메뉴 건너뛰기




Volumn 9, Issue 1, 2013, Pages 277-293

Review of security issues in industrial networks

Author keywords

Industrial networks; information security; network security; risk assessment; security analysis and monitoring; security countermeasures

Indexed keywords

CLASSICAL APPROACH; CURRENT SITUATION; CYBER THREATS; DISTRIBUTED COMPUTING SYSTEMS; DISTRIBUTED INFORMATION; INDUSTRIAL COMPUTERS; INDUSTRIAL NETWORKS; INDUSTRIAL SYSTEMS; KEY ELEMENTS; PHYSICAL SYSTEMS; SATISFACTORY DEGREE; SECURITY ANALYSIS; SECURITY COUNTERMEASURES; SECURITY ISSUES; SECURITY POINT; SECURITY RISKS; STATE OF THE ART; SYSTEM CHARACTERISTICS;

EID: 84871964962     PISSN: 15513203     EISSN: None     Source Type: Journal    
DOI: 10.1109/TII.2012.2198666     Document Type: Article
Times cited : (301)

References (105)
  • 3
    • 21644440888 scopus 로고    scopus 로고
    • Security for industrial control systems
    • Jun
    • D. Dzung, M. Naedele, T. P. von Hoff, and M. Crevatin, "Security for industrial control systems," Proc. IEEE, vol. 93, no. 6, pp. 1152-1177, Jun. 2005.
    • (2005) Proc. IEEE , vol.93 , Issue.6 , pp. 1152-1177
    • Dzung, D.1    Naedele, M.2    Von Hoff, T.P.3    Crevatin, M.4
  • 4
    • 77954005795 scopus 로고    scopus 로고
    • Cyber security and power system communication-Essential parts of a smart grid infrastructure
    • Aug.
    • G. N. Ericsson, "Cyber security and power system communication-Essential parts of a smart grid infrastructure," IEEE Trans. Power Del., vol. 25, no. 3, pp. 1501-1507, Aug. 2010.
    • (2010) IEEE Trans. Power Del , vol.25 , Issue.3 , pp. 1501-1507
    • Ericsson, G.N.1
  • 5
    • 78650891506 scopus 로고    scopus 로고
    • Cybersecurity myths on power control systems: 21 misconceptions and false beliefs
    • Feb.
    • L. Piètre-Cambacédès, M. Tritschler, and G. N. Ericsson, "Cybersecurity myths on power control systems: 21 misconceptions and false beliefs," IEEE Trans. Power Del., vol. 26, no. 1, pp. 161-172, Feb. 2011.
    • (2011) IEEE Trans. Power Del , vol.26 , Issue.1 , pp. 161-172
    • Piètre-Cambacédès, L.1    Tritschler, M.2    Ericsson, G.N.3
  • 7
    • 84871949415 scopus 로고    scopus 로고
    • Reliability Standards-CIP (Critical Infrastructure Protection) NERC (North American Electric Reliability Corp
    • "Reliability Standards-CIP (Critical Infrastructure Protection)," NERC (North American Electric Reliability Corp.).
  • 8
    • 58849106722 scopus 로고    scopus 로고
    • Vulnerability assessment for critical infrastructure control systems
    • R. C. Parks and E. Rogers, "Vulnerability assessment for critical infrastructure control systems," IEEE Security Privacy, vol. 6, no. 6, pp. 37-43, 2008.
    • (2008) IEEE Security Privacy , vol.6 , Issue.6 , pp. 37-43
    • Parks, R.C.1    Rogers, E.2
  • 9
    • 84871988584 scopus 로고    scopus 로고
    • AGA 12 Part 1-Cryptographic Protection of SCADA Communications Part 1: Background Policies and Test Plan
    • "AGA 12 Part 1-Cryptographic Protection of SCADA Communications Part 1: Background, Policies and Test Plan," Amer. Gas Assoc., 2006.
