메뉴 건너뛰기




Volumn 4, Issue 6, 2017, Pages 1802-1831

Cyber-Physical Systems Security - A Survey

Author keywords

Attacks; controls; cyber physical systems (CPSs); industrial control systems (ICSs); medical devices; security; smart cars; smart grids; threats; vulnerabilities

Indexed keywords

BIOMEDICAL EQUIPMENT; CONTROL; CYBER PHYSICAL SYSTEM; ELECTRIC POWER TRANSMISSION NETWORKS; EMBEDDED SYSTEMS; SECURITY OF DATA; SMART POWER GRIDS;

EID: 85029396841     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2017.2703172     Document Type: Article
Times cited : (838)

References (183)
  • 1
    • 84887937959 scopus 로고    scopus 로고
    • Critical control system protection in the 21st century: Threats and solutions
    • Oct.
    • C. Alcaraz and S. Zeadally, "Critical control system protection in the 21st century: Threats and solutions," Computer, vol. 46, no. 10, pp. 74-83, Oct. 2013.
    • (2013) Computer , vol.46 , Issue.10 , pp. 74-83
    • Alcaraz, C.1    Zeadally, S.2
  • 2
    • 84873293533 scopus 로고    scopus 로고
    • In quest of benchmarking security risks to cyber-physical systems
    • Jan./Feb.
    • S. Amin, G. A. Schwartz, and A. Hussain, "In quest of benchmarking security risks to cyber-physical systems," IEEE Netw., vol. 27, no. 1, pp. 19-24, Jan./Feb. 2013.
    • (2013) IEEE Netw. , vol.27 , Issue.1 , pp. 19-24
    • Amin, S.1    Schwartz, G.A.2    Hussain, A.3
  • 5
    • 84925359289 scopus 로고    scopus 로고
    • A comparative review on the wireless implantable medical devices privacy and security
    • Athens, Greece
    • Z. E. Ankarali et al., "A comparative review on the wireless implantable medical devices privacy and security," in Proc. EAI 4th Int. Conf. Wireless Mobile Commun. Healthcare (Mobihealth), Athens, Greece, 2014, pp. 246-249.
    • (2014) Proc. EAI 4th Int. Conf. Wireless Mobile Commun. Healthcare (Mobihealth) , pp. 246-249
    • Ankarali, Z.E.1
  • 7
    • 84961752361 scopus 로고    scopus 로고
    • Privacy and security in Internet of Things and wearable devices
    • Apr./Jun.
    • O. Arias, J. Wurm, K. Hoang, and Y. Jin, "Privacy and security in Internet of Things and wearable devices," IEEE Trans. Multi-Scale Comput. Syst., vol. 1, no. 2, pp. 99-109, Apr./Jun. 2015.
    • (2015) IEEE Trans. Multi-Scale Comput. Syst. , vol.1 , Issue.2 , pp. 99-109
    • Arias, O.1    Wurm, J.2    Hoang, K.3    Jin, Y.4
  • 9
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • S. M. Bellovin, "Security problems in the TCP/IP protocol suite," ACM SIGCOMM Comput. Commun. Rev., vol. 19, no. 2, pp. 32-48, 1989.
    • (1989) ACM SIGCOMM Comput. Commun. Rev. , vol.19 , Issue.2 , pp. 32-48
    • Bellovin, S.M.1
  • 13
    • 22344444992 scopus 로고    scopus 로고
    • The myths and facts behind cyber security risks for industrial control systems
    • E. Byres and J. Lowe, "The myths and facts behind cyber security risks for industrial control systems," in Proc. VDE Kongress, vol. 116. 2004, pp. 213-218.
    • (2004) Proc. VDE Kongress , vol.116 , pp. 213-218
    • Byres, E.1    Lowe, J.2
  • 14
    • 84873302493 scopus 로고    scopus 로고
    • A layered encryption mechanism for networked critical infrastructures
    • Jan./Feb.
    • H. Cao, P. Zhu, X. Lu, and A. Gurtov, "A layered encryption mechanism for networked critical infrastructures," IEEE Netw., vol. 27, no. 1, pp. 12-18, Jan./Feb. 2013.
    • (2013) IEEE Netw. , vol.27 , Issue.1 , pp. 12-18
    • Cao, H.1    Zhu, P.2    Lu, X.3    Gurtov, A.4
  • 16
    • 79956009493 scopus 로고    scopus 로고
    • Attacks against process control systems: Risk assessment, detection, and response
    • Hong Kong
    • A. A. Cárdenas et al., "Attacks against process control systems: Risk assessment, detection, and response," in Proc. 6th ACM Symp. Inf. Comput. Commun. Security, Hong Kong, 2011, pp. 355-366.
    • (2011) Proc. 6th ACM Symp. Inf. Comput. Commun. Security , pp. 355-366
    • Cárdenas, A.A.1
  • 17
    • 85084140752 scopus 로고    scopus 로고
    • Research challenges for the security of control systems
    • San Jose, CA, USA
    • A. A. Cárdenas, S. Amin, and S. Sastry, "Research challenges for the security of control systems," in Proc. HotSec, San Jose, CA, USA, 2008, Art. no. 6.
    • (2008) Proc. HotSec
    • Cárdenas, A.A.1    Amin, S.2    Sastry, S.3
  • 18
    • 67650535901 scopus 로고    scopus 로고
    • Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
    • A. A. Cárdenas, T. Roosta, and S. Sastry, "Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems," Ad Hoc Netw., vol. 7, no. 8, pp. 1434-1447, 2009.
    • (2009) Ad Hoc Netw. , vol.7 , Issue.8 , pp. 1434-1447
    • Cárdenas, A.A.1    Roosta, T.2    Sastry, S.3
  • 19
    • 84878337116 scopus 로고    scopus 로고
    • U.S Dept. Defense, Defense Tech. Inf. Center, Fort Belvoir, VA, USA, Tech. Rep. CMU/SEI-2010-TN-028
    • J. L. Cebula and L. R. Young, "A taxonomy of operational cyber security risks," U.S Dept. Defense, Defense Tech. Inf. Center, Fort Belvoir, VA, USA, Tech. Rep. CMU/SEI-2010-TN-028, 2010.
