{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:57Z","timestamp":1740099177445,"version":"3.37.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319998428"},{"type":"electronic","value":"9783319998435"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99843-5_12","type":"book-chapter","created":{"date-parts":[[2018,9,8]],"date-time":"2018-09-08T07:15:01Z","timestamp":1536390901000},"page":"131-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO\/IEC 61850 Substation Automation Protocol"],"prefix":"10.1007","author":[{"given":"James G.","family":"Wright","sequence":"first","affiliation":[]},{"given":"Stephen D.","family":"Wolthusen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,9]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Ansilla, J.D., Vasudevan, N., JayachandraBensam, J., Anunciya, J.D.: Data security in smart grid with hardware implementation against DoS attacks. In: International Conference on Circuit Power and Computing Technologies, ICCPCT 2015, pp. 1\u20137 (2015)","DOI":"10.1109\/ICCPCT.2015.7159274"},{"key":"12_CR2","unstructured":"Cherepanov, A.: WIN32\/INDUSTROYER: A New Threat for Industrial Control Systems. Technical report, ESET, 12 June 2017"},{"issue":"2","key":"12_CR3","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Gaderer, G., Treytl, A., Sauter, T.: Security aspects for IEEE 1588 based clock synchronization protocols. In: IEEE International Workshop on Factory Communication Systems, WFCS 2006, Torino, Italy, pp. 247\u2013250. Citeseer (2006)","DOI":"10.1109\/WFCS.2006.1704163"},{"key":"12_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/9781118625651","volume-title":"Fundamentals of Queueing Theory","author":"D Gross","year":"2008","unstructured":"Gross, D., Shortle, J.F., Thompson, J.M., Harris, C.M.: Fundamentals of Queueing Theory, 4th edn. Wiley-Interscience, New York (2008)","edition":"4"},{"key":"12_CR6","unstructured":"Hurst, W., Shone, N., Monnet, Q.: Predicting the effects of DDoS attacks on a network of critical infrastructures. In: IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015, pp. 1697\u20131702, October 2015"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Itkin, E., Wool, A.: A security analysis and revised security extension for the precision time protocol. In: IEEE International Symphosium on Precision Clock Synchronization for Measurement, Control, and Communication, ISPCS 2016, pp. 1\u20136 (2016)","DOI":"10.1109\/ISPCS.2016.7579501"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Kammas, P., Komninos, T., Stamatiou, Y.C.: A queuing theory based model for studying intrusion evolution and elimination in computer networks. In: The Fourth International Conference on Information Assurance and Security, pp. 167\u2013171, September 2008","DOI":"10.1109\/IAS.2008.60"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Li, Q., Ross, C., Yang, J., Di, J., Balda, J.C., Mantooth, H.A.: The effects of flooding attacks on time-critical communications in the smart grid. In: 2015 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1\u20135, February 2015","DOI":"10.1109\/ISGT.2015.7131802"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Liu, S., Liu, X.P., Saddik, A.E.: Denial-of-Service (dos) attacks on load frequency control in smart grids. In: IEEE PES Innovative Smart Grid Technologies Conference ISGT 2013, pp. 1\u20136 (2013)","DOI":"10.1109\/ISGT.2013.6497846"},{"issue":"2","key":"12_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/2935634.2935637","volume":"46","author":"A Malhotra","year":"2016","unstructured":"Malhotra, A., Goldberg, S.: Attacking NTP\u2019s authenticated broadcast mode. SIGCOMM Comput. Commun. Rev. 46(2), 12\u201317 (2016)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"12_CR12","unstructured":"TC 57 Power Systems Management and Associated Information Exchange. Communication Networks and Systems for Power Utility Automation - Part 7\u20132: Basic Information and Communication Structure - Abstract Communication Service Interface. IEC standard 61850-7-2. Technical report, International Electrotechnical Commission (2010)"},{"key":"12_CR13","unstructured":"Mitchell, D.L., Durgin, N.A., Lincoln, P.D., Mitchell, J.C., Scedrov, A.: Undecidability of bounded security protocols. In: Workshop on Formal Methods and Security Protocols (1999)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Mizrahi, T.: A game theoretic analysis of delay attacks against time synchronization protocols. In: 2012 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, pp. 1\u20136, September 2012","DOI":"10.1109\/ISPCS.2012.6336612"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Moussa, B., Debbabi, M., Assi, C.: A detection and mitigation model for PTP delay attack in a smart grid substation. In: IEEE International Conference on Smart Grid Communications, SmartGridComm 2015, pp. 497\u2013502, November 2015","DOI":"10.1109\/SmartGridComm.2015.7436349"},{"issue":"3","key":"12_CR16","doi-asserted-by":"publisher","first-page":"996","DOI":"10.1016\/j.ejor.2008.04.035","volume":"196","author":"C Osorio","year":"2009","unstructured":"Osorio, C., Bierlaire, M.: An analytic finite capacity queueing network model capturing the propagation of congestion and blocking. Eur. J. Oper. Res. 196(3), 996\u20131007 (2009)","journal-title":"Eur. J. Oper. Res."},{"key":"12_CR17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-642-14478-3_16","volume-title":"Recent Trends in Network Security and Applications","author":"R Patel","year":"2010","unstructured":"Patel, R., Borisaniya, B., Patel, A., Patel, D., Rajarajan, M., Zisman, A.: Comparative analysis of formal model checking tools for security protocol verification. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 152\u2013163. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14478-3_16"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Srikantha, P., Kundur, D.: Denial of service attacks and mitigation for stability in cyber-enabled power grid. In: 2015 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1\u20135, February 2015","DOI":"10.1109\/ISGT.2015.7131827"},{"key":"12_CR19","unstructured":"TC 57 Power systems management and associated information exchange. Communication networks and systems for power utility automation - Part 5: Communication requirements for functions and device models. IEC standard 61850\u20135. Technical report, International Electrotechnical Commission (2013)"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/11935308_4","volume-title":"Information and Communications Security","author":"J Tsang","year":"2006","unstructured":"Tsang, J., Beznosov, K.: A security analysis of the precise time protocol (short paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 50\u201359. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11935308_4"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Ullmann, M., Vgeler, M.: Delay attacks - implication on NTP and PTP time synchronization. In: 2009 International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, pp. 1\u20136, October 2009","DOI":"10.1109\/ISPCS.2009.5340224"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Wan, X.Y., Li, Z., Fan, Z.F.: A SIP DoS flooding attack defense mechanism based on priority class queue. In: 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, pp. 428\u2013431, June 2010","DOI":"10.1109\/WCINS.2010.5541813"},{"issue":"12","key":"12_CR23","doi-asserted-by":"publisher","first-page":"3564","DOI":"10.1016\/j.comnet.2007.02.011","volume":"51","author":"Y Wang","year":"2007","unstructured":"Wang, Y., Lin, C., Li, Q., Fang, Y.: A queueing analysis for the denial of service (DoS) attacks in computer networks. Comput. Netw. 51(12), 3564\u20133573 (2007)","journal-title":"Comput. Netw."},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Wei, J., Kundur, D.: A flocking-based model for DoS-resilient communication routing in smart grid. IEEE Global Communications Conference, GLOBECOM 2012, pp. 3519\u20133524, December 2012","DOI":"10.1109\/GLOCOM.2012.6503660"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99843-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T19:48:28Z","timestamp":1571860108000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-99843-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319998428","9783319998435"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99843-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}