    • (2006) Amer. Gas Assoc
  • 10
    • 84871990860 scopus 로고    scopus 로고
    • AGA 12 Part 2-Performance test plan
    • "AGA 12 Part 2-Performance Test Plan," Amer. Gas Assoc., 2006.
    • (2006) Amer. Gas Assoc
  • 11
    • 84871970675 scopus 로고    scopus 로고
    • "Electronic Records; Electronic Signatures (21CFR11). Code of Federal Regulations, Title 21, Volume 1 Part 11," U.S. Food & Drug Admin.-Dept. of Health & Human Services, 2001
    • "Electronic Records; Electronic Signatures (21CFR11). Code of Federal Regulations, Title 21, Volume 1 Part 11," U.S. Food & Drug Admin.-Dept. of Health & Human Services, 2001.
  • 26
    • 67650711721 scopus 로고    scopus 로고
    • Information security for electric power utilities (EPUs)-CIGRé Developments on frameworks, risk assessment, technology
    • Aug
    • G. N. Ericsson, "Information security for electric power utilities (EPUs)-CIGRé Developments on frameworks, risk assessment, technology," IEEE Trans. Power Del., vol. 24, no. 3, pp. 1174-1181, Aug. 2009.
    • (2009) IEEE Trans. Power Del , vol.24 , Issue.3 , pp. 1174-1181
    • Ericsson, G.N.1
  • 27
    • 54049149494 scopus 로고    scopus 로고
    • Toward a framework for managing information security for an electric power utility-CIGRé experiences
    • Aug
    • G. N. Ericsson, "Toward a framework for managing information security for an electric power utility-CIGRé experiences," IEEE Trans. Power Del., vol. 22, no. 3, pp. 1461-1469, Aug. 2007.
    • (2007) IEEE Trans. Power Del , vol.22 , Issue.3 , pp. 1461-1469
    • Ericsson, G.N.1
  • 28
    • 77649186560 scopus 로고    scopus 로고
    • Assessing risk from intelligent attacks: A perspective on approaches
    • S. D. Guikema and T. Aven, "Assessing risk from intelligent attacks: A perspective on approaches," Reliabil. Eng. Syst. Safety, vol. 95, no. 5, pp. 478-483, 2010.
    • (2010) Reliabil. Eng. Syst. Safety , vol.95 , Issue.5 , pp. 478-483
    • Guikema, S.D.1    Aven, T.2
  • 29
    • 33846336460 scopus 로고    scopus 로고
    • A unified framework for risk and vulnerability analysis covering both safety and security
    • DOI 10.1016/j.ress.2006.03.008, PII S095183200600086X
    • T. Aven, "A unified framework for risk and vulnerability analysis covering both safety and security," Reliabil. Eng. Syst. Safety, vol. 92, no. 6, pp. 745-754, 2007. (Pubitemid 46135958)
    • (2007) Reliability Engineering and System Safety , vol.92 , Issue.6 , pp. 745-754
    • Aven, T.1
  • 30
    • 39449094965 scopus 로고    scopus 로고
    • Bulk power risk analysis: Ranking infrastructure elements according to their risk significance
    • DOI 10.1016/j.ijepes.2007.06.013, PII S0142061507000907
    • A. M. Koonce, G. E. Apostolakis, and B. K. Cook, "Bulk power risk analysis: Ranking infrastructure elements according to their risk significance," Int. J. Electr. Power Energy Syst., vol. 30, no. 3, pp. 169-183, 2008. (Pubitemid 351273806)
    • (2008) International Journal of Electrical Power and Energy Systems , vol.30 , Issue.3 , pp. 169-183
    • Koonce, A.M.1    Apostolakis, G.E.2    Cook, B.K.3
  • 31
    • 70449638991 scopus 로고    scopus 로고
    • Evaluating the risk of cyber attacks on SCADA systems via Petri net analysis with application to hazardous liquid loading operations
    • M. H. Henry, R. M. Layer,K. Z. Snow, and D. R. Zaret, "Evaluating the risk of cyber attacks on SCADA systems via Petri net analysis with application to hazardous liquid loading operations," in Proc. IEEE Conf. Technol. for Homeland Security, 2009, pp. 607-614.