    • (2010) A Taxonomy of Operational Cyber Security Risks
    • Cebula, J.L.1    Young, L.R.2
  • 20
    • 85061034567 scopus 로고    scopus 로고
    • Comprehensive experimental analyses of automotive attack surfaces
    • San Francisco, CA, USA
    • S. Checkoway et al., "Comprehensive experimental analyses of automotive attack surfaces," in Proc. USENIX Security Symp., San Francisco, CA, USA, 2011, p. 6.
    • (2011) Proc. USENIX Security Symp. , pp. 6
    • Checkoway, S.1
  • 21
    • 84871964962 scopus 로고    scopus 로고
    • Review of security issues in industrial networks
    • Feb.
    • M. Cheminod, L. Durante, and A. Valenzano, "Review of security issues in industrial networks," IEEE Trans. Ind. Informat., vol. 9, no. 1, pp. 277-293, Feb. 2013.
    • (2013) IEEE Trans. Ind. Informat. , vol.9 , Issue.1 , pp. 277-293
    • Cheminod, M.1    Durante, L.2    Valenzano, A.3
  • 22
    • 85027958418 scopus 로고    scopus 로고
    • Preventing occupancy detection from smart meters
    • Sep.
    • D. Chen, S. Kalra, D. Irwin, P. Shenoy, and J. Albrecht, "Preventing occupancy detection from smart meters," IEEE Trans. Smart Grid, vol. 6, no. 5, pp. 2426-2434, Sep. 2015.
    • (2015) IEEE Trans. Smart Grid , vol.6 , Issue.5 , pp. 2426-2434
    • Chen, D.1    Kalra, S.2    Irwin, D.3    Shenoy, P.4    Albrecht, J.5
  • 24
    • 79953895474 scopus 로고    scopus 로고
    • Lessons from stuxnet
    • Apr.
    • T. M. Chen and S. Abu-Nimeh, "Lessons from Stuxnet," Computer, vol. 44, no. 4, pp. 91-93, Apr. 2011.
    • (2011) Computer , vol.44 , Issue.4 , pp. 91-93
    • Chen, T.M.1    Abu-Nimeh, S.2
  • 26
    • 84995468208 scopus 로고    scopus 로고
    • Error handling of in-vehicle networks makes them vulnerable
    • Vienna, Austria
    • K.-T. Cho and K. G. Shin, "Error handling of in-vehicle networks makes them vulnerable," in Proc. ACM SIGSAC Conf. Comput. Commun. Security, Vienna, Austria, 2016, pp. 1044-1055.
    • (2016) Proc. ACM SIGSAC Conf. Comput. Commun. Security , pp. 1044-1055
    • Cho, K.-T.1    Shin, K.G.2
  • 27
    • 85074463893 scopus 로고    scopus 로고
    • Fingerprinting electronic control units for vehicle intrusion detection
    • Austin, TX, USA
    • K.-T. Cho and K. G. Shin, "Fingerprinting electronic control units for vehicle intrusion detection," in Proc. 25th USENIX Security Symp., Austin, TX, USA, 2016, pp. 911-927.
    • (2016) Proc. 25th USENIX Security Symp. , pp. 911-927
    • Cho, K.-T.1    Shin, K.G.2
  • 28
    • 85039172747 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dept. Comput. Sci., State Univ. New York, Incheon, South Korea
    • S. Cho, "Privacy and authentication in smart grid networks," Ph.D. dissertation, Dept. Comput. Sci., State Univ. New York, Incheon, South Korea, 2014.
    • (2014) Privacy and Authentication in Smart Grid Networks
    • Cho, S.1
  • 29
    • 67650661171 scopus 로고    scopus 로고
    • Advanced key-management architecture for secure SCADA communications
    • Jul.
    • D. Choi, H. Kim, D. Won, and S. Kim, "Advanced key-management architecture for secure SCADA communications," IEEE Trans. Power Del., vol. 24, no. 3, pp. 1154-1163, Jul. 2009.
    • (2009) IEEE Trans. Power Del. , vol.24 , Issue.3 , pp. 1154-1163
    • Choi, D.1    Kim, H.2    Won, D.3    Kim, S.4
  • 33
    • 84855766673 scopus 로고    scopus 로고
    • Integrating physical and cyber security resources to detect wireless threats to critical infrastructure
    • Nov.
    • A. D'Amico, C. Verderosa, C. Horn, and T. Imhof, "Integrating physical and cyber security resources to detect wireless threats to critical infrastructure," in Proc. IEEE Int. Conf. Technol. Homeland Security (HST), Nov. 2011, pp. 494-500.
    • (2011) Proc. IEEE Int. Conf. Technol. Homeland Security (HST) , pp. 494-500
    • D'Amico, A.1    Verderosa, C.2    Horn, C.3    Imhof, T.4
  • 34
    • 84883583254 scopus 로고    scopus 로고
    • A security layer for smartphone-to-vehicle communication over bluetooth
    • Sep.
    • A. Dardanelli et al., "A security layer for smartphone-to-vehicle communication over bluetooth," IEEE Embedded Syst. Lett., vol. 5, no. 3, pp. 34-37, Sep. 2013.
    • (2013) IEEE Embedded Syst. Lett. , vol.5 , Issue.3 , pp. 34-37
    • Dardanelli, A.1
  • 36
    • 77953972283 scopus 로고    scopus 로고
    • Absence makes the heart grow fonder: New directions for implantable medical device security
    • San Jose, CA, USA
    • T. Denning, K. Fu, and T. Kohno, "Absence makes the heart grow fonder: New directions for implantable medical device security," in Proc. HotSec, San Jose, CA, USA, 2008, pp. 5:1-5:7.
    • (2008) Proc. HotSec , pp. 51-57
    • Denning, T.1    Fu, K.2    Kohno, T.3
  • 37
    • 84954548473 scopus 로고    scopus 로고
    • CPS: Beyond usability: Applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices
    • New Orleans, LA, USA
    • T. Denning et al., "CPS: Beyond usability: Applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices," in Proc. 30th Annu. Comput. Security Appl. Conf., New Orleans, LA, USA, 2014, pp. 426-435.
    • (2014) Proc. 30th Annu. Comput. Security Appl. Conf. , pp. 426-435
    • Denning, T.1
  • 39
    • 85039172783 scopus 로고    scopus 로고
    • Powering Business Worldwide Eaton, [Online]
    • Powering Business Worldwide Eaton. (2014). Power Outage Annual Report: Blackout Tracker. [Online]. Available: http://www.eaton.com/ blackouttracker
    • (2014) Power Outage Annual Report: Blackout Tracker
  • 40
    • 77954005795 scopus 로고    scopus 로고
    • Cyber security and power system communication - Essential parts of a smart grid infrastructure
    • Jul.
