{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T12:34:08Z","timestamp":1723034048384},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"22","license":[{"start":{"date-parts":[[2015,11,20]],"date-time":"2015-11-20T00:00:00Z","timestamp":1447977600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"This research was supported by next generation information computing development program through the national research foundation of Korea, and funded by the ministry of science, ICT & Future Planning","award":["2012M3C4A7033348"],"award-info":[{"award-number":["2012M3C4A7033348"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s11042-015-3050-2","type":"journal-article","created":{"date-parts":[[2015,11,20]],"date-time":"2015-11-20T03:52:06Z","timestamp":1447991526000},"page":"14641-14668","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["The protocol design and New approach for SCADA security enhancement during sensors broadcasting system"],"prefix":"10.1007","volume":"75","author":[{"given":"Aamir","family":"Shahzad","sequence":"first","affiliation":[]},{"given":"Malrey","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Changhoon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Naixue","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Suntae","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Young-Keun","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kangmin","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Seon-mi","family":"Woo","sequence":"additional","affiliation":[]},{"given":"Gisung","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,20]]},"reference":[{"issue":"89","key":"3050_CR1","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1016\/j.proeng.2014.11.241","volume":"2014","author":"IM Arango","year":"2014","unstructured":"Arango IM, Izquierdo J, Campbell E, P\u00e9rez-Garc\u00eda R (2014) Cloud-based decision making in water distribution systems. Procedia Eng 2014(89):488","journal-title":"Procedia Eng"},{"issue":"11","key":"3050_CR2","doi-asserted-by":"publisher","first-page":"3617","DOI":"10.1007\/s11042-013-1790-4","volume":"74","author":"O Benrhouma","year":"2015","unstructured":"Benrhouma O, Hermassi H, Benrhouma O, Hermassi H, Belghith S (2015) Security analysis and improvement of a partial encryption scheme. Multimed Tools Appl 74(11):3617\u20133634. doi: 10.1007\/s11042-013-1790-4","journal-title":"Multimed Tools Appl"},{"issue":"1\u20133","key":"3050_CR3","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/s10623-012-9702-6","volume":"66","author":"S Bhattacherjee","year":"2013","unstructured":"Bhattacherjee S, Palash S (2013) Complete tree subset difference broadcast encryption scheme and its analysis. Des Codes Crypt 66(1\u20133):335\u2013362","journal-title":"Des Codes Crypt"},{"key":"3050_CR4","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1002\/sec.536","volume":"6","author":"HC Chen","year":"2013","unstructured":"Chen HC (2013) Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy. Security Comm 2013 Net 6:100\u2013107. doi: 10.1002\/sec.536","journal-title":"Security Comm 2013 Net"},{"issue":"12","key":"3050_CR5","doi-asserted-by":"publisher","first-page":"15863","DOI":"10.3390\/s131215863","volume":"13","author":"EJ Cho","year":"2013","unstructured":"Cho EJ, Hong CS, Lee S, Jeon S (2013) A partially distributed intrusion detection system for wireless sensor networks. Sensors 13(12):15863\u201315879. doi: 10.3390\/s131215863","journal-title":"Sensors"},{"issue":"7","key":"3050_CR6","doi-asserted-by":"publisher","first-page":"2432","DOI":"10.1002\/sec.954","volume":"2014","author":"G Chunsheng","year":"2014","unstructured":"Chunsheng G, Jixing G (2014) Known-plaintext attack on secure kNN computation on encrypted databases. Security Comm Net 2014(7):2432\u20132441. doi: 10.1002\/sec.954","journal-title":"Security Comm Net"},{"key":"3050_CR7","doi-asserted-by":"crossref","unstructured":"Clarke D, Reynders E Wright (2004) Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems","DOI":"10.1016\/B978-075065799-0\/50019-X"},{"key":"3050_CR8","doi-asserted-by":"publisher","unstructured":"Coates, G. M.Hopkinson, K.M., Graham, S. R., Kurkowski, S.H (2008) Collaborative, Trust-Based Security Mechanisms for a Regional Utility Intranet. Power