    • (2009) Proc. IEEE Conf. Technol. for Homeland Security , pp. 607-614
    • Henry, M.H.1    Layerk. Z Snow, R.M.2    Zaret, D.R.3
  • 32
    • 0035696915 scopus 로고    scopus 로고
    • Identifying, understanding, and analyzing critical infrastructure interdependencies
    • DOI 10.1109/37.969131
    • S. M. Rinaldi, J. P. Peerenboom, and T. K. Kelly, "Identifying, understanding, analyzing critical infrastructure interdependencies," IEEE Control Syst. Mag., vol. 21, no. 6, pp. 11-25, 2001. (Pubitemid 34092056)
    • (2001) IEEE Control Systems Magazine , vol.21 , Issue.6 , pp. 11-25
    • Rinaldi, S.M.1    Peerenboom, J.P.2    Kelly, T.K.3
  • 33
    • 34249711301 scopus 로고    scopus 로고
    • Connectivity models of interdependency in mixed-type critical infrastructure networks
    • DOI 10.1016/j.istr.2007.02.005, PII S1363412707000076
    • N. K. Svendsen and S. D.Wolthusen, "Connectivity models of interdependency in mixed-type critical infrastructure networks," Inf. Security Tech. Rep., vol. 12, no. 1, pp. 44-55, 2007. (Pubitemid 46829997)
    • (2007) Information Security Technical Report , vol.12 , Issue.1 , pp. 44-55
    • Svendsen, N.K.1    Wolthusen, S.D.2
  • 34
    • 49949089091 scopus 로고    scopus 로고
    • Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools
    • W. Kröger, "Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools," Reliabil. Eng. Syst. Safety, vol. 93, no. 12, pp. 1781-1787, 2008.
    • (2008) Reliabil. Eng. Syst. Safety , vol.93 , Issue.12 , pp. 1781-1787
    • Kröger, W.1
  • 35
    • 79952192413 scopus 로고    scopus 로고
    • Modeling interdependent network systems for identifying cascade-safe operating margins
    • Feb.
    • E. Zio and G. Sansavini, "Modeling interdependent network systems for identifying cascade-safe operating margins," IEEE Trans. Reliabil., vol. 60, no. 1, pp. 94-101, Feb. 2011.
    • (2011) IEEE Trans. Reliabil , vol.60 , Issue.1 , pp. 94-101
    • Zio, E.1    Sansavini, G.2
  • 36
    • 64649085998 scopus 로고    scopus 로고
    • A methodological approach to analyze vulnerability of interdependent infrastructures
    • M. Ouyang, L. Hong, Z.-J. Mao, M.-H. Yu, and F. Qi, "A methodological approach to analyze vulnerability of interdependent infrastructures," Simulation Modelling Practice and Theory, vol. 17, no. 5, pp. 817-828, 2009.
    • (2009) Simulation Modelling Practice and Theory , vol.17 , Issue.5 , pp. 817-828
    • Ouyang, M.1    Hong, L.2    Mao, Z.-J.3    Yu, M.-H.4    Qi, F.5
  • 37
    • 69849110524 scopus 로고    scopus 로고
    • Tools for local critical infrastructure protection: Computational support for identifying safety and security interdependencies between local critical infrastructures
    • C. W. Johnson and K. McLean, "Tools for local critical infrastructure protection: Computational support for identifying safety and security interdependencies between local critical infrastructures," in Proc. 3rd IET Int. Conf. Syst. Safety, 2008, pp. 1-6.
