1 |
Kyungmi Park, Donghoon Shin, Woonyon Kim and Sinkyu Kim, "A study on Communication Robustness Testing for Industrial Control Devices," Journal of the Korea Institute of information Security & Cryptology, 29(5), pp. 1099-1116, Oct. 2019
DOI
|
2 |
"Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models", IEC 62443-1-1:2009, Jul. 2009
|
3 |
Sunghyuck Hong, "Research on Wireless Sensor Networks Security Attack and Countermeasures: Survey", Journal of Convergence for Information Technology, 4(4), pp. 1-6, Dec. 2014
DOI
|
4 |
"Industrial Wireless Sensor Network(IWSN) Market Analysis and Segment Forecasts To 2025", Grand View Research, Inc., 2017
|
5 |
T.Tsao, R. Alexander, M. Dohler, V. Daza and A. Lozano, "A Security Framework for Routing over Low Power and Lossy Networks", Internet Engineering Task Force(IETF), Feb. 2009
|
6 |
Erwin Paternotte and Mattijs van Ommeren, "It WISN't me, attacking industrial wireless mesh networks", HITBSecConference, 2018
|
7 |
Lyes Bayou, David Espes, Nora Cuppens-Boulahia and Frederic Cuppens, "Security Analysis of WirelessHART Communication Scheme", Conference of International Symposium on Foundations and Practice of Security, Dec. 2017
|
8 |
Feng Xie, Yong Peng, Wei Zhao, Yang Gao and Xuefeng Han, "Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges", IFIP International Conference on Computer Information Systems and Industrial Management, LNCS, vol. 8838, pp. 624-635, 2015
|
9 |
TUV SUD, https://www.tuev-sued-de/topics/information-technology-it/industrial-it-security
|
10 |
exida for IEC 62443 Cyber Certification, http://www.exida.com/ Certification/I EC62443-Cyber-Cert, 2019
|
11 |
ANSSI, Certification CSPN, https://www.ssi.gouv.fr/administration/produits-certifies/cspn
|
12 |
"Security Requirements for Industrial Control System - Part 2: Field Device Layer", Telecommunications Technology Association(TTA), Jun. 2017
|
13 |
"Security for industrial automation and control system -Part 4-2: Technical security requirements for IACS components", Korean Standards and Certification, Jan. 2019
|
14 |
"Intrinsically Secure WirelessHART Field Device Networks and the Industrial Internet of Things(IIoT)", Fieldcomm Group, Jun. 2017
|
15 |
"Security Requirements for Industrial Control System - Part. 1: Concepts and Reference Model", Telecommunications Technology Association(TTA), Jun. 2017
|
16 |
Cristina Alcaraz and Javier Lopez, "A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems", IEEE Transactions on Systems, Man, and Cybernetics, Part C, vol. 40, pp. 419-428, Jul. 2010
DOI
|
17 |
Stig Petersen and Simon Carlsen, "WirelessHART Versus ISA100.11a: The Format War Hits the Factory Floor", IEEE Industrial Electronics Magazine, vol. 5, pp. 23-34, Dec. 2011
DOI
|
18 |
Andrzej Bialas, "Vulnerability Assessment of Sensor Systems", Sensors, 19(11), Jun. 2019
|
19 |
Lyes Bayou, "Assessment and enforcement of wireless sensor network- based SCADA systems security", Hyper Articles on Line(HAL), Jun. 2018
|
20 |
"S3-17: SUTD Security Showdown Event Report", iTrust: Centre for Research in Cyber Security, Nov. 2017
|
21 |
"Wireless communication network and communication profiles - WirelessHART", IEC 62591 Edition 2.0, Mar. 2016
|
22 |
"NISTIR-7176, System Protection Profile-Industrial Control Systems Version 1.0", National Institute of Standards and Technology(NIST), Feb. 2004
|
23 |
"Field Device Protection Profile for SCADA systems in Medium Robustness Environments Version 0.71", National Institute of Standards and Technology(NIST), May. 2006
|
24 |
"Common Criteria for Information Technology Security Evaluation, Version 3.1 Revision 5", The Common Criteria Recognition Agreement (CCRA), Apr. 2017
|
25 |
Woonyon Kim, Eungki Park and Sinkyu Kim, "A Study on a Cybersecurity Evaluation Method for Industrial Control Systems in the 4th Industrial Revolution Era", The Journal of Korean Institute of Communications & Information Sciences, 44(5), pp. 943-956, May. 2019
DOI
|
26 |
Dahye Jung, Jinyoung Choi and Songhee Lee, "Nuclear-related Software Analysis based on Secure Coding", Journal of the Korea Institute of Information Security & Cryptology, 23(2), pp. 243-250, Apr. 2013
DOI
|
27 |
BBC News, https://www.bbc.com/korean/international-49705340
|
28 |
Mark Nixon, "A Comparison of WirelessHART and ISA100.11a", Emerson, Sep. 2012
|