Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication
暂无分享,去创建一个
[1] Laurent Joncheray. A Simple Active Attack Against TCP , 1995, USENIX Security Symposium.
[2] Qi Shi,et al. DiDDeM: a system for early detection of TCP SYN flood attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[3] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[4] James S. Tiller. A technical guide to IPSec virtual private networks , 2000 .
[5] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[6] D. Fischer,et al. Developing a communication infrastructure for the Smart Grid , 2009, 2009 IEEE Electrical Power & Energy Conference (EPEC).
[7] Daniel Jost,et al. A Constructive Analysis of IPsec , 2014 .
[8] Eric Rescorla,et al. The Design and Implementation of Datagram TLS , 2004, NDSS.
[9] L. Nordstrom,et al. A Framework for Wide-Area Monitoring and Control Systems Interoperability and Cybersecurity Analysis , 2014, IEEE Transactions on Power Delivery.
[10] R. Hunt,et al. TCP/IP security threats and attack methods , 1999, Comput. Commun..
[11] Kiran Gajrani. Performance Assessment of Communication Network in WAMS , 2012 .
[12] Yinglian Xie,et al. Collaborative TCP sequence number inference attack: how to crack sequence number under a second , 2012, CCS '12.
[13] Kenneth G. Paterson,et al. On the (in)security of IPsec in MAC-then-encrypt configurations , 2010, CCS '10.
[14] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[15] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[16] Aikaterini Mitrokotsa,et al. DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.
[17] Hamid Sharif,et al. A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.
[18] Bruce Schneier,et al. A Cryptographic Evaluation of IPsec , 1999 .
[19] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[20] Barry E. Mullins,et al. TCP veto: A novel network attack and its Application to SCADA protocols , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).
[21] Moustafa Chenine,et al. Modeling and Simulation of Wide-Area Communication for Centralized PMU-Based Applications , 2011, IEEE Transactions on Power Delivery.
[22] Zhuoqing Morley Mao,et al. Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security , 2012, 2012 IEEE Symposium on Security and Privacy.
[23] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[24] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[25] Steven M. Bellovin,et al. Simple-VPN: Simple IPsec Configuration , 2010 .
[26] Kenneth G. Paterson,et al. Lucky Thirteen: Breaking the TLS and DTLS Record Protocols , 2013, 2013 IEEE Symposium on Security and Privacy.
[27] Kenneth G. Paterson,et al. Cryptography in Theory and Practice: The Case of Encryption in IPsec , 2006, EUROCRYPT.
[28] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[29] A. Bose,et al. A failure to communicate: next generation communication requirements, technologies, and architecture for the electric power grid , 2005, IEEE Power and Energy Magazine.
[30] Kwang-Cheng Chen,et al. Smart attacks in smart grid communication networks , 2012, IEEE Communications Magazine.
[31] Robert Morris. A Weakness in the 4.2BSD Unix† TCP/IP Software , 1999 .
[32] Kenneth E. Martin. Synchrophasor Standards Development - IEEE C37.118 & IEC 61850 , 2011, 2011 44th Hawaii International Conference on System Sciences.