 2008.
    • (2008)
  • 29
    • 65249164328 scopus 로고    scopus 로고
    • Presented at the INESC Seminario da Rede Tematica de Comunicacoes Moveis, 〈〉
    • R. Silva, S. Nunes, Security issues on Zigbee, Presented at the INESC Seminario da Rede Tematica de Comunicacoes Moveis, 2005 〈〉. http://telecom.inescporto.pt/fileadmin/rtcm/WorkShop_22_Jul_05/s2_Security_Issues_on_ZigBee.pdf.
    • (2005) Security issues on Zigbee
    • Silva, R.1    Nunes, S.2
  • 31
    • 72449158666 scopus 로고    scopus 로고
    • Discovery, infiltration, and denial of service in a process control system wireless network
    • B. Reaves, T. Morris, Discovery, infiltration, and denial of service in a process control system wireless network, in: Proceedings of the eCrime Researchers Summit, 2009.
    • (2009) Proceedings of the eCrime Researchers Summit
    • Reaves, B.1    Morris, T.2
  • 32
    • 84871176244 scopus 로고    scopus 로고
    • connectBlue, Malmo, Sweden, 〈〉
    • M. Andersson, Wireless technologies for industrial applications, connectBlue, Malmo, Sweden, 2001 〈〉. http://www.connectblue.com/fileadmin/Connectblue/Web2006/Documents/White_papers/Industrial_Bluetooth.pdf.
    • (2001) Wireless technologies for industrial applications
    • Andersson, M.1
  • 33
    • 84870365361 scopus 로고    scopus 로고
    • Evaluation of the Current State of Bluetooth Security, Licentiate Thesis, University of Kuopio, Kuopio, Finland
    • K. Haataja, Evaluation of the Current State of Bluetooth Security, Licentiate Thesis, Department of Computer Science, University of Kuopio, Kuopio, Finland, 2007.
    • (2007) Department of Computer Science
    • Haataja, K.1
  • 34
    • 84871116065 scopus 로고    scopus 로고
    • Bluetooth hacking revisited, Presented at the Twenty-Third Chaos Communication Congress, 〈〉
    • K. Finistere, T. Zoller, Bluetooth hacking revisited, Presented at the Twenty-Third Chaos Communication Congress, 2006 〈〉. http://www.nruns.com/_downloads/23C3-Berlin-Bluetooth-Hacking-Revisited-Thierry-Zoller.pdf.
    • (2006)
    • Finistere, K.1    Zoller, T.2
  • 35
    • 84871139754 scopus 로고    scopus 로고
    • Trifinite Group, Long distance snarfing, 〈〉
    • Trifinite Group, Long distance snarfing, 2006 〈〉. http://trifinite.org/trifinite_stuff_lds.html.
    • (2006)
  • 37
    • 84871165805 scopus 로고    scopus 로고
    • n.runs, BTCrack - bluetooth PIN cracker 〈〉.
    • n.runs, BTCrack - bluetooth PIN cracker 〈〉. http://secdev.zoller.lu/btcrack.zip.
  • 40
    • 84871134190 scopus 로고    scopus 로고
    • MaxStream, MaxStream extends ZigBee range up to 40 miles, Digi International, Minnetonka, Minnesota 〈〉, (accessed 25.10.06)
    • MaxStream, MaxStream extends ZigBee range up to 40 miles, Digi International, Minnetonka, Minnesota 〈〉, 2006 (accessed 25.10.06). http://www.digi.com/news/pressrelease?prid=275.
    • (2006)
  • 41
    • 62849096292 scopus 로고    scopus 로고
    • Discovering vulnerabilities in control system human-machine interface software
    • McGrew R., Vaughn R. Discovering vulnerabilities in control system human-machine interface software. Journal of Systems and Software 2009, 82(4):583-589.
