References
- C. Beaver, D. Gallup, W. Neumann, and M. Torgerson, "Key Management for SCADA", Technical Report SAND2001-3252, Sandia National Laboratories - Cryptography and Information Systems Surety Department, March 2002
- R. Dawson and C. Boyd and E. Dawson and J.G. Nieto, "SKMA: a Key Management Architecture for SCADA Systems", ACSW Frontiers 2006, pp.183-192
- C. Gunther, "An Identity-Based Key-Exchange Protocol", Advances in Cryptology - Eurocrypt'89, Springer-Verlag (LNCS 434),1990, pp.29-37 https://doi.org/10.1007/3-540-46885-4_5
- C. Hartung and J. Balasalle and R. Han, "Node Compromise in Sensor Networks: The Need f()r Secure Systems", Technical Report CU-CS-990-05, Department of Computer Scienee, University of Colorado at Boulder, January 2005
- C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Counterneasures", First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 293-315
- M. Klonowski and M. Kutylowski and M. Ren and K. Rybarezyk, "Forward-Seeure Key Evolution in Wireless Sensor Networks", CANS, Springer-Verlag (LNCS 4856), 2007, pp. 102-120 https://doi.org/10.1007/978-3-540-76969-9_7
- L. Lamport, "Password authentication with insecure communication", Communications of the ACM, 24( 11), 1981, pp.770-772 https://doi.org/10.1145/358790.358797
- S. Mauw, I van Vessem, and B. Bos, "Forward Secure Communication in Wireless Sensor Networks", Third International Conference Security in Pervasive Computing (SPC'06), Springer-Verlag (LNCS 3934), 2006, pp.32-42 https://doi.org/10.1007/11734666_4
- R. McClanahan, "SCADA and IP: Is Network Convergence Really Here?", Industry Applications Magazine, IEEE, 2003, pp.29-36 https://doi.org/10.1109/MIA.2003.1180947
- D.K. Nilsson, T. Roosta, U. Lindqvist and A. Valdes, "Key Management and Secure Software Updates in Wireless Process Control Environments", Proceedings of the first ACM conference on Wireless network security (WiSec '08), March 31-April 2, 2008, Alexandria, VA, pp.100-108 https://doi.org/10.1145/1352533.1352550
- M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographie Approach to Privacy-Friendly Tags", RFlD Privacy Workshop, 2003
- L. Pietre-Cambacedes and P. Sitbon, "Cryptographic Key Management for SCADA Systems-Issues and Perspectives", International Journal of SecuriJy and its Applications, Vol 2, No.3, 2008, pp. 31-40
- M. Ren, K.D. Tanmoy and J. Zhou, "Diverging Keys in Wireless Sensor Networks", Information Security, Springer-Verlag (LNCS 4176), 2006, pp. 257-269 https://doi.org/10.1007/11836810_19
- R. Roman and C. Alcaraz and J. Lopez, "The Role of Wireless Sensor Networks in the Area of Critical Information Infrastructure Protection", Information Security Technical Report, Vol.12, Issue 1, 2007, pp.24-31 https://doi.org/10.1016/j.istr.2007.02.003
- D. Park, "A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks", This paper will appear in Journal of The Korea Society of Digital Industry & Information Management, 2009
- P. Szczechowiak, L.B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: Testing the limits of elliptic curve cryptography in sensor networks", European conference on Wireless Sensor Networks (EWSN'08), Springer-Verlag (LNCS 4913), 2008, ppJ05-320 https://doi.org/10.1007/978-3-540-77690-1_19
- MAM. Vieiral, C.N. Coelho Jr, D.C. da Silva Jr., and J.M. da Mata, "Survey on wireless sensor network devices", Proceedings of IEEE Conference on Emerging Technologies and Factory Automation (EFTA03), 2003, pp.537-544 https://doi.org/10.1109/ETFA.2003.1247753
- J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey", Chapter 17 in Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, 2006