    • G. N. Ericsson, "Cyber security and power system communication - Essential parts of a smart grid infrastructure," IEEE Trans. Power Del., vol. 25, no. 3, pp. 1501-1507, Jul. 2010.
    • (2010) IEEE Trans. Power Del. , vol.25 , Issue.3 , pp. 1501-1507
    • Ericsson, G.N.1
  • 41
    • 84975288599 scopus 로고    scopus 로고
    • She: Secure hardware extension-Functional specification, version 1.1
    • Apr.
    • R. Escherich et al., "She: Secure hardware extension-Functional specification, version 1.1," Hersteller Initiative Softw. (HIS) AK Security, Apr. 2009.
    • (2009) Hersteller Initiative Softw. (HIS) AK Security
    • Escherich, R.1
  • 42
    • 84898006994 scopus 로고    scopus 로고
    • Smart grid - The new and improved power grid: A survey
    • 4th Quart.
    • X. Fang, S. Misra, G. Xue, and D. Yang, "Smart grid - The new and improved power grid: A survey," IEEE Commun. Surveys Tuts., vol. 14, no. 4, pp. 944-980, 4th Quart., 2012.
    • (2012) IEEE Commun. Surveys Tuts. , vol.14 , Issue.4 , pp. 944-980
    • Fang, X.1    Misra, S.2    Xue, G.3    Yang, D.4
  • 43
    • 34250215846 scopus 로고    scopus 로고
    • SCADA systems: Vulnerabilities and remediation
    • J. D. Fernandez and A. E. Fernandez, "SCADA systems: Vulnerabilities and remediation," J. Comput. Sci. Colleges, vol. 20, no. 4, pp. 160-168, 2005.
    • (2005) J. Comput. Sci. Colleges , vol.20 , Issue.4 , pp. 160-168
    • Fernandez, J.D.1    Fernandez, A.E.2
  • 48
    • 85039168966 scopus 로고    scopus 로고
    • FOX News Network [Online]
    • FOX News Network. (2014). Threat to The Grid? Details Emerge of Sniper Attack on Power Station. [Online]. Available: http://www.foxnews.com/politics/2014/02/06/2013-sniper-attack-onpower-grid-still-concern-in-washington-and-for-utilities/
    • (2014) Threat to the Grid? Details Emerge of Sniper Attack on Power Station
  • 52
    • 84888171353 scopus 로고    scopus 로고
    • Relay attacks on passive keyless entry and start systems in modern cars
    • A. Francillon, B. Danev, and S. Capkun, "Relay attacks on passive keyless entry and start systems in modern cars," in Proc. NDSS, 2011, p. 15.
    • (2011) Proc. NDSS , pp. 15
    • Francillon, A.1    Danev, B.2    Capkun, S.3
  • 53
    • 84885719603 scopus 로고    scopus 로고
    • Controlling for cybersecurity risks of medical device software
    • Oct.
    • K. Fu and J. Blum, "Controlling for cybersecurity risks of medical device software," Commun. ACM, vol. 56, no. 10, pp. 35-37, Oct. 2013.
    • (2013) Commun. ACM , vol.56 , Issue.10 , pp. 35-37
    • Fu, K.1    Blum, J.2
  • 54
  • 55
    • 80053135174 scopus 로고    scopus 로고
    • They can hear your heartbeats: Non-invasive security for implantable medical devices
    • Aug.
    • S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: Non-invasive security for implantable medical devices," SIGCOMM Comput. Commun. Rev., vol. 41, no. 4, pp. 2-13, Aug. 2011.
    • (2011) SIGCOMM Comput. Commun. Rev. , vol.41 , Issue.4 , pp. 2-13
    • Gollakota, S.1    Hassanieh, H.2    Ransford, B.3    Katabi, D.4    Fu, K.5
  • 57
    • 84886002308 scopus 로고    scopus 로고
    • Oversee a secure and open communication and runtime platform for innovative automotive applications
    • A. Groll et al., "Oversee a secure and open communication and runtime platform for innovative automotive applications," in Proc. 7th Embedded Security Cars Conf. (ESCAR), 2009.
    • (2009) Proc. 7th Embedded Security Cars Conf. (ESCAR)
    • Groll, A.1
  • 59
    • 85007039883 scopus 로고    scopus 로고
    • From physical to cyber: Escalating protection for personalized auto insurance
    • Stanford, CA, USA
    • L. Guan et al., "From physical to cyber: Escalating protection for personalized auto insurance," in Proc. 14th ACM Conf. Embedded Netw. Sensor Syst. CD-ROM (SenSys), Stanford, CA, USA, 2016, pp. 42-55.
    • (2016) Proc. 14th ACM Conf. Embedded Netw. Sensor Syst. CD-ROM (SenSys) , pp. 42-55
    • Guan, L.1
  • 60
    • 50249098733 scopus 로고    scopus 로고
    • Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
    • May
    • D. Halperin et al., "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses," in Proc. IEEE Symp. Security Privacy (SP), May 2008, pp. 129-142.
    • (2008) Proc. IEEE Symp. Security Privacy (SP) , pp. 129-142
    • Halperin, D.1
  • 62
    • 85092017530 scopus 로고    scopus 로고
    • Take two software updates and see me in the morning: The case for software security evaluations of medical devices
    • San Francisco, CA, USA
    • S. Hanna et al., "Take two software updates and see me in the morning: The case for software security evaluations of medical devices," in Proc. 2nd USENIX Conf. Health Security Privacy (HealthSec), San Francisco, CA, USA, 2011, p. 6.
    • (2011) Proc. 2nd USENIX Conf. Health Security Privacy (HealthSec) , pp. 6
    • Hanna, S.1
  • 63
    • 0032645074 scopus 로고    scopus 로고
    • TCP/IP security threats and attack methods
    • B. Harris and R. Hunt, "TCP/IP security threats and attack methods," Comput. Commun., vol. 22, no. 10, pp. 885-897, 1999.
    • (1999) Comput. Commun. , vol.22 , Issue.10 , pp. 885-897
    • Harris, B.1    Hunt, R.2
  • 64
    • 54749156341 scopus 로고    scopus 로고
    • China's cyber militia
    • S. Harris,"China's cyber militia," Nat. J. Mag., no. 31, 2008.
