메뉴 건너뛰기




Volumn 6, Issue 1, 2011, Pages 59-78

SSCADA: Securing SCADA infrastructure communications

Author keywords

Critical infrastructure protection; Cyber attacks; DCS; Distributed control systems; SCADA; Secure communication; Smart grid security; Supervisory control and data acquisition

Indexed keywords

COMPUTER CRIME; CRITICAL INFRASTRUCTURES; CRYPTOGRAPHY; DISTRIBUTED PARAMETER CONTROL SYSTEMS; ELECTRIC POWER TRANSMISSION NETWORKS; ENERGY EFFICIENCY; NETWORK SECURITY; PUBLIC WORKS; REMOTE CONTROL; SECURE COMMUNICATION; SOFTWARE TESTING; WAGES;

EID: 84871951474     PISSN: 17543916     EISSN: 17543924     Source Type: Journal    
DOI: 10.1504/IJCNDS.2011.037328     Document Type: Article
Times cited : (19)

References (34)
  • 3
    • 35048896647 scopus 로고    scopus 로고
    • AGA Report No. 12 Draft 2, 5 February 2004, The draft 2 is no longer available online, The draft 3 is available for purchase (accessed on 22 February 2010)
    • AGA Report No. 12 (2004) 'Cryptographic protection of SCADA communications: general recommendations', Draft 2, 5 February 2004, The draft 2 is no longer available online, The draft 3 is available for purchase at http://www.aga.org/ (accessed on 22 February 2010).
    • (2004) Cryptographic Protection of SCADA Communications: General Recommendations
  • 6
    • 3042683432 scopus 로고    scopus 로고
    • Message authentication using hash functions - The HMAC construction
    • Spring
    • Bellare, M., Canetti, R. and Krawczyk, H. (1996) 'Message authentication using hash functions - the HMAC construction', RSA Laboratories CryptoBytes, Spring, Vol. 2, No. 1.
    • (1996) RSA Laboratories CryptoBytes , vol.2 , Issue.1
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 7
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Bellare, M., Kilian, J. and Rogaway, P. (2000) 'The security of the cipher block chaining message authentication code', Journal of Computer and System Sciences, Vol. 6, No. 3, pp. 362-399.
    • (2000) Journal of Computer and System Sciences , vol.6 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 9
    • 0034513710 scopus 로고    scopus 로고
    • Individual single source authentication on the mbone
    • August
    • Bergadano, F., Cavagnino, D. and Crispo, B. (2000b) 'Individual single source authentication on the mbone', ICME 2000, August, pp. 541-544.
    • (2000) ICME 2000 , pp. 541-544
    • Bergadano, F.1    Cavagnino, D.2    Crispo, B.3
  • 10
    • 17044435613 scopus 로고    scopus 로고
    • Dissertation could be security threat
    • (accessed on 22 February 2010)
    • Blumenfeld, L. (2003) 'Dissertation could be security threat', Washington Post, available at http://www.washingtonpost.com/ac2/wp-dyn/A23689-2003Jul7 (accessed on 22 February 2010).
    • (2003) Washington Post
    • Blumenfeld, L.1
  • 11
  • 16
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich, O., Goldwasser, S. and Micali, S. (1987) 'How to construct random functions', J. of the ACM, Vol. 33, No. 4, pp. 792-807.
    • (1987) J. of the ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 18
    • 0003224934 scopus 로고
    • The S/KEY one-time password system
    • February
    • Haller, N. (1995) 'The S/KEY one-time password system', IETF RFC 1760, February.
    • (1995) IETF RFC 1760
    • Haller, N.1
  • 19
    • 84884568964 scopus 로고    scopus 로고
    • (accessed on 22 February 2010)
    • Idaho National Laboratory (2008) 'SCADA test bed program', available at http://www.inl.gov/scada/ (accessed on 22 February 2010).
    • (2008) SCADA Test Bed Program
  • 20
    • 84884568967 scopus 로고    scopus 로고
    • IEC 608705 (accessed on 22 February 2010)
    • IEC 608705, 'User group maillist information', available at http://www.trianglemicroworks.com/iec60870-5/index.htm (accessed on 22 February 2010).
    • User Group Maillist Information
  • 21
    • 84884552342 scopus 로고    scopus 로고
    • (accessed on 22 February 2010)
    • IEC TC57, available at http://www.ieee.org/portal/cms-docs-pes/pes/ subpages/publications-folder/TC-57-Column.pdf (accessed on 22 February 2010).
    • IEC TC57
  • 24
  • 25
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L. (1981) 'Password authentication with insecure communication', Commun. ACM, Vol. 24, No. 11.
    • (1981) Commun. ACM , vol.24 , Issue.11
    • Lamport, L.1
  • 27
    • 84884536975 scopus 로고    scopus 로고
    • (accessed on 22 February 2010)
    • NIST (2008) 'Industrial control system security (ICS)', available at http://csrc.nist.gov/groups/SMA/fisma/ics/index.html (accessed on 22 February 2010).
    • (2008) Industrial Control System Security (ICS)
  • 32
    • 84884549128 scopus 로고    scopus 로고
    • SCADAsafe, available at http://scadasafe.sourceforge.net.
  • 33
    • 84884551582 scopus 로고    scopus 로고
    • (accessed on 31 May 2010)
    • USA Today (2007) 'AURORA case: US video shows hacker hit on power grid', available at http://www.usatoday.com/tech/news/computersecurity/2007-09-27- hacker-video-N.htm (accessed on 31 May 2010).
    • (2007) AURORA Case: US Video Shows Hacker Hit on Power Grid


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.