On Security in Safety-Critical Process Control

This Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since t ...

[1]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[2]  W. Granzer,et al.  Key set management in networked building automation systems using multiple key servers , 2008, 2008 IEEE International Workshop on Factory Communication Systems.

[3]  P. Neumann Virtual automation network - reality or dream , 2003, IEEE International Conference on Industrial Technology, 2003.

[4]  Peter Neumann,et al.  Communication in industrial automation—What is going on? , 2004 .

[5]  Peter Palensky,et al.  Common approach to functional safety and system security in building automation and control systems , 2007, 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007).

[6]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[7]  Wolfgang Granzer,et al.  Denial-of-service in automation systems , 2008, 2008 IEEE International Conference on Emerging Technologies and Factory Automation.

[8]  M. Harada Security management of factory automation , 2007, SICE Annual Conference 2007.

[9]  Morris J. Dworkin,et al.  SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .

[10]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[11]  Peter Neumann,et al.  Architectural Concept of Virtual Automation Networks , 2008 .

[12]  R. Bell,et al.  IEC 61508: functional safety of electrical/electronic/ programme electronic safety-related systems: overview , 1999 .

[13]  Neil R. Storey,et al.  Safety-critical computer systems , 1996 .

[14]  A. Treytl,et al.  Security measures for industrial fieldbus systems - state of the art and solutions for IP-based approaches , 2004, IEEE International Workshop on Factory Communication Systems, 2004. Proceedings..

[15]  Michel Baud,et al.  Profinet IO-Device Emulator based on the Man-in-the-middle Attack , 2006, 2006 IEEE Conference on Emerging Technologies and Factory Automation.

[16]  A. Treytl,et al.  Security measures in automation systems-a practice-oriented approach , 2005, 2005 IEEE Conference on Emerging Technologies and Factory Automation.

[17]  Thomas P. von Hoff,et al.  Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.

[18]  Erik Tews,et al.  Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.

[19]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[20]  Saad Zafar,et al.  Integrating safety and security requirements into design of an embedded system , 2005, 12th Asia-Pacific Software Engineering Conference (APSEC'05).