A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach
暂无分享,去创建一个
Saioa Arrizabalaga | Javier Añorga | Santiago Figueroa | S. Arrizabalaga | J. Añorga | Santiago Figueroa
[1] He Yu'an,et al. Research and Application of Sinec L2 and Modbus Plus Networks on Industrial Automation , 2007, 2007 International Conference on Mechatronics and Automation.
[2] Hui Liu,et al. A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism , 2015, 2015 IEEE International Conference on Electro/Information Technology (EIT).
[3] X Itu,et al. Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .
[4] Jeffrey L. Hieb,et al. Improving cybersecurity for Industrial Control Systems , 2016, 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE).
[5] Timo Hämäläinen,et al. Security Assessment of a Distributed, Modbus-Based Building Automation System , 2017, 2017 IEEE International Conference on Computer and Information Technology (CIT).
[6] Sean Turner,et al. Transport Layer Security , 2014, IEEE Internet Computing.
[7] E. Joelianto,et al. Performance of an industrial data communication protocol on ethernet network , 2008, 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08).
[8] Matt Bishop,et al. Protocol Vulnerability Analysis , 2005 .
[9] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.
[10] R. C.-W Phan,et al. Authenticated Modbus Protocol for Critical Infrastructure Protection , 2012, IEEE Transactions on Power Delivery.
[11] Saioa Arrizabalaga,et al. An Attribute-Based Access Control using Chaincode in RFID Systems , 2019, 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[12] Yousung Kang,et al. Abnormal Traffic Detection Mechanism for Protecting IIoT Environments , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).
[13] Stefano Marrone,et al. Formal security assessment of Modbus protocol , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).
[14] Sujeet Shenoi,et al. Attack taxonomies for the Modbus protocols , 2008, Int. J. Crit. Infrastructure Prot..
[15] R. A. Valiev,et al. Organization of data exchange through the modbus network between the SIMATIC S7 PLC and field devices , 2017, 2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM).
[16] Matheus K. Ferst,et al. Implementation of Secure Communication With Modbus and Transport Layer Security protocols , 2018, 2018 13th IEEE International Conference on Industry Applications (INDUSCON).
[17] Pavol Zavarsky,et al. Analysis of SCADA Security Using Penetration Testing: A Case Study on Modbus TCP Protocol , 2018, 2018 29th Biennial Symposium on Communications (BSC).
[18] Thelma Virginia Rodrigues,et al. OpenPLC: An open source alternative to automation , 2014, IEEE Global Humanitarian Technology Conference (GHTC 2014).
[19] Igor Nai Fovino,et al. An experimental investigation of malware attacks on SCADA systems , 2009, Int. J. Crit. Infrastructure Prot..
[20] Saioa Arrizabalaga,et al. An Attribute-Based Access Control Model in RFID Systems Based on Blockchain Decentralized Applications for Healthcare Environments , 2019, Comput..
[21] Jonathan Herzog,et al. A computational interpretation of Dolev-Yao adversaries , 2005, Theor. Comput. Sci..
[22] Gen-Yih Liao,et al. Toward Authenticating the Master in the Modbus Protocol , 2008, IEEE Transactions on Power Delivery.
[23] Altir Christian D. Bonganay,et al. Automated electric meter reading and monitoring system using ZigBee-integrated raspberry Pi single board computer via Modbus , 2014, 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[24] Khaled Salah,et al. A Modbus traffic generator for evaluating the security of SCADA systems , 2014, 2014 9th International Symposium on Communication Systems, Networks & Digital Sign (CSNDSP).
[25] Claude Fachkha. Cyber Threat Investigation of SCADA Modbus Activities , 2019, 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[26] Khalil El-Khatib,et al. Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol , 2013, 2013 Third International Conference on Communications and Information Technology (ICCIT).
[27] Riemer Brouwer. Industrial Cybersecurity Governance , 2015 .
[28] Yan Lu,et al. Standards landscape and directions for smart manufacturing systems , 2015, 2015 IEEE International Conference on Automation Science and Engineering (CASE).
[29] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .