- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents
International Journal of Distributed Sensor Networks
Volume 2012 (2012), Article ID 268478, 10 pages
Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks
Division of Information Technology, Department of Computer Engineering, Hansei University, 604-5 Dangjung-dong, Gunpo, Republic of Korea
Received 15 June 2012; Revised 9 October 2012; Accepted 24 October 2012
Academic Editor: Deyun Gao
Copyright © 2012 HyungJun Kim. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
- National Communications System, “Supervisory control and data acquisition (SCADA) systems,” Technical Information Bulletin 04-1, 2004.
- D. H. Ryu, H. Kim, and K. Um, “Reducing security vulnerabilities for critical infrastructure,” Journal of Loss Prevention in the Process Industries, vol. 22, no. 6, pp. 1020–1024, 2009.
- “Botnets, cybercrime, and cyberterrorism: vulnerabilities and policy issues for congress,” CRC Report RL32114, 2008.
- Centre for the Protection and National Infrastructure, Good Practice Guide: Securing the Move to IP-Based SCADA/PLC Networks, 2011.
- Centre for the Protection and National Infrastructure, CPNI Viewpoint: Security Implications of IPv6, 2011.
- J. W. Hui and D. E. Culler, “IP is dead, long live IP for wireless sensor network,” in Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys ’08), pp. 15–28, 2008.
- G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, “Transmission of IPv6 Packets over IEEE802.15.4 Networks,” RFC, 4944 (Proposed Standard), 2007.
- J. W. Hui, D. E. Culler, and S. Chakrabarti, “6LoWPAN: Incorporating IEEE 802. 15. 4 into the IP Architecture,” Internet Protocol for Smart Objects (IPSO) Alliance, White Paper #3, 2009.
- S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt, “Secure communication for the internet of things—a comparison of link-layer security and IPsec for 6LoWPAN,” Security and Communications Network. In press.
- E. Nordmark, “Stateless IP/ICMP Translation Algorithm (SIIT),” RFC, 2765 (Proposed Standard), 2000.
- E. Nordmark and R. Gilligan, “Basic Transition Mechanisms for IPv6 Hosts and Routers,” RFC, 4213 (Proposed Standard), 2005.
- N. Kushalnagar, G. Montenegro, and C. Schumacher, “IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals,” RFC4919 (Proposed Standard), 2007.
- R. Riaz, A. Naureen, A. Akram, A. H. Akbar, K. H. Kim, and H. Farooq Ahmed, “A unified security framework with three key management schemes for wireless sensor networks,” Computer Communications, vol. 31, no. 18, pp. 4269–4280, 2008.
- E. Kim, D. Kaspar, and J. P. Vasseur, “Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs),” RFC6568 (Proposed Standard), 2012.