    • (2008) Proc. 3rd IET Int. Conf. Syst. Safety , pp. 1-6
    • Johnson, C.W.1    McLean, K.2
  • 38
    • 78651541357 scopus 로고    scopus 로고
    • A risk-assessment model for cyber attacks on information systems
    • S. Patel and J. Zaveri, "A risk-assessment model for cyber attacks on information systems," J. Comput., vol. 5, no. 3, pp. 352-359, 2010.
    • (2010) J. Comput , vol.5 , Issue.3 , pp. 352-359
    • Patel, S.1    Zaveri, J.2
  • 39
    • 34548017452 scopus 로고    scopus 로고
    • Cyber security risk assessment for SCADA and DCS networks
    • DOI 10.1016/j.isatra.2007.04.003, PII S0019057807000754
    • P. A. S. Ralston, J. H. Graham, and J. L. Hieb, "Cyber security risk assessment for SCADA and DCS networks," ISA Trans., vol. 46, no. 4, pp. 583-594, 2007. (Pubitemid 47284077)
    • (2007) ISA Transactions , vol.46 , Issue.4 , pp. 583-594
    • Ralston, P.A.S.1    Graham, J.H.2    Hieb, J.L.3
  • 40
    • 0019608535 scopus 로고
    • Hierarchical holographic modeling
    • Y. Y. Haimes, "Hierarchical holographic modeling," IEEE Trans. Syst., Man, Cybern. A, vol. 11, no. 9, pp. 606-617, 1981.
    • (1981) IEEE Trans. Syst., Man, Cybern. A , vol.11 , Issue.9 , pp. 606-617
    • Haimes, Y.Y.1
  • 41
    • 30544447844 scopus 로고    scopus 로고
    • Application of the inoperability input-output model (IIM) for systemic risk assessment and management of interdependent infrastructures
    • DOI 10.1002/sys.20037
    • K. G. Crowther and Y. Y. Haimes, "Application of the inoperability input-output model (IIM) for systemic risk assessment and management of interdependent infrastructures," Syst. Eng., vol. 8, no. 4, pp. 323-341, 2005. (Pubitemid 43081877)
    • (2005) Systems Engineering , vol.8 , Issue.4 , pp. 323-341
    • Crowther, K.G.1    Haimes, Y.Y.2
  • 44
    • 0036090498 scopus 로고    scopus 로고
    • Risk filtering, ranking, and management framework using hierarchical holographic modeling
    • DOI 10.1111/0272-4332.00020
    • Y. Y. Haimes, S. Kaplan, and J. H. Lambert, "Risk filtering, ranking, management framework using hierarchical holographic modeling," Risk Anal., vol. 22, no. 2, pp. 383-397, 2002. (Pubitemid 34533265)
    • (2002) Risk Analysis , vol.22 , Issue.2 , pp. 383-397
    • Haimes, Y.Y.1    Kaplan, S.2    Lambert, J.H.3
  • 45
    • 38949137343 scopus 로고    scopus 로고
    • Estimating a system's mean time-to-compromise
    • DOI 10.1109/MSP.2008.9
    • D. J. Leversage and E. J. Byres, "Estimating a system's mean time-to-compromise," IEEE Security Privacy, vol. 6, no. 1, pp. 52-60, 2008. (Pubitemid 351229833)
    • (2008) IEEE Security and Privacy , vol.6 , Issue.1 , pp. 52-60
    • Leversage, D.J.1    Byres, E.J.2
  • 46
    • 71649091879 scopus 로고    scopus 로고
    • Critical infrastructure dependency assessment using the input-output inoperability model
    • R. Setola, S. De Porcellinis, and M. Sforna, "Critical infrastructure dependency assessment using the input-output inoperability model," Int. J. Critical Infrastructure Protection, vol. 2, no. 4, pp. 170-178, 2009.
