References
- (재)한국스마트그리드사업단 스마트그리드구축 로드맵, 2010. 1.
- 전용희, "지능형 전력망(Smart Grid)과 정보보호", 정보보호학회지 제 19권 제4호, 한국정보보호학회, 2009년 8월.
- U.S. Department of Energy, National Energy Technology Lab., Modern Grid Initiative, http 검색 자료.
- DOE Office of Electricity Delivery and Energy Reliability, Barriers to achieving the modern grid, July 2007.
- 정수환, "융합보안 R&D 이슈 및 방향", 정보보호학회지 제 19권 제 3호, 한국정보보호학회, pp. 11-13, 2009년 6월.
- 전용희, 스마트 그리드의 취약성, 특성, 설계 원칙 및 보안 요구사항 분석, 정보보호학회지, 제 20 권, 제 3호, pp. 79-89, 2010. 6월.
- ITU-T Technical Paper, Series G for Smart Grid Applications, June 2010.
- NIST PAP 01, The Role of IP in AMI Networks for Smart Grid, Oct. 24, 2009.
- Northeast Blackout of 2003, Wikipedia, Retrieved in April, 12, 2011.
- Arvid Kjell, Guide to Increased Security in Process Control Systems for Critical Societal Functions, The Swedish forum for information sharing concerning information security-SCADA and Process control systems(FIDI-SC), Swedish Emergency Management Agency, Oct. 2008.
- 전용희, "산업제어시스템 정보보호: 개요", 정보보호학회지 제19권 제 5호, pp. 52-59, 한국정보보호학회, 2009년 10월.
- Patrick McDaniel and Stephen McLaughlin, Security and Privacy Challenges in the Smart Gird, Secure Systems, May/June, pp. 72-74, IEEE, 2009.
- NIST, NISTIR 7628, Guideline for Smart Grid Cyber Security: Vol. 1, Aug. 2010.
- Cisco White Paper, Security for the Smart Grid, 2009.
- NIST(National Institute of Standards and Technology), U.S. Department of Commerce, Special Pub. 800-82, Final Public Draft, Guide to Industrial Control Systems (ICS) Security, Sep. 2008.
- Wikipedia encyclopedia, Industrial Control Systems, May, 2009.
- Wikipedia encyclopedia, SCADA, July, 2009.
- 이철수, "산업제어시스템 정보보안 감리 프레임워크 연구", 정보보호학회논문지, 제 18권 제 1호, pp. 139-148, 한국정보보호학회, 2008년 2월.
- Alvaro A. Cardenas et al., "Research Challenges for the Security of Control Systems", Proceedings of the 3rd conference on Hot topics in Security, 2008.
- Homeland Security, Control Systems Security Center, Control Systems Cyber Security: Defense in Depth Strategies, May 2006.
- ISA 99, Security for Industrial Automation and Control Systems, 2009.
- 구본진, 장정숙, 이상철, 전용희, "Zigbee 기반 AMI 보안에 대한 연구", 2010년도 스마트그리드연구회 학술대회 논문집, pp. 39-41, 2010년 5월.
- UCAIUG:AMI-SEC-ASAP, AMI System Security Requirements, V1.01, Dec. 2008.
- ASAP Red Team, Advanced Metering Infrastructure Attack Methodology, Ver. 1.0, Jan. 2009.
- UCAIUG, Security Profile for Advanced Metering Infrastructure, Version 1.0, Dec. 2009.
- Zigbee Alliance, Zigbee Smart Energy Profile 2.0 Technical Requirements Document. Dec 2009.
- Ken Masica, Recommended Practice Guide, Securing Zigbee Wireless Networks in Process Control System Environments(Draft), Control Systems Security Program(CSSP), Homeland Security, April 2007.
- 김학범, "유비쿼터스 환경에서의 Zigbee 기술과 보안요구사항", 정보보호학회지 제 17권 제 1호, pp. 79-88, 2007년 2월.
- Alcatel/Lucent, Smart Choices for the Smart Grid, Technology White Paper, Retrieved in Feb, 2011.
- Todd Baumeister, Literature Review on Smart Grid Cyber Security, University of Hawaii, Dec. 2010.
- 전용희, "산업제어시스템 보안을 위한 네트워크 설계 및 구조" 정보보호학회지 제 19권 제 5호, pp. 60-67, 한국정보보호학회, 2009년 10월.
- Y. Jiaxi, M. Anjia, and G. Zhizhong, Cyber Security Vulnerability Assessment of Power Industry, IEEE, 2006.
- A. Valdes and S. Cheung, "Intrusion Monitoring in Process Control Systems," in Proceedings of the 42nd Annual Hawaii International Conference on System Sciences HICSS, pp. 1-7, 2009.
- D. P. Varodayan and G. X. Gao, "Redundant Metering for Integrity with Information Theoretic Confidentiality," in 2010 First IEEE International Conference on Smart Grid Communications, pp. 345-349, 2010.
- R. Berthier, W. H. Sanders, and H. Khurana, "Intrusion Detection for Advanced Metering Data," in 2010 First IEEE International Conf. on Smart Grid Communications, pp. 350-355, 2010.
- C. Efthymiou and G. Kalogridis, "Smart Grid Privacy via Anonymization of Smart Metering Data," in 2010 First IEEE International Conf. on Smart Grid Communications, pp. 238-243, 2010.
- G. Kalogridis et al., "Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures," in 2010 First IEEE International Conf. on Smart Grid Communications, pp. 232-237, 2010.
- D. Watts, "Security and Vulnerability in Electric Power Systems," in 35th North American Power Symposium 2003, pp. 559-566.
- L. Xie, Y. Mo, and B. Sinopoli, "False Data Injection Attacks in Electrity Markets," in 2010 First IEEE International Conf. on Smart Grid Communications, pp. 226-231, 2010.
- G. Dan and H. Sandberg, "Stealth Attacks and Protection Schemes for State Estimators in Power Systems", in 2010 First IEEE International Conf. on Smart Grid Communications, pp. 214-219, 2010.
- H. Khurana et al., "Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols," In Hawaii International Conference on System Science, 2010.