Systems, IEEE Transactions 2008, Volume:23, Issue: 3, 10.1109\/TPWRS.2008.926456","DOI":"10.1109\/TPWRS.2008.926456"},{"key":"3050_CR9","doi-asserted-by":"publisher","unstructured":"Coates, G. M. Hopkinson, K.M., Graham, S. R., Kurkowski, S.H. (2010) A Trust System Architecture for SCADA Network Security. Power Delivery, IEEE Transactions, Volume: 25, Issue: 1, 10.1109\/TPWRD.2009.2034830","DOI":"10.1109\/TPWRD.2009.2034830"},{"key":"3050_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2006.359615","author":"JE Davis","year":"2006","unstructured":"Davis JE, Okhravi TH, Grier C, Overbye TJ, Nicol D (2006) SCADA cyber security testbed development. Power Symp 2006, NAPS, 38th North American, IEEE. doi: 10.1109\/NAPS.2006.359615","journal-title":"Power Symp 2006, NAPS, 38th North American, IEEE"},{"key":"3050_CR11","doi-asserted-by":"publisher","unstructured":"Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Mojtaba Alizadeh (2014) Trusted Computing Strengthens Cloud Authentication. The Scientific World Journal, vol. 2014, Article ID 260187, 17 pages, doi: 10.1155\/2014\/260187","DOI":"10.1155\/2014\/260187"},{"issue":"1","key":"3050_CR12","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s12095-014-0114-5","volume":"7","author":"N Mrabet El","year":"2015","unstructured":"El Mrabet N, Fournier JJA, Louis G, Ronan L (2015) A survey of fault attacks in pairing based cryptography. Cryptogr Commun 7(1):185\u2013205. doi: 10.1007\/s12095-014-0114-5","journal-title":"Cryptogr Commun"},{"key":"3050_CR13","unstructured":"Fujisaki E, Okamoto T. (1999) Secure integration of asymmetric and symmetric metric encryption schemes. In Advances in Cryptology \u2013 CRYPTO\u201999, LNCS, Vol.1666. Spring-Verlag, 537\u2013554"},{"key":"3050_CR14","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-01001-9_10","volume":"5479","author":"C Gentry","year":"2009","unstructured":"Gentry C, Waters B (2009) Adaptive security in broadcast encryption systems (with short Ciphertexts). advances in cryptology - EUROCRYPT 2009. Lecture Notes in Comput Science 5479:171\u2013188. doi: 10.1007\/978-3-642-01001-9_10","journal-title":"Lecture Notes in Comput Science"},{"key":"3050_CR15","doi-asserted-by":"publisher","unstructured":"Herbert F (2008) Securing IEC 61850. Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century 2008, IEEE, doi: 10.1109\/PES.2008.4596335","DOI":"10.1109\/PES.2008.4596335"},{"key":"3050_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/APPEEC.2010.5448606","author":"S Hong","year":"2010","unstructured":"Hong S (2010) Experiments for embedded protection device for secure SCADA communication. Power and Energy Eng Conf (APPEEC). doi: 10.1109\/APPEEC.2010.5448606","journal-title":"Power and Energy Eng Conf (APPEEC)"},{"key":"3050_CR17","doi-asserted-by":"crossref","first-page":"1011","DOI":"10.3390\/sym6041011","volume":"6","author":"U Jang","year":"2014","unstructured":"Jang U, Lim H, Kim H (2014) Privacy-enhancing security protocol in LTE initial attack. Symmetry 6:1011\u20131025","journal-title":"Symmetry"},{"key":"3050_CR18","unstructured":"Jeong-Han Yun, Sung-Ho Jeon, Kyoung-Ho Kim, Woo-Nyon Kim (2013) Burst-based Anomaly Detection on the DNP3 Protocol. International Journal of Control and Automation, Vol. 6, No. 2"},{"key":"3050_CR19","doi-asserted-by":"publisher","unstructured":"Jongkil Kim, Susilo, W., Man Ho Au, Seberry, J (2015) Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext. Information Forensics and Security, IEEE Transactions on, vol.10, no.3, pp.679,693, doi: 10.1109\/TIFS.2014.2388156","DOI":"10.1109\/TIFS.2014.2388156"},{"key":"3050_CR20","doi-asserted-by":"publisher","unstructured":"Kang, H. M. Kim. (2007) A Proposal for Key Policy of Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network. FGCN \u201907 Proceedings of the Future Generation Communication and Networking 2007,Volume 02, doi: 10.1109\/FGCN.2007.36","DOI":"10.1109\/FGCN.2007.36"},{"key":"3050_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TD-ASIA.2009.5357008","author":"DJ Kang","year":"2009","unstructured":"Kang DJ, Joo LJ, Joo KS, Hyuk PJ (2009) Analysis on cyber threats to SCADA systems. Trans Distrib Conf Expos Asia and Pacific 2009, IEEE. doi: 10.1109\/TD-ASIA.2009.5357008","journal-title":"Trans Distrib Conf