    • (2009) Int. J. Critical Infrastructure Protection , vol.2 , Issue.4 , pp. 170-178
    • Setola, R.1    De Porcellinis, S.2    Sforna, M.3
  • 48
    • 0022102587 scopus 로고
    • Fault tree analysis, methods, applications. A review
    • W. S. Lee, D. L. Grosh, F. A. Tillman, and C. H. Lie, "Fault tree analysis, methods, applications. A review," IEEE Trans. Reliabil., vol. REL-34, no. 3, pp. 194-203, 1985.
    • (1985) IEEE Trans. Reliabil , vol.REL-34 , Issue.3 , pp. 194-203
    • Lee, W.S.1    Grosh, D.L.2    Tillman, F.A.3    Lie, C.H.4
  • 49
    • 77953695984 scopus 로고    scopus 로고
    • Cybersecurity for critical infrastructures: Attack and defensemodeling
    • Apr.
    • C.-W. Ten, G. Manimaran, and C.-C. Liu, "Cybersecurity for critical infrastructures: Attack and defensemodeling," IEEE Trans. Syst., Man, Cybern., vol. 40, no. 4, pp. 853-865, Apr. 2010.
    • (2010) IEEE Trans. Syst., Man, Cybern , vol.40 , Issue.4 , pp. 853-865
    • Ten, C.-W.1    Manimaran, G.2    Liu, C.-C.3
  • 51
    • 0034197755 scopus 로고    scopus 로고
    • Event-tree analysis using binary decision diagrams
    • DOI 10.1109/24.877343
    • J. Andrews and S. Dunnett, "Event-tree analysis using binary decision diagrams," IEEE Trans. Rel., vol. 49, no. 2, pp. 230-238, 2000. (Pubitemid 32031222)
    • (2000) IEEE Transactions on Reliability , vol.49 , Issue.2 , pp. 230-238
    • Andrews, J.D.1    Dunnett, S.J.2
  • 52
    • 0025795697 scopus 로고
    • A unified approach to failure mode, effects and criticality analysis (FMECA)
    • B.Wei, "A unified approach to failure mode, effects and criticality analysis (FMECA)," in Proc. Annu. Symp. Reliabil. Maintainability, 1991, pp. 260-271.
    • (1991) Proc. Annu. Symp. Reliabil. Maintainability , pp. 260-271
    • Wei, B.1
  • 53
    • 51849109927 scopus 로고    scopus 로고
    • Applying F(I)MEA-technique for SCADA-based industrial control systems dependability assessment and ensuring
    • E. Babeshko, V. Kharchenko, and A. Gorbenko, "Applying F(I)MEA-technique for SCADA-based industrial control systems dependability assessment and ensuring," in Proc. 3rd Int. Conf. Dependability Comput. Syst., 2008, pp. 309-315.
    • (2008) Proc. 3rd Int. Conf. Dependability Comput. Syst , pp. 309-315
    • Babeshko, E.1    Kharchenko, V.2    Gorbenko, A.3
  • 54
    • 67349177466 scopus 로고    scopus 로고
    • Hierarchical, model-based risk management of critical infrastructures
    • F. Baiardi, C. Telmon, and D. Sgandurra, "Hierarchical, model-based risk management of critical infrastructures," Reliabil. Eng. Syst. Safety, vol. 94, no. 9, pp. 1403-1415, 2009.
    • (2009) Reliabil. Eng. Syst. Safety , vol.94 , Issue.9 , pp. 1403-1415
    • Baiardi, F.1    Telmon, C.2    Sgandurra, D.3
  • 56
    • 70549085143 scopus 로고    scopus 로고
    • Cyber security: Assessing our vulnerabilities and developing an effective defense
    • LNCS
    • E. H. Spafford, "Cyber security: Assessing our vulnerabilities and developing an effective defense," in Proc. 2nd Annu. Workshop Inf. Privacy Nat. Security, 2009, vol. 5661, LNCS, pp. 20-33.
