References
- 임일형, 홍석원, 최면송, 이승재, 하복남, "배전지능화 시스템의 서비스 향상을 위한 P2P 기반의 분산형 통신망 구조", 대한전기학회 논문집, 56권 3호 pp. 443-450, 2007.
- Sanghun Jeon, "Critical Alert for Cyber Terror - Security for Nation's Infrastructure(SCADA & DCS)", 2002.
- National SCADA Test Bed, "A Summary of Control System Security Standards Activities in the Energy Section", 2005.
- P. Oman, E. O. Schweitzer, III, and J. Roberts, "Safeguarding IEDs, substations, and SCADA systems against electronic intrusions", 2005.
- A. Creery and E. J. Byres, "Industrial Cybersecurity for Power System and SCADA Network", Industry Application Magazine, IEEE, Vol 13:4, July-Aug. 2007.
- Arturo Herrera, "NERC/CIP Security Standards : What you need to know to comply", WPRC, Oct, 2007.
- Rhett Smith, "Tutorial : Security in Electric Utility Control Systems", WPRC, Oct, 2007
- F. CLeveland, "IEC TC57 Secuirty Standards for the Power System's Information Infrastructure - Beyond Simple Encryption", 2005.
- IEC technical committee 57, "Part 1: Communication network and system security - Introduction ti security issues", IEC 52351-1, May 2007.
- IEC technical committee 57, "Part 3: Communication network and system security - Communication network and system security - Profiles including TCP/IP", IEC 62351-3, June 2007.
- IEC technical committee 57, "Part 4: Communication network and system security - Profiles including MMS", IEC 62351-4, June 2007.
- IEC technical committee 57, "Part 6: Data and communication security - Security for IEC 61850", June 2007.
- IEC technical committee 57, "Part 5: Communication network and system security - Security for IEC 60870-5 and derivatives", IEC 62351-5, February 2008.
- T. Mander, F. Nabhani, L. Wang, and R. Cheung, "Data Object Based Security for DNP3 Over TCP/IP for Increased Utility Commercial Aspects Security", Power Engineering Society General Meeting IEEE, June 2007.
- R. Rivest and A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems", Communications of the ACM, February 1978.
- Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", RFC 2104, February 1997.
- R. Rivest, "The MD5 Message-Digest Algorithms", RFC 1321, April 1992..
- Eastlake, D. and T. Hansen, "US Secure Hash Algorithms(SHA)", RFC 4634, July 2006.
- "Secure Hash Standard", (SHA-1/224/256/384/512) US Federal Information Processing Standard, with Change Notice 1, February 2004.
- D. Harkins and D. Carrel, "The Internet Key Exchange(IKE)", RFC 2409, November 1998.