Expos Asia and Pacific 2009, IEEE"},{"issue":"1","key":"3050_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/computers3010001","volume":"3","author":"IM Khalil","year":"2014","unstructured":"Khalil IM, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 3(1):1\u201335. doi: 10.3390\/computers3010001","journal-title":"Computers"},{"issue":"4","key":"3050_CR23","doi-asserted-by":"publisher","first-page":"3998","DOI":"10.3390\/s130403998","volume":"13","author":"I Kim","year":"2013","unstructured":"Kim I, Oh D, Yoon MK, Yi K, Ro WW (2013) A distributed signature detection method for detecting intrusions in sensor systems. Sensors 2013 13(4):3998\u20134016. doi: 10.3390\/s130403998","journal-title":"Sensors 2013"},{"key":"3050_CR24","unstructured":"Kiuchi, M. Serizawa, Yoshizumi (2009) Security technologies, usage and guidelines in SCADA system networks. ICCAS-SICE, IEEE,IAN: 10982993"},{"key":"3050_CR25","first-page":"1","volume":"2014","author":"J Krajewski","year":"2014","unstructured":"Krajewski J (2014) Situational awareness \u2013the next leap in industrial human machine interface design. Schneider Electric 2014:1\u201311","journal-title":"Schneider Electric"},{"issue":"5","key":"3050_CR26","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1007\/s11042-014-2014-","volume":"74","author":"C-M Lee","year":"2015","unstructured":"Lee C-M (2015) Criminal profiling and industrial security. Multimed Tools Appl 74(5):1689\u20131696. doi: 10.1007\/s11042-014-2014-","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"3050_CR27","doi-asserted-by":"publisher","first-page":"997","DOI":"10.3390\/sym6040997","volume":"6","author":"D Moon","year":"2014","unstructured":"Moon D, Im H, Lee JD, Park JH (2014) MLDS: multi-layer defense system for preventing advanced persistent threats. Symmetry 2014 6(4):997\u20131010. doi: 10.3390\/sym6040997","journal-title":"Symmetry 2014"},{"key":"3050_CR28","doi-asserted-by":"publisher","unstructured":"Musa, A. Shahzad, A.Aborujilah (2013) Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security. Proceeding ICUIMC \u201913 Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication 2013, doi: 10.1145\/2448556.2448588","DOI":"10.1145\/2448556.2448588"},{"issue":"3","key":"3050_CR29","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s12095-014-0118-1","volume":"7","author":"I Nikolic","year":"2015","unstructured":"Nikolic I, Wang L, Wu S (2015) The parallel-cut meet-in-the-middle attack. Cryptogr Commun 7(3):331\u2013345. doi: 10.1007\/s12095-014-0118-1","journal-title":"Cryptogr Commun"},{"issue":"7","key":"3050_CR30","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1002\/sec.731","volume":"2014","author":"MS Obaidat","year":"2014","unstructured":"Obaidat MS, Woungang I, Dhurandher SK, Koo V (2014) A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks. Security Comm Net 2014(7):376\u2013384. doi: 10.1002\/sec.731","journal-title":"Security Comm Net"},{"issue":"7","key":"3050_CR31","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/1538788.1538820","volume":"52","author":"SC Patel","year":"2009","unstructured":"Patel SC, Bhatt GD, Graham JH (2009) Improving the cyber security of SCADA communication networks. Commun ACM 52(7):139\u2013142. doi: 10.1145\/1538788.1538820","journal-title":"Commun ACM"},{"key":"3050_CR32","doi-asserted-by":"publisher","unstructured":"Premnath A.P., Ju-Yeon Jo, Yoohwan Kim (2014) Application of NTRU Cryptographic Algorithm for SCADA Security. Information Technology: New Generations (ITNG) 2014, 11th International Conference on, vol., no., pp.341, 346, 7\u20139, doi: 10.1109\/ITNG.2014.38","DOI":"10.1109\/ITNG.2014.38"},{"key":"3050_CR33","unstructured":"Risley, J. Roberts, P. Ladow. (2003) Electronic Security Of Real-Time Protection and Scada Communications. Schweitzer Engineering Laboratories Inc 2003, https:\/\/www.selinc.com\/WorkArea\/linkit.aspx"},{"key":"3050_CR34","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-23948-9_4","volume":"223","author":"RJ Robles","year":"2011","unstructured":"Robles RJ, Balitanas M, Kim T-h (2011) Security encryption schemes for internet SCADA: comparison of the solutions. Commun Comput Inf Sci 2010 223:19\u201327. doi: 10.1007\/978-3-642-23948-9_4","journal-title":"Commun Comput Inf Sci 2010"},{"key":"3050_CR35","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-642-13346-6_6","volume":"74","author":"RJ Robles","year":"2010","unstructured":"Robles RJ, Kim T-h (2010) An encryption scheme for communication internet SCADA components. Commun Comput Inf Sci 2010 74:56\u201364. doi: 10.1007\/978-3-642-13346-6_6","journal-title":"Commun Comput Inf Sci 2010"},{"key":"3050_CR36","unstructured":"Robles, R., Kim, T.H. (2012) Encryption Schemes Applied in SCADA Components Communication. 