    • (2008) Nat. J. Mag. , Issue.31
    • Harris, S.1
  • 65
    • 84961627565 scopus 로고    scopus 로고
    • Secure authentication for remote patient monitoring with wireless medical sensor networks
    • T. Hayajneh, B. J. Mohd, M. Imran, G. Almashaqbeh, and A. V. Vasilakos, "Secure authentication for remote patient monitoring with wireless medical sensor networks," Sensors, vol. 16, no. 4, p. 424, 2016.
    • (2016) Sensors , vol.16 , Issue.4 , pp. 424
    • Hayajneh, T.1    Mohd, B.J.2    Imran, M.3    Almashaqbeh, G.4    Vasilakos, A.V.5
  • 68
    • 56449088090 scopus 로고    scopus 로고
    • Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures
    • Newcastle upon Tyne, U.K.
    • T. Hoppe, S. Kiltz, and J. Dittmann, "Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures," in Proc. 27th Int. Conf. Comput. Safety Rel. Security (SAFECOMP), Newcastle upon Tyne, U.K., 2008, pp. 235-248.
    • (2008) Proc. 27th Int. Conf. Comput. Safety Rel. Security (SAFECOMP) , pp. 235-248
    • Hoppe, T.1    Kiltz, S.2    Dittmann, J.3
  • 70
    • 85039161924 scopus 로고    scopus 로고
    • ICS-CERT, [Online]
    • ICS-CERT. (2010). Common Cybersecurity Vulnerabilities in Industrial Control Systems. [Online]. Available: http://ics-cert.us-cert.gov/sites/ default/files/recommended-practices/DHS-Common-Cybersecurity- Vulnerabilities-ICS-2010.pdf
    • (2010) Common Cybersecurity Vulnerabilities in Industrial Control Systems
  • 73
    • 84983749082 scopus 로고    scopus 로고
    • Vulnerabilities of android OS-based telematics system
    • H. J. Jo, W. Choi, S. Y. Na, S. Woo, and D. H. Lee, "Vulnerabilities of android OS-based telematics system," Wireless Pers. Commun., vol. 92, no. 4, pp. 1511-1530, 2017.
    • (2017) Wireless Pers. Commun. , vol.92 , Issue.4 , pp. 1511-1530
    • Jo, H.J.1    Choi, W.2    Na, S.Y.3    Woo, S.4    Lee, D.H.5
  • 76
    • 0142099692 scopus 로고    scopus 로고
    • U.S. Dept. Commerce, NIST, Gaithersburg, MD, USA, Tech. Rep. 800:48
    • T. Karygiannis and L. Owens, "Wireless network security," U.S. Dept. Commerce, NIST, Gaithersburg, MD, USA, Tech. Rep. 800:48, 2002.
    • (2002) Wireless Network Security
    • Karygiannis, T.1    Owens, L.2
  • 80
    • 84913582851 scopus 로고    scopus 로고
    • Survey in smart grid and smart home security: Issues, challenges and countermeasures
    • 4th Quart.
    • N. Komninos, E. Philippou, and A. Pitsillides, "Survey in smart grid and smart home security: Issues, challenges and countermeasures," IEEE Commun. Surveys Tuts., vol. 16, no. 4, pp. 1933-1954, 4th Quart., 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.4 , pp. 1933-1954
    • Komninos, N.1    Philippou, E.2    Pitsillides, A.3
  • 81
    • 77955201139 scopus 로고    scopus 로고
    • Experimental security analysis of a modern automobile
    • Oakland, CA, USA, May
    • K. Koscher et al., "Experimental security analysis of a modern automobile," in Proc. IEEE Symp. Security Privacy (SP), Oakland, CA, USA, May 2010, pp. 447-462.
    • (2010) Proc. IEEE Symp. Security Privacy (SP) , pp. 447-462
    • Koscher, K.1
  • 84
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyberwarfare weapon
    • May/Jun.
    • R. Langner, "Stuxnet: Dissecting a cyberwarfare weapon," IEEE Security Privacy, vol. 9, no. 3, pp. 49-51, May/Jun. 2011.
    • (2011) IEEE Security Privacy , vol.9 , Issue.3 , pp. 49-51
    • Langner, R.1
  • 86
    • 57749193296 scopus 로고    scopus 로고
    • An approach to specification-based attack detection for in-vehicle networks
    • Xi'an, China
    • U. E. Larson, D. K. Nilsson, and E. Jonsson, "An approach to specification-based attack detection for in-vehicle networks," in Proc. IEEE Intell. Veh. Symp., Xi'an, China, 2008, pp. 220-225.
    • (2008) Proc. IEEE Intell. Veh. Symp. , pp. 220-225
    • Larson, U.E.1    Nilsson, D.K.2    Jonsson, E.3
  • 89
    • 84155167716 scopus 로고    scopus 로고
    • Challenges and research directions in medical cyber-physical systems
    • Jan.
    • I. Lee et al., "Challenges and research directions in medical cyber-physical systems," Proc. IEEE, vol. 100, no. 1, pp. 75-90, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 75-90
    • Lee, I.1
  • 93
    • 80051631772 scopus 로고    scopus 로고
    • Secure information aggregation for smart grids using homomorphic encryption
    • Gaithersburg, MD, USA
    • F. Li, B. Luo, and P. Liu, "Secure information aggregation for smart grids using homomorphic encryption," in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Gaithersburg, MD, USA, 2010, pp. 327-332.
    • (2010) Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm) , pp. 327-332
    • Li, F.1    Luo, B.2    Liu, P.3
  • 94
    • 84904127298 scopus 로고    scopus 로고
    • On false data injection attack against multistep electricity price in electricity market in smart grid
    • Atlanta, GA, USA
    • J. Lin, W. Yu, and X. Yang, "On false data injection attack against multistep electricity price in electricity market in smart grid," in Proc. IEEE Glob. Commun. Conf. (GLOBECOM), Atlanta, GA, USA, 2013, pp. 760-765.
    • (2013) Proc. IEEE Glob. Commun. Conf. (GLOBECOM) , pp. 760-765
    • Lin, J.1    Yu, W.2    Yang, X.3
  • 95
    • 85028751817 scopus 로고    scopus 로고
    • A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications
    • to be published
    • J. Lin et al., "A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications," IEEE Internet Things J., to be published.
    • IEEE Internet Things J.
    • Lin, J.1
  • 96
    • 84928820166 scopus 로고    scopus 로고
    • Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for smart grid attack detection
    • Aug.