    • (2009) Proc. 2nd Annu. Workshop Inf. Privacy Nat. Security , vol.5661 , pp. 20-33
    • Spafford, E.H.1
  • 61
    • 58849130197 scopus 로고    scopus 로고
    • Usable global network access policy for process control systems
    • D. M. Nicol, W. H. Sanders, S. Singh, and M. Seri, "Usable global network access policy for process control systems," IEEE Security Privacy, vol. 6, no. 6, pp. 30-36, 2008.
    • (2008) IEEE Security Privacy , vol.6 , Issue.6 , pp. 30-36
    • Nicol, D.M.1    Sanders, W.H.2    Singh, S.3    Seri, M.4
  • 65
    • 84871955248 scopus 로고    scopus 로고
    • Assessing and exploiting the internal security of an organization
    • T. Stephanou, "Assessing and Exploiting the Internal Security of an Organization," SANS Inst., 2001.
    • (2001) SANS Inst
    • Stephanou, T.1
  • 70
    • 67650661171 scopus 로고    scopus 로고
    • Advanced key-management architecture for secure SCADA communications
    • Aug
    • D. Choi, H. Kim, D. Won, and S. Kim, "Advanced key-management architecture for secure SCADA communications," IEEE Trans. Power Del., vol. 24, no. 3, pp. 1154-1163, Aug. 2009.
    • (2009) IEEE Trans. Power Del , vol.24 , Issue.3 , pp. 1154-1163
    • Choi, D.1    Kim, H.2    Won, D.3    Kim, S.4
  • 71
    • 77950187346 scopus 로고    scopus 로고
    • Efficient secure group communications for SCADA
    • May
    • D. Choi, S. Lee, D. Won, and S. Kim, "Efficient secure group communications for SCADA," IEEE Trans. Power Del., vol. 25, no. 2, pp. 714-722, May 2010.
    • (2010) IEEE Trans. Power Del , vol.25 , Issue.2 , pp. 714-722
    • Choi, D.1    Lee, S.2    Won, D.3    Kim, S.4
  • 72
    • 84871951474 scopus 로고    scopus 로고
    • SSCADA: Securing SCADA infrastructure communications
    • Y. Wang, "sSCADA: Securing SCADA infrastructure communications, " Int. J. Commun. Netw. Distrib. Syst., vol. 6, no. 1, pp. 59-78, 2011.
    • (2011) Int. J. Commun. Netw. Distrib. Syst , vol.6 , Issue.1 , pp. 59-78
    • Wang, Y.1
  • 73
    • 33645695288 scopus 로고    scopus 로고
    • Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information
    • M. Long and C.-H. J.Wu, "Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information," IEEE Trans. Ind. Informat., vol. 2, no. 1, pp. 40-47, 2006.
    • (2006) IEEE Trans. Ind. Informat , vol.2 , Issue.1 , pp. 40-47
    • Long, M.1    Wu, C.-H.J.2
  • 75
    • 70149101305 scopus 로고    scopus 로고
    • Application of trusted network technology to industrial control networks
    • H. Okhravi and D. M. Nicol, "Application of trusted network technology to industrial control networks," Int. J. Critical Infrastructure Protection, vol. 2, no. 3, pp. 84-94, 2009.
    • (2009) Int. J. Critical Infrastructure Protection , vol.2 , Issue.3 , pp. 84-94
    • Okhravi, H.1    Nicol, D.M.2
  • 76
    • 67650535901 scopus 로고    scopus 로고
    • Rethinking security properties, threat models, the design space in sensor networks: A case study in SCADA systems
    • A. A. Cárdenas, T. Roosta, and S. Sastry, "Rethinking security properties, threat models, the design space in sensor networks: A case study in SCADA systems," Ad Hoc Networks, vol. 7, no. 8, pp. 1434-1447, 2009.
    • (2009) Ad Hoc Networks , vol.7 , Issue.8 , pp. 1434-1447
    • Cárdenas, A.A.1    Roosta, T.2    Sastry, S.3
  • 77
    • 77953688880 scopus 로고    scopus 로고
    • A security analysis for wireless sensor mesh networks in highly critical systems
    • Apr.
