References
- 김인중, 정윤정, 고재영, 원동호, “중요핵심시설(SCADA)에 대한 보안 관리 연구”, 한국통신학회논문지 Vol.30 No.8C, pp.838-848, 2005
- Curts, K. “A DNP3 protocol primer,” Technical report, DNP User Group, 2005
- GAO, “Critical Infrastructure Protection : Challenge and Efforts to Secure Control Systems,” http://www.gao.gov, Mar., 2004
- S. Mittra, “Iolus: A Framework for Scalable Secure Multicasting,” Proc. ACM SIGCOMM'97, pp.277-88, 1997 https://doi.org/10.1145/263109.263179
- Cheryl Beaver, Donald Gallup, Willian Neumann, Mark Torgerson, “Key Management for SCADA,” Sandia, http://www.sandia.org/scada/documnets/013252.pdf;, Mar. 2002
- Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel Gonzalez Nieto, “SKMA - A Key Management Architecture for SCADA Systems,” In Proc. Fourth Australasian Information Security Workshop, Vol. 54, pp.138-192, 2006
- H. Harney, E. Harder, “Logical Key Hierachy Protocol,” Internet Draft(work in progress), draft-harney-spartr-lkhpsec-00.txt, Internet Engeneering Task Force, Mar. 1999
- Marcel Waldvogel, ”The VersaKey Framework: Versatile Group Key Management,” IEEE JSAC, Vol.17, No.9, Sept., 1999 https://doi.org/10.1109/49.790485
- IEEE Standards Board, “IEEE standard definition, specification, and analysis of systems used for supervisory control, data acquisition, and automatic control”, Technical report, IEEE. http://ieeexplore.ieee.org/iel1/3389/10055/00478424.pdf, March 1994
- American Gas Association, “Cryptographic protection of SCADA communications Part 1: Background, Policies and Test Plan,” Technical Report 12-1 Draft 5 revision 3, American Gas Assocation. http://www.gtiservice.org/security/; 2005
- Information Technology - Security Techniques - Key Management - Part 2: Mechani는 Using Symmetric Techniques ISO/IEC 11770-2 International Standard, 1996
- Vinay M. Igure, Sean A. Laughter, Ronald D. Williams, “Security issues in SCADA networks,” Computers & Security 25, pp.498-506, 2006 https://doi.org/10.1016/j.cose.2006.03.001
- Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia, “Efficient and Secure Keys Management for Wireless Mobile Communications,” Proceedings of the second ACM international workshop on Principles of mobile computing, pp.66-73, 2002 https://doi.org/10.1145/584490.584504
- Instrumentation systems and Automation Society, “Security Technologies for Industrial Automation and Control Systems,” ANSI/ISA-TR99.00.01-2007, Research Triangle Park, North Carolina, 2007
- Instrumentation systems and Automation Society, “Integrating Electronic Security into the manufacturing and Control Systems Environment,” ANSI/ISA-TR99.00.02-2004, Research Triangle Park, North Carolina, 2004
- National Institute of Standards and Technology, “System Protection Profile - Industrial Control Systems v1.0,” Gaithersburg, Maryland, 2004
- American Petroleum Institute, “API 1164: Pipeline SCADA Security,” Washington, DC, 2004
- American Gas Association, “Cryptographic Protection of SCADA Communications; Part2: Retrofit Link Encryption for Asynchronous Serial Communications,” AGA Report No. 12 (Part 2), Draft, 2005
- Information Technology Laboratory, National Institute of Standards and Technology “Security Requirements for Cryptographic Modules,” FIPS PUB 140-1, 1994
- K. Stouffer, J. Falco and K. Kent, Guide to Supervisory Control and Initial Public Draft, National Institute of Standards and Technology, Gaithersburg, Maryland
- Chung Kei Wong, Hohamed Gouda, Simon S. Lam, “Secure Group Communications Using Key Graphs,” Proceedings of the ACM SIGCOMM '98 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp.68-79, 1998