    • T. Liu et al., "Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for smart grid attack detection," Future Gener. Comput. Syst., vol. 49, pp. 94-103, Aug. 2015.
    • (2015) Future Gener. Comput. Syst. , vol.49 , pp. 94-103
    • Liu, T.1
  • 97
    • 79959856672 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," ACM Trans. Inf. Syst. Security (TISSEC), vol. 14, no. 1, 2011, Art. no. 13.
    • (2011) ACM Trans. Inf. Syst. Security (TISSEC) , vol.14 , Issue.1
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 98
    • 79951648231 scopus 로고    scopus 로고
    • Review and evaluation of security threats on the communication networks in the smart grid
    • San Jose, CA, USA
    • Z. Lu, X. Lu, W. Wang, and C. Wang, "Review and evaluation of security threats on the communication networks in the smart grid," in Proc. Mil. Commun. Conf. MILCOM, San Jose, CA, USA, 2010, pp. 1830-1835.
    • (2010) Proc. Mil. Commun. Conf. MILCOM , pp. 1830-1835
    • Lu, Z.1    Lu, X.2    Wang, W.3    Wang, C.4
  • 99
    • 79960859827 scopus 로고    scopus 로고
    • From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic
    • Shanghai, China
    • Z. Lu, W. Wang, and C. Wang, "From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic," in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 1871-1879.
    • (2011) Proc. IEEE INFOCOM , pp. 1871-1879
    • Lu, Z.1    Wang, W.2    Wang, C.3
  • 101
    • 84876948543 scopus 로고    scopus 로고
    • Cyber/physical security vulnerability assessment integration
    • Washington, DC, USA
    • D. MacDonald et al., "Cyber/physical security vulnerability assessment integration," in Proc. IEEE PES Innov. Smart Grid Technol. (ISGT), Washington, DC, USA, 2013, pp. 1-6.
    • (2013) Proc. IEEE PES Innov. Smart Grid Technol. (ISGT) , pp. 1-6
    • MacDonald, D.1
  • 105
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • May/Jun.
    • P. McDaniel and S. McLaughlin, "Security and privacy challenges in the smart grid," IEEE Security Privacy, vol. 7, no. 3, pp. 75-77, May/Jun. 2009.
    • (2009) IEEE Security Privacy , vol.7 , Issue.3 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2
  • 106
    • 77952887452 scopus 로고    scopus 로고
    • Security technology for smart grid networks
    • Jun.
    • A. R. Metke and R. L. Ekl, "Security technology for smart grid networks," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99-107, Jun. 2010.
    • (2010) IEEE Trans. Smart Grid , vol.1 , Issue.1 , pp. 99-107
    • Metke, A.R.1    Ekl, R.L.2
  • 107
    • 84885889406 scopus 로고    scopus 로고
    • Microsoft Security TechCenter [Online]
    • Microsoft Security TechCenter. (2008). Microsoft Security Bulletin ms08-067 - Critical. [Online]. Available: https://technet.microsoft.com/library/security/ms08-067
    • (2008) Microsoft Security Bulletin ms08-067 - Critical
  • 108
    • 85039171695 scopus 로고    scopus 로고
    • Microsoft Security TechCenter [Online]
    • Microsoft Security TechCenter. (2010). Microsoft Security Bulletin Summary for September 2010. [Online]. Available: https://technet.microsoft.com/library/security/ms10-sep
    • (2010) Microsoft Security Bulletin Summary for September 2010
  • 109
    • 84869170873 scopus 로고    scopus 로고
    • A survey SCADA of and critical infrastructure incidents
    • Calgary, AB, Canada
    • B. Miller and D. Rowe, "A survey SCADA of and critical infrastructure incidents," in Proc. 1st Annu. Conf. Res. Inf. Technol., Calgary, AB, Canada, 2012, pp. 51-56.
    • (2012) Proc. 1st Annu. Conf. Res. Inf. Technol. , pp. 51-56
    • Miller, B.1    Rowe, D.2
  • 110
    • 84901675643 scopus 로고    scopus 로고
    • Adventures in automotive networks and control units
    • Aug.
    • C. Miller and C. Valasek, "Adventures in automotive networks and control units," A SANS Whitepaper, Aug. 2013.
    • (2013) A SANS Whitepaper
    • Miller, C.1    Valasek, C.2
  • 111
    • 84944090367 scopus 로고    scopus 로고
    • A survey of remote automotive attack surfaces
    • C. Miller and C. Valasek, "A survey of remote automotive attack surfaces," Black Hat USA, 2014.
    • (2014) Black Hat USA
    • Miller, C.1    Valasek, C.2
  • 112
    • 84953273645 scopus 로고    scopus 로고
    • Remote exploitation of an unaltered passenger vehicle
    • C. Miller and C. Valasek, "Remote exploitation of an unaltered passenger vehicle," Black Hat USA, 2015.
    • (2015) Black Hat USA
    • Miller, C.1    Valasek, C.2
  • 113
    • 80052477688 scopus 로고    scopus 로고
    • Survivability analysis of mobile cyber physical systems with voting-based intrusion detection
    • Istanbul, Turkey
    • R. Mitchell and I.-R. Chen, "Survivability analysis of mobile cyber physical systems with voting-based intrusion detection," in Proc. Wireless Commun. Mobile Comput. Conf. (IWCMC), Istanbul, Turkey, 2011, pp. 2256-2261.
    • (2011) Proc. Wireless Commun. Mobile Comput. Conf. (IWCMC) , pp. 2256-2261
    • Mitchell, R.1    Chen, I.-R.2
  • 114
    • 84867805516 scopus 로고    scopus 로고
    • Behavior rule based intrusion detection for supporting secure medical cyber physical systems
    • Munich, Germany
    • R. Mitchell and I.-R. Chen, "Behavior rule based intrusion detection for supporting secure medical cyber physical systems," in Proc. Comput. Commun. Netw. (ICCCN), Munich, Germany, 2012, pp. 1-7.
    • (2012) Proc. Comput. Commun. Netw. (ICCCN) , pp. 1-7
    • Mitchell, R.1    Chen, I.-R.2
  • 115
    • 84874959990 scopus 로고    scopus 로고
    • Effect of intrusion detection and response on reliability of cyber physical systems
    • Mar.
    • R. Mitchell and I.-R. Chen, "Effect of intrusion detection and response on reliability of cyber physical systems," IEEE Trans. Rel., vol. 62, no. 1, pp. 199-210, Mar. 2013.
