1 |
NIST, "Smart Grid Cyber Security Strategy and Requirements", Draft NISTIR 7628, 02. 2010.
|
2 |
Y. G. Jung, et al, "Smart Grid Security Trend", Korea Institute of Information Security & Cryptology, Vol. 20, No. 4, pp. 66-79, Aug. 2010.
|
3 |
NIST smart grid, http://www.nist.gov/smartgrid/
|
4 |
NIST Special Publication 1108R2, "NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0", 2012. 2.
|
5 |
NISTIR 7628, "Guidelines for Smart Grid Cyber Security", 2010. 8.
|
6 |
R. D. Colin, C. Boyd, J. Manuel, and G. Nieto, "KMA-A key management architecture for SCADA systems," in Proc. 4th Australasian Inf. Security Workshop, Vol.54, pp. 138-192, 2006.
|
7 |
Information Technology - Security Techniques - Key Management - Part 2: Mechani는 Using Symmetric Techniques ISO/IEC 11770-2 International Standard, 1996.
|
8 |
D. Choi, H. Kim, D. Won, and S. Kim, "Advanced Key Management Architecture for Secure SCADA Communications", IEEE Transactions on Power Delivery, Vol.24, No.3, pp.1154-1163, 2009.
DOI
ScienceOn
|
9 |
D. Choi, S. Lee, D. Won, and S. Kim, "Efficient Secure Group Communications for SCADA", IEEE Transactions on Power Delivery, Vol.25 No.2, pp. 714-722, 2010.
DOI
ScienceOn
|
10 |
S. K. Eun, S.H. Oh, "Hash chain based Group Key Management Mechanism for Smart Grid Environments," Korea Institute of Information Security & Cryptology, Vol. 21, No. 4, pp. 149-160, Aug. 2011.
|
11 |
Yoon-Su Jeong, "A Key Pre-distribution Scheme Using Double Hash Chain for Strong Security Strength of Wireless Sensor Node,"pp.569-643,2008.
|
12 |
NIST, "NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0", NIST Special Publication, 01. 2010.
|