메뉴 건너뛰기




Volumn , Issue , 2016, Pages 205-211

A Survey of Security Frameworks Suitable for Distributed Control Systems

Author keywords

heterogeneous networks; security framework; threat modelling

Indexed keywords

CONTROL SYSTEMS; DISTRIBUTED PARAMETER CONTROL SYSTEMS; FLEXIBLE STRUCTURES; HETEROGENEOUS NETWORKS; SURVEYS;

EID: 84964902449     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CoCoNet.2015.7411188     Document Type: Conference Paper
Times cited : (3)

References (31)
  • 1
    • 84871762750 scopus 로고    scopus 로고
    • Computer communication within industrial distributed environment- A survey
    • Jul
    • P. Gaj, J. Jasperneite, and M. Felser, "Computer Communication Within Industrial Distributed Environment- A Survey, " IEEE TII, vol. 9, no. 1, pp. 182-189, Jul 2012.
    • (2012) IEEE TII , vol.9 , Issue.1 , pp. 182-189
    • Gaj, P.1    Jasperneite, J.2    Felser, M.3
  • 2
    • 80054978662 scopus 로고    scopus 로고
    • Future research challenges in wireless sensor and actuator networks targeting industrial automation
    • Portugal, July
    • J. Åkerberg, M. Gidlund, and M. Björkman, "Future research challenges in wireless sensor and actuator networks targeting industrial automation, " in Proc. INDIN, Portugal, July, 2011, pp. 410-415.
    • (2011) Proc. INDIN , pp. 410-415
    • Åkerberg, J.1    Gidlund, M.2    Björkman, M.3
  • 3
    • 70349619163 scopus 로고    scopus 로고
    • Industrial wireless sensor networks: Challenges, design principles, and technical approaches
    • V. C. Gundor and G. P. Hancke, "Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches, " IEEE TIE, vol. 56, no. 10, pp. 4258-4265, 2009.
    • (2009) IEEE TIE , vol.56 , Issue.10 , pp. 4258-4265
    • Gundor, V.C.1    Hancke, G.P.2
  • 4
    • 84871964962 scopus 로고    scopus 로고
    • Review of security issues in industrial networks
    • Feb
    • M. Cheminod, L. Durante, and A. Valenzano, "Review of Security Issues in Industrial Networks, " IEEE TII, vol. 9, no. 1, pp. 277-293, Feb 2013.
    • (2013) IEEE TII , vol.9 , Issue.1 , pp. 277-293
    • Cheminod, M.1    Durante, L.2    Valenzano, A.3
  • 5
    • 21644440888 scopus 로고    scopus 로고
    • Security for industrial communication systems
    • D. Dzung, M. Naedele, T. P. Von Hoff, and M. Crevatin, "Security for Industrial Communication Systems, " Proc. IEEE, vol. 93, no. 6, pp. 1152-1177, 2005.
    • (2005) Proc. IEEE , vol.93 , Issue.6 , pp. 1152-1177
    • Dzung, D.1    Naedele, M.2    Von Hoff, T.P.3    Crevatin, M.4
  • 6
    • 0023400323 scopus 로고
    • Clock synchronization in distributed real-time systems
    • H. Kopetz and W. Ochsenreiter, "Clock Synchronization in Distributed Real-Time Systems, " IEEE Transactions on Computers, vol. C-36, no. 8, pp. 933-940, 1987.
    • (1987) IEEE Transactions on Computers , vol.C-36 , Issue.8 , pp. 933-940
    • Kopetz, H.1    Ochsenreiter, W.2
  • 8
    • 84961654622 scopus 로고    scopus 로고
    • Packet scheduling attacks on shipboard networked control systems
    • Philadelphia, PA, 18-20 Aug
    • E. Penera and D. Chasaki, "Packet scheduling attacks on shipboard networked control systems, " in Proc. Resilienca Week (RWS), Philadelphia, PA, 18-20 Aug., 2015, pp. 1-6.
    • (2015) Proc. Resilienca Week (RWS) , pp. 1-6
    • Penera, E.1    Chasaki, D.2
  • 9
    • 21644477951 scopus 로고    scopus 로고
    • Ethernet-based real-time and industrial communications
    • Jun
    • J.-D. Decotignie, "Ethernet-Based Real-Time and Industrial Communications, " Proc. IEEE, vol. 93, no. 6, pp. 1102-1117, Jun 2005.
    • (2005) Proc. IEEE , vol.93 , Issue.6 , pp. 1102-1117
    • Decotignie, J.-D.1
  • 10
    • 21644466923 scopus 로고    scopus 로고
    • Wireless technology in industrial networks
    • A. Willig, K. Matheus, and A. Wolisz, "Wireless Technology in Industrial Networks, " Proc. IEEE, vol. 93, no. 6, pp. 1130-1151, 2005.
    • (2005) Proc. IEEE , vol.93 , Issue.6 , pp. 1130-1151
    • Willig, A.1    Matheus, K.2    Wolisz, A.3
  • 11
    • 44249108577 scopus 로고    scopus 로고
    • Recent and emerging topics in wireless industrial communications: A selection
    • May
    • A. Willig, "Recent and Emerging Topics in Wireless Industrial Communications: A Selection, " IEEE TII, vol. 4, no. 2, May 2008.
    • (2008) IEEE TII , vol.4 , Issue.2
    • Willig, A.1
  • 13
    • 33744802251 scopus 로고    scopus 로고
    • Scheduling security-critical real-time applications on clusters
    • Jul
    • T. Xie and X. Qin, "Scheduling security-critical real-time applications on clusters, " IEEE Transactions on Computers, vol. 55, no. 7, pp. 864-879, Jul 2006.