    • (2013) IEEE Trans. Rel. , vol.62 , Issue.1 , pp. 199-210
    • Mitchell, R.1    Chen, I.-R.2
  • 116
    • 84901192690 scopus 로고    scopus 로고
    • A survey of intrusion detection techniques for cyber-physical systems
    • R. Mitchell and I.-R. Chen, "A survey of intrusion detection techniques for cyber-physical systems," ACM Comput. Surveys, vol. 46, no. 4, 2014, Art. no. 55.
    • (2014) ACM Comput. Surveys , vol.46 , Issue.4
    • Mitchell, R.1    Chen, I.-R.2
  • 117
    • 84883281959 scopus 로고    scopus 로고
    • Behavior-rule based intrusion detection systems for safety critical smart grid applications
    • Sep.
    • R. Mitchell and I.-R. Chen, "Behavior-rule based intrusion detection systems for safety critical smart grid applications," IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1254-1263, Sep. 2013.
    • (2013) IEEE Trans. Smart Grid , vol.4 , Issue.3 , pp. 1254-1263
    • Mitchell, R.1    Chen, I.-R.2
  • 118
    • 84155167232 scopus 로고    scopus 로고
    • Cyber-physical security of a smart grid infrastructure
    • Jan.
    • Y. Mo et al., "Cyber-physical security of a smart grid infrastructure," Proc. IEEE, vol. 100, no. 1, pp. 195-209, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 195-209
    • Mo, Y.1
  • 120
    • 84867834950 scopus 로고    scopus 로고
    • Deconstructing flame: The limitations of traditional defences
    • K. Munro, "Deconstructing flame: The limitations of traditional defences," Comput. Fraud Security, vol. 2012, no. 10, pp. 8-11, 2012.
    • (2012) Comput. Fraud Security , vol.2012 , Issue.10 , pp. 8-11
    • Munro, K.1
  • 122
    • 77952028560 scopus 로고    scopus 로고
    • Hackers have attacked foreign utilities, CIA analyst says
    • E. Nakashima and S. Mufson, "Hackers have attacked foreign utilities, CIA analyst says," Washington Post, 2008.
    • (2008) Washington Post
    • Nakashima, E.1    Mufson, S.2
  • 125
    • 78650062267 scopus 로고    scopus 로고
    • [Online]
    • L. O. Murchu and N. Falliere. (2011). W32.Stuxnet Dossier. [Online]. Available: http://www.symantec.com/content/en/us/enterprise/media/ security%5C-response/whitepapers/w32%5C-stuxnet%5C-dossier.pdf
    • (2011) W32.Stuxnet Dossier
    • Murchu, L.O.1    Falliere, N.2
  • 126
    • 84876748434 scopus 로고    scopus 로고
    • Vehicle ECU classification based on safety-security characteristics
    • Manchester, U.K.
    • D. K. Nilsson, P. H. Phung, and U. E. Larson, "Vehicle ECU classification based on safety-security characteristics," in Proc. IET Road Transp. Inf. Control RTIC, Manchester, U.K., 2008, pp. 1-7.
    • (2008) Proc. IET Road Transp. Inf. Control RTIC , pp. 1-7
    • Nilsson, D.K.1    Phung, P.H.2    Larson, U.E.3
  • 127
    • 79954605963 scopus 로고    scopus 로고
    • NIST Nistir, Gaithersburg, MD, USA, Tech. Rep. 7628
    • "Guidelines for smart grid cyber security," NIST Nistir, Gaithersburg, MD, USA, Tech. Rep. 7628, 2010.
    • (2010) Guidelines for Smart Grid Cyber Security
  • 128
    • 85001075189 scopus 로고    scopus 로고
    • Wearable security: Key derivation for body area sensor networks based on host movement
    • D. Oberoi et al., "Wearable security: Key derivation for body area sensor networks based on host movement," in Proc. IEEE Ind. Electron. (ISIE), 2016, pp. 1116-1121.
    • (2016) Proc. IEEE Ind. Electron. (ISIE) , pp. 1116-1121
    • Oberoi, D.1
  • 129
  • 130
    • 85028151945 scopus 로고    scopus 로고
    • Potential cyberattacks on automated vehicles
    • Apr.
    • J. Petit and S. E. Shladover, "Potential cyberattacks on automated vehicles," IEEE Trans. Intell. Transp. Syst., vol. 16, no. 2, pp. 546-556, Apr. 2015.
    • (2015) IEEE Trans. Intell. Transp. Syst. , vol.16 , Issue.2 , pp. 546-556
    • Petit, J.1    Shladover, S.E.2
  • 132
    • 78650891506 scopus 로고    scopus 로고
    • Cybersecurity myths on power control systems: 21 misconceptions and false beliefs
    • Jan.
    • L. Piètre-Cambacédès, M. Tritschler, and G. N. Ericsson, "Cybersecurity myths on power control systems: 21 misconceptions and false beliefs," IEEE Trans. Power Del., vol. 26, no. 1, pp. 161-172, Jan. 2011.
    • (2011) IEEE Trans. Power Del. , vol.26 , Issue.1 , pp. 161-172
    • Piètre-Cambacédès, L.1    Tritschler, M.2    Ericsson, G.N.3
  • 134
    • 82155185205 scopus 로고    scopus 로고
    • Distributed Internet-based load altering attacks against smart power grids
    • Dec.
    • A. H. Mohsenian-Rad and A. Leon-Garcia, "Distributed Internet-based load altering attacks against smart power grids," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 667-674, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 667-674
    • Mohsenian-Rad, A.H.1    Leon-Garcia, A.2
  • 135
    • 84885876349 scopus 로고    scopus 로고
    • Hacking medical devices for fun and insulin: Breaking the human SCADA system
    • J. Radcliffe, "Hacking medical devices for fun and insulin: Breaking the human SCADA system," in Proc. Black Hat Conf. Presentation Slides, 2011.
    • (2011) Proc. Black Hat Conf. Presentation Slides
    • Radcliffe, J.1
  • 136
    • 84861589650 scopus 로고    scopus 로고
    • Smartanalyzer: A noninvasive security threat analyzer for ami smart grid
    • Orlando, FL, USA, Mar.
    • M. A. Rahman, P. Bera, and E. Al-Shaer, "Smartanalyzer: A noninvasive security threat analyzer for ami smart grid," in Proc. IEEE INFOCOM, Orlando, FL, USA, Mar. 2012, pp. 2255-2263.
