About this Journal Submit a Manuscript Table of Contents
International Journal of Distributed Sensor Networks
Volume 2012 (2012), Article ID 268478, 10 pages
Review Article

Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks

Division of Information Technology, Department of Computer Engineering, Hansei University, 604-5 Dangjung-dong, Gunpo, Republic of Korea

Received 15 June 2012; Revised 9 October 2012; Accepted 24 October 2012

Academic Editor: Deyun Gao

Copyright © 2012 HyungJun Kim. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. National Communications System, “Supervisory control and data acquisition (SCADA) systems,” Technical Information Bulletin 04-1, 2004.
  2. D. H. Ryu, H. Kim, and K. Um, “Reducing security vulnerabilities for critical infrastructure,” Journal of Loss Prevention in the Process Industries, vol. 22, no. 6, pp. 1020–1024, 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. “Botnets, cybercrime, and cyberterrorism: vulnerabilities and policy issues for congress,” CRC Report RL32114, 2008.
  4. Centre for the Protection and National Infrastructure, Good Practice Guide: Securing the Move to IP-Based SCADA/PLC Networks, 2011.
  5. Centre for the Protection and National Infrastructure, CPNI Viewpoint: Security Implications of IPv6, 2011.
  6. J. W. Hui and D. E. Culler, “IP is dead, long live IP for wireless sensor network,” in Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys ’08), pp. 15–28, 2008.
  7. G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, “Transmission of IPv6 Packets over IEEE802.15.4 Networks,” RFC, 4944 (Proposed Standard), 2007.
  8. J. W. Hui, D. E. Culler, and S. Chakrabarti, “6LoWPAN: Incorporating IEEE 802. 15. 4 into the IP Architecture,” Internet Protocol for Smart Objects (IPSO) Alliance, White Paper #3, 2009.
  9. S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt, “Secure communication for the internet of things—a comparison of link-layer security and IPsec for 6LoWPAN,” Security and Communications Network. In press.
  10. E. Nordmark, “Stateless IP/ICMP Translation Algorithm (SIIT),” RFC, 2765 (Proposed Standard), 2000.
  11. E. Nordmark and R. Gilligan, “Basic Transition Mechanisms for IPv6 Hosts and Routers,” RFC, 4213 (Proposed Standard), 2005.
  12. N. Kushalnagar, G. Montenegro, and C. Schumacher, “IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals,” RFC4919 (Proposed Standard), 2007.
  13. R. Riaz, A. Naureen, A. Akram, A. H. Akbar, K. H. Kim, and H. Farooq Ahmed, “A unified security framework with three key management schemes for wireless sensor networks,” Computer Communications, vol. 31, no. 18, pp. 4269–4280, 2008. View at Publisher · View at Google Scholar · View at Scopus
  14. E. Kim, D. Kaspar, and J. P. Vasseur, “Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs),” RFC6568 (Proposed Standard), 2012.