    • C. Alcaraz and J. Lopez, "A security analysis for wireless sensor mesh networks in highly critical systems," IEEE Trans. Syst., Man, Cybern. C, vol. 40, no. 4, pp. 419-428, Apr. 2010.
    • (2010) IEEE Trans. Syst., Man, Cybern. C , vol.40 , Issue.4 , pp. 419-428
    • Alcaraz, C.1    Lopez, J.2
  • 79
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • DOI 10.1109/TIE.2006.881998
    • C.-C. Lee, M.-S. Hwang, and I.-E. Liao, "Security enhancement on a new authentication scheme with anonymity for wireless environments," IEEE Trans. Ind. Electron., vol. 53, no. 5, pp. 1683-1687, May 2006. (Pubitemid 44593519)
    • (2006) IEEE Transactions on Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1687
    • Lee, C.-C.1    Hwang, M.-S.2    Liao, I.-E.3
  • 80
    • 77958017287 scopus 로고    scopus 로고
    • Safety-and security-critical services in building automation and control systems
    • Nov.
    • T. Novak and A. Gerstinger, "Safety-and security-critical services in building automation and control systems," IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3614-3621, Nov. 2010.
    • (2010) IEEE Trans. Ind. Electron , vol.57 , Issue.11 , pp. 3614-3621
    • Novak, T.1    Gerstinger, A.2
  • 81
    • 77956599919 scopus 로고    scopus 로고
    • Security in building automation systems
    • Nov.
    • W. Granzer, F. Praus, andW.Kastner, "Security in building automation systems," IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3622-3630, Nov. 2010.
    • (2010) IEEE Trans. Ind. Electron , vol.57 , Issue.11 , pp. 3622-3630
    • Granzer, W.1    Praus, F.2    Kastner, W.3
  • 82
    • 59049098426 scopus 로고    scopus 로고
    • Credential management for automatic identification solutions in supply chain management
    • Apr
    • M. Henseler, M. Rossberg, and G. Schaefer, "Credential management for automatic identification solutions in supply chain management," IEEE Trans. Ind. Informat., vol. 4, no. 4, pp. 303-314, Apr. 2008.
    • (2008) IEEE Trans. Ind. Informat , vol.4 , Issue.4 , pp. 303-314
    • Henseler, M.1    Rossberg, M.2    Schaefer, G.3
  • 85
    • 67349114068 scopus 로고    scopus 로고
    • Tools for cryptographic protocols analysis: A technical and experimental comparison
    • M. Cheminod, I. Cibrario Bertolotti, L. Durante, R. Sisto, and A. Valenzano, "Tools for cryptographic protocols analysis: A technical and experimental comparison," Comput. Standards & Interfaces, vol. 31, no. 5, pp. 954-961, 2009.
    • (2009) Comput. Standards & Interfaces , vol.31 , Issue.5 , pp. 954-961
    • Cheminod, M.1    Bertolotti, I.C.2    Durante, L.3    Sisto, R.4    Valenzano, A.5
  • 86
    • 79951577827 scopus 로고    scopus 로고
    • Formal vulnerability analysis of a security system for remote fieldbus access
    • M. Cheminod, A. Pironti, and R. Sisto, "Formal vulnerability analysis of a security system for remote fieldbus access," IEEE Trans. Ind. Informat., vol. 7, no. 1, pp. 30-40, 2011.
    • (2011) IEEE Trans. Ind. Informat , vol.7 , Issue.1 , pp. 30-40
    • Cheminod, M.1    Pironti, A.2    Sisto, R.3
  • 88
    • 79959296407 scopus 로고    scopus 로고
    • Modular multiplication and exponentiation architectures for fast RSA cryptosystem based on digit serial computation
    • Jul.