    • (2012) Proc. IEEE INFOCOM , pp. 2255-2263
    • Rahman, M.A.1    Bera, P.2    Al-Shaer, E.3
  • 139
    • 85040565418 scopus 로고    scopus 로고
    • Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
    • Washington, DC, USA
    • I. Rouf et al., "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study," in Proc. 19th USENIX Security Symp., Washington, DC, USA, 2010, pp. 11-13.
    • (2010) Proc. 19th USENIX Security Symp. , pp. 11-13
    • Rouf, I.1
  • 140
    • 84914104968 scopus 로고    scopus 로고
    • Sok: Security and privacy in implantable medical devices and body area networks
    • Berkeley, CA, USA
    • M. Rushanan, A. D. Rubin, D. F. Kune, and C. M. Swanson, "Sok: Security and privacy in implantable medical devices and body area networks," in Proc. IEEE Symp. Security Privacy (SP), Berkeley, CA, USA, 2014, pp. 524-539.
    • (2014) Proc. IEEE Symp. Security Privacy (SP) , pp. 524-539
    • Rushanan, M.1    Rubin, A.D.2    Kune, D.F.3    Swanson, C.M.4
  • 141
    • 71649085971 scopus 로고    scopus 로고
    • Reducing security vulnerabilities for critical infrastructure
    • D. H. Ryu, H. Kim, and K. Um, "Reducing security vulnerabilities for critical infrastructure," J. Loss Prevent. Process Ind., vol. 22, no. 6, pp. 1020-1024, 2009.
    • (2009) J. Loss Prevent. Process Ind. , vol.22 , Issue.6 , pp. 1020-1024
    • Ryu, D.H.1    Kim, H.2    Um, K.3
  • 142
    • 84885584568 scopus 로고    scopus 로고
    • Security challenges in automotive hardware/ software architecture design
    • Grenoble, France
    • F. Sagstetter et al., "Security challenges in automotive hardware/ software architecture design," in Proc. Conf. Design Autom. Test Europe, Grenoble, France, 2013, pp. 458-463.
    • (2013) Proc. Conf. Design Autom. Test Europe , pp. 458-463
    • Sagstetter, F.1
  • 145
    • 84914128714 scopus 로고    scopus 로고
    • Secure automotive gateway - Secure communication for future cars
    • Porto Alegre, Brazil
    • S. Seifert and R. Obermaisser, "Secure automotive gateway - Secure communication for future cars," in Proc. IEEE Int. Conf. Ind. Inf., Porto Alegre, Brazil, 2014, pp. 213-220.
    • (2014) Proc. IEEE Int. Conf. Ind. Inf. , pp. 213-220
    • Seifert, S.1    Obermaisser, R.2
  • 146
    • 85039170807 scopus 로고    scopus 로고
    • [Online]
    • R. Setola. (2011). Cyber Threats to SCADA Systems. [Online]. Available: http://panzieri.dia.uniroma3.it/MICIE/docs/Setola%20WS% 20Micie%202011.pdf
    • (2011) Cyber Threats to SCADA Systems
    • Setola, R.1
  • 148
  • 149
    • 36249010910 scopus 로고    scopus 로고
    • Lessons learned from the Maroochy water breach
    • MA, USA: Springer
    • J. Slay and M. Miller, "Lessons learned from the Maroochy water breach," in Critical Infrastructure Protection. Boston, MA, USA: Springer, 2007, pp. 73-82.
    • (2007) Critical Infrastructure Protection. Boston , pp. 73-82
    • Slay, J.1    Miller, M.2
  • 151
    • 84155167085 scopus 로고    scopus 로고
    • Cyber-physical system security for the electric power grid
    • Jan.
    • S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
    • (2012) Proc. IEEE , vol.100 , Issue.1 , pp. 210-224
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 154
    • 85039171889 scopus 로고    scopus 로고
    • Security of embedded automotive networks: State of the art and a research proposal
    • Toulouse, France
    • I. Studnia et al., "Security of embedded automotive networks: State of the art and a research proposal," in Proc. 2nd Workshop Crit. Autom. Appl. Robustness Safety, Toulouse, France, 2013.
    • (2013) Proc. 2nd Workshop Crit. Autom. Appl. Robustness Safety
    • Studnia, I.1
  • 155
    • 84885965762 scopus 로고    scopus 로고
    • Survey on security threats and protection mechanisms in embedded automotive networks
    • Budapest, Hungary
    • I. Studnia et al., "Survey on security threats and protection mechanisms in embedded automotive networks," in Proc. Depend. Syst. Netw. Workshop, Budapest, Hungary, 2013, pp. 1-12.
    • (2013) Proc. Depend. Syst. Netw. Workshop , pp. 1-12
    • Studnia, I.1
  • 156
    • 84969389897 scopus 로고    scopus 로고
    • Symantec Security Response, [Online]
    • Symantec Security Response. (2014). Dragonfly: Western Energy Companies Under Sabotage Threat. [Online]. Available: http://www.symantec.com/connect/blogs/dragonfly-western-energycompanies-under-sabotage-threat
    • (2014) Dragonfly: Western Energy Companies under Sabotage Threat
  • 160
    • 84874293568 scopus 로고    scopus 로고
    • Supervisory command and data acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed
    • Orlando, FL, USA
    • V. Urias, B. Van Leeuwen, and B. Richardson, "Supervisory command and data acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed," in Proc. Mil. Commun. Conf. MILCOM, Orlando, FL, USA, 2012, pp. 1-8.
    • (2012) Proc. Mil. Commun. Conf. MILCOM , pp. 1-8
    • Urias, V.1    Van Leeuwen, B.2    Richardson, B.3
  • 161
    • 84861097886 scopus 로고    scopus 로고
    • [Online]
    • US-CERT. (2009). Cyber Threat Source Descriptions. [Online]. Available: https://ics-cert.us-cert.gov/content/cyber-threat-sourcedescriptions
    • (2009) Cyber Threat Source Descriptions
  • 163
    • 84873320171 scopus 로고    scopus 로고
    • Authentication and authorization mechanisms for substation automation in smart grid network
    • Jan./Feb.
    • B. Vaidya, D. Makrakis, and H. T. Mouftah, "Authentication and authorization mechanisms for substation automation in smart grid network," IEEE Netw., vol. 27, no. 1, pp. 5-11, Jan./Feb. 2013.
