과제정보
이 성과는 정부(과학기술정보통신부)의 재원으로 한국연구재단의 지원을 받아 수행된 연구임(No. RS-2023-00240037)
참고문헌
- G. M. Makrakis, C. Kolias, G. Kambourakis, C, Rieger, and J. Benjamin, "Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents," IEEE Access Vol. 9, pp. 165295-165325, Dec. 2021.
- G. Y. Liao, Y. J. Chen, W. C. Lu, and T. C. Cheng, "Toward Authenticating the Master in the Modbus Protocol," IEEE Trans. Power Delivery, Vol. 23, No. 4, pp. 2628-2629, Oct. 2008.
- R. Phan, "Authenticated Modbus Protocol for Critical Infrastructure Protection," IEEE Trans. Power Delivery, Vol. 27, No. 3, pp. 1687-1689, Jul. 2012.
- H. Krawczyk and T. Rabin, "Chameleon Hashing and Signatures," in Proc. Network and Distributed System Security 2000, pp: 143-154, San Diego, Feb. 3-4, 2000.
- Z. Yang, C. Jin, Y. Tian, J. Lai, and J. Zhou, "LIS: Lightweight Signature Schemes for Continuous Message Authentication in CyberPhysical Systems", in Proc. ACM ASIA Conf. Computer Communication Security, pp. 719-731, Taipei, Taiwan, Oct. 5-9, 2020.
- A. Perrig, D. Song, R. Canetti, J. D. Tygar, and B. Briscoe, "Timed Efficient Stream LossTolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction", IETF RFC 4082, Jun 2005.
- S. Aghapour, M. Kaveh, D. Martin, and M. R. Mosavi, "An Ultra-Lightweight and Provably Secure Broadcast Authentication Protocol for Smart Grid Communications," IEEE Access, Vol. 8, pp. 125477-125487, Jul. 2020.
- U. Tefek, E. Esiner, D. Mashima, B. Chen, and Y. C. Hu, "Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems," in Proc. IEEE conf. Computer Comm., pp. 1039-1048, London, May 2-5, 2022.
- E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and Integrity in Outsourced Databases," ACM Trans. Storage, Vol. 2, No. 2, pp. 107-138, 2006.
- A. A. Yavuz, "An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages," IEEE Trans. Info. Forensics and Security, Vol. 9, No. 10, pp. 1733-1742, Oct. 2014.
- L. Lamport, "Constructing Digital Signatures from a One-way Function, Technical Report CSL 98, SRI International, 1979.
- R.C. Merkle, A certified digital signature based on a conventional function," Advances in Cryptology-Crypto 87, LNCS, Vol. 293, pp. 369-378, Springer, 1987.
- L. Reyzin and N. Reyzin, "Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying," Information Security and Privacy, LNCS, Vol. 2384. pp. 144-153, Springer, 2002.
- Q. Li and G. Cao, "Multicast Authentication in the Smart Grid with One-Time Signature," IEEE Trans. Smart Grid, Vol. 2, No. 4, pp. 686-696, Dec. 2011.
- N. Saxena and S. Grijalva, "Efficient Signature Scheme for Delivering Authentic Control Commands in the Smart Grid," IEEE Trans. Smart Grid, Vol. 9, No. 5, pp. 4323-4334, Sep. 2018.