    • (2009) Journal of Systems and Software , vol.82 , Issue.4 , pp. 583-589
    • McGrew, R.1    Vaughn, R.2
  • 44
    • 84902345608 scopus 로고    scopus 로고
    • Lessons learned from the Maroochy water breach
    • Springer, Boston, Massachusetts, E. Goetz, S. Shenoi (Eds.)
    • Slay J., Miller M. Lessons learned from the Maroochy water breach. Critical Infrastructure Protection 2008, 73-82. Springer, Boston, Massachusetts. E. Goetz, S. Shenoi (Eds.).
    • (2008) Critical Infrastructure Protection , pp. 73-82
    • Slay, J.1    Miller, M.2
  • 46
    • 77952043216 scopus 로고    scopus 로고
    • Presented at DEF CON 16, 〈〉
    • M. Bristow, ModScan: a SCADA Modbus network scanner, Presented at DEF CON 16, 2008 〈〉. http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-bristow.pdf.
    • (2008) ModScan: a SCADA Modbus network scanner
    • Bristow, M.1
  • 49
    • 79960432406 scopus 로고    scopus 로고
    • Hacking techniques in wireless networks
    • Wiley, Chichester
    • Mateti P. Hacking techniques in wireless networks. The Handbook of Information Security 2005, vol. III:83-93. Wiley, Chichester.
    • (2005) The Handbook of Information Security , vol.3 , pp. 83-93
    • Mateti, P.1
  • 51
    • 84891808534 scopus 로고    scopus 로고
    • Design and implementation of a secure Modbus protocol
    • Springer, Heidelberg, C. Palmer, S. Shenoi (Eds.)
    • Fovino I., Carcano A., Masera M., Trombetta A. Design and implementation of a secure Modbus protocol. Critical Infrastructure Protection III 2009, 83-96. Springer, Heidelberg. C. Palmer, S. Shenoi (Eds.).
    • (2009) Critical Infrastructure Protection III , pp. 83-96
    • Fovino, I.1    Carcano, A.2    Masera, M.3    Trombetta, A.4
  • 52
    • 84155171697 scopus 로고    scopus 로고
    • DNPSec. distributed network protocol version 3 (DNP3) security framework
    • Springer, Dordrecht, K. Elleithy, T. Sobh, A. Mahmood, M. Iskander, M. Karim (Eds.)
    • Majdalawieh M., Parisi-Presicce F., Wijesekera D. DNPSec. distributed network protocol version 3 (DNP3) security framework. Advances in Computer, Information and Systems Sciences, and Engineering 2007, 227-234. Springer, Dordrecht. K. Elleithy, T. Sobh, A. Mahmood, M. Iskander, M. Karim (Eds.).
    • (2007) Advances in Computer, Information and Systems Sciences, and Engineering , pp. 227-234
    • Majdalawieh, M.1    Parisi-Presicce, F.2    Wijesekera, D.3
  • 53
    • 84870378094 scopus 로고    scopus 로고
    • International Electrotechnical Commission, Power Systems Management and Associated Information Exchange - Data and Communications Security, Technical Specification IEC TS 62351, Geneva, Switzerland
    • International Electrotechnical Commission, Power Systems Management and Associated Information Exchange - Data and Communications Security, Technical Specification IEC TS 62351, Geneva, Switzerland, 2007.
    • (2007)
  • 55
    • 62349103379 scopus 로고    scopus 로고
    • Symantec, Mountain, View, California, 〈〉
    • J. Farshchi, Wireless intrusion detection systems, Symantec, Mountain, View, California, 2003 〈〉. http://www.symantec.com/connect/articles/wireless-intrusion-detection-systems.
    • (2003) Wireless intrusion detection systems
    • Farshchi, J.1
  • 56
    • 36849062699 scopus 로고    scopus 로고
    • Intrusion detection techniques in mobile ad hoc and wireless sensor networks
    • Sun B., Osborne L., Xiao Y., Guizani S. Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications 2007, 14(5):56-63.
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 56-63
    • Sun, B.1    Osborne, L.2    Xiao, Y.3    Guizani, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.