15, (3) pp. 1241\u20131252. ISSN 1344\u20138994, Refereed Article, University of Tasmania, http:\/\/ecite.utas.edu.au\/8309"},{"key":"3050_CR37","unstructured":"Saxena, O. Pal, S. Saiwan, Z. Saquib (2011) Token Based Key Management Scheme for SCADA Communication. International Journal of Distributed and Parallel Systems (IJDPS) 2011, Vol.2, No.4, http:\/\/airccse.org\/journal\/ijdps\/papers\/0711dps07.pdf"},{"issue":"2011","key":"3050_CR38","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-642-19542-6_10","volume":"142","author":"A Saxena","year":"2011","unstructured":"Saxena A, Pal O, Saquib Z (2011) Public Key cryptography based approach for securing SCADA communications. Commun Comput Inf Scie 142(2011):56\u201362. doi: 10.1007\/978-3-642-19542-6_10","journal-title":"Commun Comput Inf Scie"},{"key":"3050_CR39","unstructured":"SCADA, http:\/\/en.wikipedia.org\/wiki\/SCADA"},{"key":"3050_CR40","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2014.2487.24","author":"A Shahzad","year":"2014","unstructured":"Shahzad A, Irfan SM (2014) Deployment of New dynamic cryptography buffer for SCADA security enhancement. J Appl Sci. doi: 10.3923\/jas.2014.2487.24","journal-title":"J Appl Sci"},{"key":"3050_CR41","doi-asserted-by":"publisher","unstructured":"Sommestad, T., Ericsson, G.N., Nordlander, J (2010) SCADA system cyber security \u2014 A comparison of standards. Power and Energy Society General Meeting, 2010 IEEE, vol., no., pp.1,8, doi: 10.1109\/PES.2010.5590215","DOI":"10.1109\/PES.2010.5590215"},{"key":"3050_CR42","unstructured":"Stouffer J, Falco K Kent (2006) Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security. Recommendations of the National Institute of Standards and Technology"},{"key":"3050_CR43","unstructured":"Test Harness, Triangle MicroWorks, www.trianglemicroworks.com"},{"key":"3050_CR44","doi-asserted-by":"publisher","unstructured":"Wang Chunlei; Fang Lan; Dai Yiqi (2010) A Simulation Environment for SCADA Security Analysis and Assessment. Measuring Technology and Mechatronics Automation (ICMTMA) 2010, International Conference on, vol.1, no., pp.342,347, 13\u201314, doi: 10.1109\/ICMTMA.2010.603","DOI":"10.1109\/ICMTMA.2010.603"},{"issue":"1","key":"3050_CR45","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11042-014-1870-0","volume":"74","author":"H Yoo","year":"2015","unstructured":"Yoo H, Shon T (2015) Novel approach for detecting network anomalies for substation automation based on IEC 61850. Multimed Tools Appl 74(1):303\u2013318. doi: 10.1007\/s11042-014-1870-0","journal-title":"Multimed Tools Appl"},{"key":"3050_CR46","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1002\/sec.331","volume":"5","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Xiao Y, Ghaboosi K, Zhang J, Deng H (2012) A survey of cyber crimes. Secur Comm Net 5:422\u2013437. doi: 10.1002\/sec.331","journal-title":"Secur Comm Net"},{"key":"3050_CR47","doi-asserted-by":"crossref","unstructured":"Zhu, Wen Tao (2013) Towards secure and communication-efficient broadcast encryption systems. Journal of Network and Computer Applications 36.1 (2013): 178\u2013186.","DOI":"10.1016\/j.jnca.2012.09.007"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3050-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-3050-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3050-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3050-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T14:43:34Z","timestamp":1567349014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-3050-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,20]]},"references-count":47,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["3050"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-3050-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,20]]}}}