Securing GOOSE: The Return of One-Time Pads
暂无分享,去创建一个
[1] Peter Crossley,et al. GOOSE performance assessment on an IEC 61850 redundant network , 2018 .
[2] Roslan Ismail,et al. A review of security attacks on IEC61850 substation automation system network , 2014, Proceedings of the 6th International Conference on Information Technology and Multimedia.
[3] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[4] Anna Volkova,et al. Security Challenges in Control Network Protocols: A Survey , 2019, IEEE Communications Surveys & Tutorials.
[5] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[6] Mark Adamiak,et al. IEC 61850 Communication Networks and Systems In Substations: An Overview for Users , 1988 .
[7] Aladin Zayegh,et al. Powerful IEDs, ethernet networks and their effects on IEC 61850-based electric power utilities security , 2017, 2017 Australasian Universities Power Engineering Conference (AUPEC).
[8] Stephen D. Wolthusen,et al. Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service , 2018, 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe).
[9] Timothy X. Brown,et al. Exploiting the GOOSE protocol: A practical attack on cyber-infrastructure , 2012, 2012 IEEE Globecom Workshops.
[10] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[11] Burton S. Kaliski. A Layman's Guide to a Subset of ASN.1, BER, and DER , 2002 .
[12] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[13] M. Branicky,et al. Design Considerations for Software Only Implementations of the IEEE 1588 Precision Time Protocol , 2005 .
[14] Wang Huazhong,et al. Substation Communication Security Research Based on Hybrid Encryption of DES and RSA , 2013, 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[15] Yoohwan Kim,et al. Application of NTRU Cryptographic Algorithm for SCADA Security , 2014, 2014 11th International Conference on Information Technology: New Generations.
[16] Ghavameddin Nourbakhsh,et al. A technique for analysing GOOSE packets when testing relays in an IEC 61850-8-1 environment , 2015 .
[17] Carl Kriger,et al. A Detailed Analysis of the GOOSE Message Structure in an IEC 61850 Standard-Based Substation Automation System , 2013, Int. J. Comput. Commun. Control.
[18] Bin Zhou,et al. Realization of Communication Security in Substation , 2018, 2018 5th International Conference on Information Science and Control Engineering (ICISCE).
[19] Jun’e LI,et al. A security scheme for intelligent substation communications considering real-time performance , 2019, Journal of Modern Power Systems and Clean Energy.
[20] Yi Yang,et al. Review on cyber vulnerabilities of communication protocols in industrial control systems , 2017, 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2).
[21] F. Cleveland,et al. IEC TC57 Security Standards for the Power System's Information Infrastructure - Beyond Simple Encryption , 2006, 2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition.
[22] Débora C. Muchaluat-Saade,et al. Identifying vulnerabilities in smart gric communication networks of electrical substations using GEESE 2.0 , 2017, 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE).
[23] Hsinchun Chen,et al. Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach , 2018, IEEE Intelligent Systems.