    • G. D. Sutter, J.-P. Deschamps, and J. L. Imana, "Modular multiplication and exponentiation architectures for fast RSA cryptosystem based on digit serial computation," IEEE Trans. Ind. Electron., vol. 58, no. 7, pp. 3101-3109, Jul. 2011.
    • (2011) IEEE Trans. Ind. Electron , vol.58 , Issue.7 , pp. 3101-3109
    • Sutter, G.D.1    Deschamps, J.-P.2    Imana, J.L.3
  • 89
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • Jan
    • J. Zhu and J. Ma, "A new authentication scheme with anonymity for wireless environments," IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 231-235, Jan. 2004.
    • (2004) IEEE Trans. Consum. Electron , vol.50 , Issue.1 , pp. 231-235
    • Zhu, J.1    Ma, J.2
  • 90
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • D. E. Denning, "An intrusion-detection model," IEEE Trans. Softw. Eng., vol. 13, no. 2, pp. 222-232, 1987.
    • (1987) IEEE Trans. Softw. Eng , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 91
    • 77956987558 scopus 로고    scopus 로고
    • An intrusion detection system for iec61850 automated substations
    • Nov.
    • U. Premaratne, J. Samarabandu, T. Sidhu, R. Beresh, and J.-C. Tan, "An intrusion detection system for iec61850 automated substations," IEEE Trans. Power Del., vol. 25, no. 4, pp. 2376-2383, Nov. 2010.
    • (2010) IEEE Trans. Power Del , vol.25 , Issue.4 , pp. 2376-2383
    • Premaratne, U.1    Samarabandu, J.2    Sidhu, T.3    Beresh, R.4    Tan, J.-C.5
  • 93
    • 20344364652 scopus 로고    scopus 로고
    • Denial of service attacks on network-based control systems: Impact and mitigation
    • DOI 10.1109/TII.2005.844422
    • M. Long, C.-H. J. Wu, and J. Y. Hung, "Denial of service attacks on network-based control systems: Impact and mitigation," IEEE Trans. Ind. Informat., vol. 1, no. 2, pp. 85-96, 2005. (Pubitemid 40786123)
    • (2005) IEEE Transactions on Industrial Informatics , vol.1 , Issue.2 , pp. 85-96
    • Long, M.1    Wu, C.-H.2    Hung, J.Y.3
  • 101
    • 36249007497 scopus 로고    scopus 로고
    • Intrusion detection and event monitoring in SCADA Networks
    • P. Oman and M. Phillips, "Intrusion detection and event monitoring in SCADA Networks," in Proc. Critical Infrastructure Protection, 2007, vol. 253, pp. 161-173.
    • (2007) Proc. Critical Infrastructure Protection , vol.253 , pp. 161-173
    • Oman, P.1    Phillips, M.2
  • 102
    • 78149468870 scopus 로고    scopus 로고
    • An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
    • S. Shin, T. Kwon, G.-Y. Jo, Y. Park, and H. Rhy, "An experimental study of hierarchical intrusion detection for wireless industrial sensor networks," IEEE Trans. Ind. Informat., vol. 6, no. 4, pp. 744-757, 2010.
    • (2010) IEEE Trans. Ind. Informat , vol.6 , Issue.4 , pp. 744-757
    • Shin, S.1    Kwon, T.2    Jo, G.-Y.3    Park, Y.4    Rhy, H.5
  • 104
    • 10044254666 scopus 로고    scopus 로고
    • A distributed architecture for online power systems security analysis
    • Jun
    • M. Di Santo, A. Vaccaro, D. Villacci, and E. Zimeo, "A distributed architecture for online power systems security analysis," IEEE Trans. Ind. Electron., vol. 51, no. 6, pp. 1238-1248, Jun. 2004.
    • (2004) IEEE Trans. Ind. Electron , vol.51 , Issue.6 , pp. 1238-1248
    • Di Santo, M.1    Vaccaro, A.2    Villacci, D.3    Zimeo, E.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.