1 |
C. Beaver, D. Gallup, W. Neumann, and M. Torgerson, "Key Management for SCADA", Technical Report SAND2001-3252, Sandia National Laboratories - Cryptography and Information Systems Surety Department, March 2002
|
2 |
M. Klonowski and M. Kutylowski and M. Ren and K. Rybarezyk, "Forward-Seeure Key Evolution in Wireless Sensor Networks", CANS, Springer-Verlag (LNCS 4856), 2007, pp. 102-120
DOI
ScienceOn
|
3 |
R. McClanahan, "SCADA and IP: Is Network Convergence Really Here?", Industry Applications Magazine, IEEE, 2003, pp.29-36
DOI
ScienceOn
|
4 |
M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographie Approach to Privacy-Friendly Tags", RFlD Privacy Workshop, 2003
|
5 |
R. Roman and C. Alcaraz and J. Lopez, "The Role of Wireless Sensor Networks in the Area of Critical Information Infrastructure Protection", Information Security Technical Report, Vol.12, Issue 1, 2007, pp.24-31
DOI
ScienceOn
|
6 |
D. Park, "A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks", This paper will appear in Journal of The Korea Society of Digital Industry & Information Management, 2009
|
7 |
S. Mauw, I van Vessem, and B. Bos, "Forward Secure Communication in Wireless Sensor Networks", Third International Conference Security in Pervasive Computing (SPC'06), Springer-Verlag (LNCS 3934), 2006, pp.32-42
DOI
ScienceOn
|
8 |
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Counterneasures", First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 293-315
|
9 |
L. Lamport, "Password authentication with insecure communication", Communications of the ACM, 24( 11), 1981, pp.770-772
DOI
ScienceOn
|
10 |
M. Ren, K.D. Tanmoy and J. Zhou, "Diverging Keys in Wireless Sensor Networks", Information Security, Springer-Verlag (LNCS 4176), 2006, pp. 257-269
DOI
ScienceOn
|
11 |
L. Pietre-Cambacedes and P. Sitbon, "Cryptographic Key Management for SCADA Systems-Issues and Perspectives", International Journal of SecuriJy and its Applications, Vol 2, No.3, 2008, pp. 31-40
|
12 |
J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey", Chapter 17 in Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, 2006
|
13 |
P. Szczechowiak, L.B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: Testing the limits of elliptic curve cryptography in sensor networks", European conference on Wireless Sensor Networks (EWSN'08), Springer-Verlag (LNCS 4913), 2008, ppJ05-320
DOI
ScienceOn
|
14 |
C. Gunther, "An Identity-Based Key-Exchange Protocol", Advances in Cryptology - Eurocrypt'89, Springer-Verlag (LNCS 434),1990, pp.29-37
DOI
|
15 |
D.K. Nilsson, T. Roosta, U. Lindqvist and A. Valdes, "Key Management and Secure Software Updates in Wireless Process Control Environments", Proceedings of the first ACM conference on Wireless network security (WiSec '08), March 31-April 2, 2008, Alexandria, VA, pp.100-108
DOI
|
16 |
R. Dawson and C. Boyd and E. Dawson and J.G. Nieto, "SKMA: a Key Management Architecture for SCADA Systems", ACSW Frontiers 2006, pp.183-192
|
17 |
C. Hartung and J. Balasalle and R. Han, "Node Compromise in Sensor Networks: The Need f()r Secure Systems", Technical Report CU-CS-990-05, Department of Computer Scienee, University of Colorado at Boulder, January 2005
|
18 |
MAM. Vieiral, C.N. Coelho Jr, D.C. da Silva Jr., and J.M. da Mata, "Survey on wireless sensor network devices", Proceedings of IEEE Conference on Emerging Technologies and Factory Automation (EFTA03), 2003, pp.537-544
DOI
|