Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems

[1]  ibrahim hassan alshurbaji,et al.  Wireless Intrusion Detection Systems , 2013 .

[2]  Rayford B. Vaughn,et al.  A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems , 2012, 2012 45th Hawaii International Conference on System Sciences.

[3]  Roger L. King,et al.  Cybersecurity risk testing of substation phasor measurement units and phasor data concentrators , 2011, CSIIRW '11.

[4]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.

[5]  Chao Yang,et al.  Who is peeping at your passwords at Starbucks? — To catch an evil twin access point , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[6]  Shahid Raza Secure Communication in WirelessHART and its Integration with Legacy HART , 2010 .

[7]  Bradley Reaves,et al.  Discovery, infiltration, and denial of service in a process control system wireless network , 2009, 2009 eCrime Researchers Summit.

[8]  Stig Fr. Mjølsnes,et al.  An Improved Attack on TKIP , 2009, NordSec.

[9]  Thiemo Voigt,et al.  Security considerations for the WirelessHART protocol , 2009, 2009 IEEE Conference on Emerging Technologies & Factory Automation.

[10]  Rayford B. Vaughn,et al.  Discovering vulnerabilities in control system human-machine interface software , 2009, J. Syst. Softw..

[11]  Igor Nai Fovino,et al.  Design and Implementation of a Secure Modbus Protocol , 2009, Critical Infrastructure Protection.

[12]  Erik Tews,et al.  Practical attacks against WEP and WPA , 2009, WiSec '09.

[13]  Ray Hunt,et al.  A review of WPAN security: attacks and prevention , 2008, Mobility '08.

[14]  Song Han,et al.  WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control , 2008, 2008 IEEE Real-Time and Embedded Technology and Applications Symposium.

[15]  Yang Xiao,et al.  Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.

[16]  Erik Tews,et al.  Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.

[17]  Ken Masica,et al.  Recommended Practices Guide for Securing ZigBee Wireless Networks in Process Control System Environments: Draft , 2007 .

[18]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[19]  Francesco Parisi-Presicce,et al.  DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework , 2007 .

[20]  Avishai Wool,et al.  Cracking the Bluetooth PIN , 2005, MobiSys '05.

[21]  John D. Fernandez,et al.  SCADA systems: vulnerabilities and remediation , 2005 .

[22]  David M. Nicol,et al.  Evaluation of secure peer-to-peer overlay routing for survivable SCADA systems , 2004, Proceedings of the 2004 Winter Simulation Conference, 2004..

[23]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[24]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[25]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[26]  Ross J. Anderson Why cryptosystems fail , 1993, CCS '93.