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.7 , pp. 864-879
    • Xie, T.1    Qin, X.2
  • 15
    • 82855182120 scopus 로고    scopus 로고
    • Time synchronization security using ipsec and macsec
    • Munich, Germany, Sep
    • T. Mizrahi, "Time Synchronization Security using IPsec and MACsec, " in Proc. IEEE ISPCS, Munich, Germany, Sep, 2011, pp. 38-43.
    • (2011) Proc. IEEE ISPCS , pp. 38-43
    • Mizrahi, T.1
  • 16
    • 85091948612 scopus 로고    scopus 로고
    • Sensor network security: More interesting than you think
    • San Jose, CA, Jul
    • M. Anand, E. Cronin, M. Sherr, M. Blaze, Z. Ives, and I. Lee, "Sensor network security: More interesting than you think, " in Proc. USENIX HotSec, San Jose, CA, Jul, 2006, pp. 5-5.
    • (2006) Proc. USENIX HotSec , pp. 5
    • Anand, M.1    Cronin, E.2    Sherr, M.3    Blaze, M.4    Ives, Z.5    Lee, I.6
  • 18
    • 47949094967 scopus 로고    scopus 로고
    • Performance assessment of data and time-sensitive wireless distributed networked-control-systems in presence of information security
    • Orlando, FL, Oct
    • R. A Gupta, A. K. Agarwal, M.-Y. Chow, and W. Wang, "Performance Assessment of Data and Time-Sensitive Wireless Distributed Networked-Control-Systems in Presence of Information Security, " in Proc. MILCOM, Orlando, FL, Oct, 2007, pp. 1-7.
    • (2007) Proc. MILCOM , pp. 1-7
    • Gupta, R.A.1    Agarwal, A.K.2    Chow, M.-Y.3    Wang, W.4
  • 20
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol, " RFC 24011998.
    • RFC , pp. 24011998
    • Kent, S.1    Atkinson, R.2
  • 21
    • 34547663065 scopus 로고    scopus 로고
    • An arhitectural framework for data link layer security with security interlayering
    • Richmond, VA
    • H. Altunbasak and H. Owen, "An arhitectural framework for data link layer security with security interlayering, " in Proc. SoutheastCon, Richmond, VA2007, pp. 607-614.
    • (2007) Proc. SoutheastCon , pp. 607-614
    • Altunbasak, H.1    Owen, H.2
  • 22
    • 77949891992 scopus 로고    scopus 로고
    • Security considerations for the WirelessHart protocol
    • Mallorca, Spain, Sep
    • S. Raza, A. Slabbert, T. Voigt, and K. Landernas, "Security considerations for the WirelessHart protocol, " in Proc. ETFA, Mallorca, Spain, Sep, 2009, pp. 1-8.
    • (2009) Proc. ETFA , pp. 1-8
    • Raza, S.1    Slabbert, A.2    Voigt, T.3    Landernas, K.4
  • 24
    • 84894473014 scopus 로고    scopus 로고
    • Candidate security solutions for TTEtnernet
    • NY, Oct
    • W. Steiner, "Candidate security solutions for TTEtnernet, " in Proc. DASC, East Syracuse, NY, Oct, 2013, pp. 1-10.
    • (2013) Proc. DASC, East Syracuse , pp. 1-10
    • Steiner, W.1
  • 25
    • 77955201139 scopus 로고    scopus 로고
    • Experimental security analysis of a modern automobile
    • SP, Oakland, CA, May
    • K. Koscher, A. Czeskis, F. Roener, and S. Patel, "Experimental Security Analysis of a Modern Automobile, " in Proc. IEEE Sym. SP, Oakland, CA, May, 2010, pp. 447-462.
    • (2010) Proc. IEEE Sym , pp. 447-462
    • Koscher, K.1    Czeskis, A.2    Roener, F.3    Patel, S.4
  • 27
    • 84886549636 scopus 로고    scopus 로고
    • A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX
    • G. Lackner, "A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX, " Int. J. Netw. S., vol. 15, no. 6, pp. 420-436, 2013.
    • (2013) Int. J. Netw. S. , vol.15 , Issue.6 , pp. 420-436
    • Lackner, G.1
  • 28
    • 11244354854 scopus 로고    scopus 로고
    • Security considerations for ieee 802. 15. 4 networks
    • Philadelphia, Pennsylvania, Oct
    • N. Sastry and D. Wagner, "Security Considerations for IEEE 802. 15. 4 Networks, " in Proc. ACM WiSe, Philadelphia, Pennsylvania, Oct, 2004, pp. 32-42.
    • (2004) Proc. ACM WiSe , pp. 32-42
    • Sastry, N.1    Wagner, D.2
  • 29
    • 79960794005 scopus 로고    scopus 로고
    • Applying lessons from safety-critical systems to security-critical software
    • Farmingdale, NY, May
    • C. W. Axelrod, "Applying Lessons from Safety-Critical Systems to Security-Critical Software, " in Proc. IEEE LISAT, Farmingdale, NY, May, 2011, pp. 1-6.
    • (2011) Proc. IEEE LISAT , pp. 1-6
    • Axelrod, C.W.1
  • 30
    • 20744433191 scopus 로고    scopus 로고
    • Architecture and model of profinet io
    • Sep
    • A. Poschmann and P. Neumann, "Architecture and Model of Profinet IO, " in Proc. AFRICON, Sep, 2004, pp. 1213-1218.
    • (2004) Proc. AFRICON , pp. 1213-1218
    • Poschmann, A.1    Neumann, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.