    • (2013) IEEE Netw. , vol.27 , Issue.1 , pp. 5-11
    • Vaidya, B.1    Makrakis, D.2    Mouftah, H.T.3
  • 164
    • 84875747087 scopus 로고    scopus 로고
    • Cyber security in the smart grid: Survey and challenges
    • W. Wang and Z. Lu, "Cyber security in the smart grid: Survey and challenges," Comput. Netw., vol. 57, no. 5, pp. 1344-1371, 2013.
    • (2013) Comput. Netw. , vol.57 , Issue.5 , pp. 1344-1371
    • Wang, W.1    Lu, Z.2
  • 167
    • 84864682117 scopus 로고    scopus 로고
    • Design, implementation, and evaluation of a vehicular hardware security module
    • Berlin, Germany: Springer
    • M. Wolf and T. Gendrullis, "Design, implementation, and evaluation of a vehicular hardware security module," in Information Security and Cryptology-ICISC 2011. Berlin, Germany: Springer, 2012, pp. 302-318.
    • (2012) Information Security and Cryptology-ICISC 2011 , pp. 302-318
    • Wolf, M.1    Gendrullis, T.2
  • 169
    • 85027931391 scopus 로고    scopus 로고
    • A practical wireless attack on the connected car and security protocol for in-vehicle can
    • Apr.
    • S. Woo, H. J. Jo, and D. H. Lee, "A practical wireless attack on the connected car and security protocol for in-vehicle can," IEEE Trans. Intell. Transp. Syst., vol. 16, no. 2, pp. 993-1006, Apr. 2015.
    • (2015) IEEE Trans. Intell. Transp. Syst. , vol.16 , Issue.2 , pp. 993-1006
    • Woo, S.1    Jo, H.J.2    Lee, D.H.3
  • 170
    • 85039149931 scopus 로고    scopus 로고
    • Introduction to cyber-physical system security: A cross-layer perspective
    • to be published
    • J. Wurm et al., "Introduction to cyber-physical system security: A cross-layer perspective," IEEE Trans. Multi-Scale Comput. Syst., to be published.
    • IEEE Trans. Multi-Scale Comput. Syst.
    • Wurm, J.1
  • 172
    • 79960873920 scopus 로고    scopus 로고
    • Imdguard: Securing implantable medical devices with the external wearable guardian
    • Shanghai, China, Apr.
    • F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li, "Imdguard: Securing implantable medical devices with the external wearable guardian," in Proc. IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 1862-1870.
    • (2011) Proc. IEEE INFOCOM , pp. 1862-1870
    • Xu, F.1    Qin, Z.2    Tan, C.C.3    Wang, B.4    Li, Q.5
  • 175
    • 84883332180 scopus 로고    scopus 로고
    • A survey on cyber security for smart grid communications
    • 4th Quart.
    • Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A survey on cyber security for smart grid communications," IEEE Commun. Surveys Tuts., vol. 14, no. 4, pp. 998-1010, 4th Quart., 2012.
    • (2012) IEEE Commun. Surveys Tuts. , vol.14 , Issue.4 , pp. 998-1010
    • Yan, Y.1    Qian, Y.2    Sharif, H.3    Tipper, D.4
  • 176
    • 84964896253 scopus 로고    scopus 로고
    • On false data injection attacks against Kalman filtering in power system dynamic state estimation
    • Q. Yang, L. Chang, and W. Yu, "On false data injection attacks against Kalman filtering in power system dynamic state estimation," Security Commun. Netw., vol. 9, no. 9, pp. 833-849, 2016.
    • (2016) Security Commun. Netw. , vol.9 , Issue.9 , pp. 833-849
    • Yang, Q.1    Chang, L.2    Yu, W.3
  • 177
    • 84894537318 scopus 로고    scopus 로고
    • On false data-injection attacks against power system state estimation: Modeling and countermeasures
    • Mar.
    • Q. Yang et al., "On false data-injection attacks against power system state estimation: Modeling and countermeasures," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 3, pp. 717-729, Mar. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.3 , pp. 717-729
    • Yang, Q.1
  • 178
    • 84919466772 scopus 로고    scopus 로고
    • A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems
    • Jan.
    • X. Yang et al., "A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems," IEEE Trans. Comput., vol. 64, no. 1, pp. 4-18, Jan. 2015.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.1 , pp. 4-18
    • Yang, X.1
  • 179
    • 84919339871 scopus 로고    scopus 로고
    • An integrated detection system against false data injection attacks in the smart grid
    • W. Yu, D. Griffith, L. Ge, S. Bhattarai, and N. Golmie, "An integrated detection system against false data injection attacks in the smart grid," Security Commun. Netw., vol. 8, no. 2, pp. 91-109, 2015.
    • (2015) Security Commun. Netw. , vol.8 , Issue.2 , pp. 91-109
    • Yu, W.1    Griffith, D.2    Ge, L.3    Bhattarai, S.4    Golmie, N.5
  • 180
    • 80055005133 scopus 로고    scopus 로고
    • Myth or reality - Does the aurora vulnerability pose a risk to my generator?
    • College Station, TX, USA
    • M. Zeller, "Myth or reality - Does the aurora vulnerability pose a risk to my generator?" in Proc. 64th Annu. Conf. Protect. Relay Eng., College Station, TX, USA, 2011, pp. 130-136.
    • (2011) Proc. 64th Annu. Conf. Protect. Relay Eng. , pp. 130-136
    • Zeller, M.1
  • 181
    • 84959857821 scopus 로고    scopus 로고
    • Encryption for implantable medical devices using modified one-time pads
    • Jun.
    • G. Zheng, G. Fang, R. Shankaran, and M. A. Orgun, "Encryption for implantable medical devices using modified one-time pads," IEEE Access, vol. 3, pp. 825-836, Jun. 2015.
    • (2015) IEEE Access , vol.3 , pp. 825-836
    • Zheng, G.1    Fang, G.2    Shankaran, R.3    Orgun, M.A.4
  • 183
    • 84893445259 scopus 로고    scopus 로고
    • Scada-specific intrusion detection/prevention systems: A survey and taxonomy
    • Stockholm, Sweden
    • B. Zhu and S. Sastry, "Scada-specific intrusion detection/prevention systems: A survey and taxonomy," in Proc. 1st Workshop Secure Control Syst. (SCS), Stockholm, Sweden, 2010.
    • (2010) Proc. 1st Workshop Secure Control Syst. (SCS)
    • Zhu, B.1    Sastry, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.