{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T18:45:12Z","timestamp":1707158712002},"reference-count":39,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T00:00:00Z","timestamp":1367366400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1016\/j.adhoc.2012.12.001","type":"journal-article","created":{"date-parts":[[2012,12,12]],"date-time":"2012-12-12T08:46:23Z","timestamp":1355301983000},"page":"1091-1104","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":45,"title":["Security of industrial sensor network-based remote substations in the context of the Internet of Things"],"prefix":"10.1016","volume":"11","author":[{"given":"Cristina","family":"Alcaraz","sequence":"first","affiliation":[]},{"given":"Rodrigo","family":"Roman","sequence":"additional","affiliation":[]},{"given":"Pablo","family":"Najera","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.adhoc.2012.12.001_b0005","series-title":"Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense","first-page":"120","article-title":"Security aspects of SCADA and DCS environments","volume":"vol. 7130","author":"Alcaraz","year":"2012"},{"issue":"4","key":"10.1016\/j.adhoc.2012.12.001_b0010","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s10207-012-0164-7","article-title":"An open virtual testbed for industrial control system security research","volume":"11","author":"Reaves","year":"2012","journal-title":"International Journal of Information Security (IJIS)"},{"key":"10.1016\/j.adhoc.2012.12.001_b0015","article-title":"Internet of things: an early reality of the Future Internet","author":"Botterman","year":"2009","journal-title":"Information Society and Media Directorate General, Networked Enterprise & RFID, European Commission"},{"key":"10.1016\/j.adhoc.2012.12.001_b0020","unstructured":"W. Shaw, Cybersecurity for SCADA systems, PennWell Corp, Tulsa, 2006, ISBN: 978-1-59370-068-3."},{"key":"10.1016\/j.adhoc.2012.12.001_b0025","article-title":"RFC 6272-Internet protocols for the smart grid","author":"Baker","year":"2011","journal-title":"Internet Engineering Task Force (IETF)"},{"key":"10.1016\/j.adhoc.2012.12.001_b0030","first-page":"1061","article-title":"An overview of wireless networks in control and monitoring","volume":"vol. 4114","author":"Irwin","year":"2006"},{"key":"10.1016\/j.adhoc.2012.12.001_b0035","unstructured":"ZigBee Alliance. (accessed 10.12)."},{"key":"10.1016\/j.adhoc.2012.12.001_b0040","unstructured":"HART Communication Foundation. (accessed 10.12)."},{"key":"10.1016\/j.adhoc.2012.12.001_b0045","unstructured":"ISA100, Wireless Systems for Automation. (accessed 10.12)."},{"key":"10.1016\/j.adhoc.2012.12.001_b0050","unstructured":"Modbus-IDA the architecture for distributed automation. (accessed 10.12)."},{"key":"10.1016\/j.adhoc.2012.12.001_b0055","unstructured":"DNP3, DNP Users Group. (accessed 10.12)."},{"key":"10.1016\/j.adhoc.2012.12.001_b0060","unstructured":"IEC 60870-5-104, Part 5-104: Transmission Protocols \u2013 Network Access for IEC 60870-5-101 Using Standard Transport Profiles, second ed., 2006\u201306."},{"key":"10.1016\/j.adhoc.2012.12.001_b0065","unstructured":"IEC-62351,Power systems management and associated information exchange \u2013 data and communication security, International Electro-technical Commission. (accessed 10.12)."},{"key":"10.1016\/j.adhoc.2012.12.001_b0070","unstructured":"EPRI, DNP Security Development, Evaluation and Testing Project Opportunity, Electric Power Research Institute. (accessed 10.12)."},{"key":"10.1016\/j.adhoc.2012.12.001_b0075","unstructured":"ISO New England, DRI Project: DNP Secure Authentication. (accessed 10.12)."},{"key":"10.1016\/j.adhoc.2012.12.001_b0080","unstructured":"NISTIR 7628, Guidelines for Smart Grid Cyber Security: vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements, The Smart Grid Interoperability Panel \u2013 Cyber Security Working Group, August 2010."},{"key":"10.1016\/j.adhoc.2012.12.001_b0085","unstructured":"C. Alcaraz, J. Lopez, Analysis of requirements for Critical Control Systems, International Journal of Critical Infrastructure Protection (IJCIP) Elsevier ISSN: 1874-5482, 2012."},{"key":"10.1016\/j.adhoc.2012.12.001_b0090","doi-asserted-by":"crossref","unstructured":"M. Jain, A. Jain, M. Srinivas, A web based expert system shell for fault diagnosis and control of power system equipment, in: Proceedings of International Conference on Condition Monitoring and Diagnosis (CMD\u201908), 2008, pp. 1310\u20131313.","DOI":"10.1109\/CMD.2008.4580217"},{"key":"10.1016\/j.adhoc.2012.12.001_b0095","doi-asserted-by":"crossref","unstructured":"C. Alcaraz, I. Agudo, D. Nu\u00f1ez, J. Lopez, Managing incidents in smart grids \u00e0 la cloud, in: Proceedings of IEEE CloudCom 2011, 2011, pp. 527\u2013531.","DOI":"10.1109\/CloudCom.2011.79"},{"key":"10.1016\/j.adhoc.2012.12.001_b0100","doi-asserted-by":"crossref","unstructured":"H. Ghani, A. Khelil, N. Suri, G. Csertan, L. Gonczy, G. Urbanics, J. Clarke, Assessing the security of internet-connected critical infrastructures, Security and Communication Networks, ISSN: 1939-0122, 2012, http:\/\/dx.doi.org\/10.1002\/sec.399.","DOI":"10.1002\/sec.399"},{"key":"10.1016\/j.adhoc.2012.12.001_b0105","unstructured":"Exemys, SCADA WEB, embedded web server. (accessed 10.12)."},{"key":"10.1016\/j.adhoc.2012.12.001_b0110","unstructured":"ICS-CERT,ICS-CERT incident response summary report, 2001\u20132009, pp. 1\u201317. (accessed 10.12)"},{"key":"10.1016\/j.adhoc.2012.12.001_b0115","doi-asserted-by":"crossref","unstructured":"B. Miller, B. Young, A survey of SCADA and critical infrastructure incidents, in: Conference on Information Technology Education (SIGITE\/RIIT), Canada, October, 2012, pp. 1\u20136.","DOI":"10.1145\/2380790.2380805"},{"key":"10.1016\/j.adhoc.2012.12.001_b0120","doi-asserted-by":"crossref","unstructured":"B. Zhu, A. Joseph, S. Sastry, A taxonomy of cyber attacks on SCADA Systems, in: Proceedings of The 2011 IEEE International Conference on Internet of Things (iThings\u201911), 2011, pp. 380\u2013388.","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"issue":"4","key":"10.1016\/j.adhoc.2012.12.001_b0125","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s10207-012-0163-8","article-title":"A log mining approach for process monitoring in SCADA","volume":"11","author":"Hadziosmanovic","year":"2012","journal-title":"International Journal of Information Security (IJIS)"},{"key":"10.1016\/j.adhoc.2012.12.001_b0130","doi-asserted-by":"crossref","unstructured":"M. Qureshi, A. Raza, D. Kumar, S.-S. Kim, U.-S. Song, M.-W. Park, H.-S. Jang, H.-S. Yang, B.-S. Park, A survey of communication network paradigms for substation automation, in: Proceedings of IEEE International Symposium on Power Line Communications and Its Applications (ISPLC 2008), 2008, pp. 310\u2013315.","DOI":"10.1109\/ISPLC.2008.4510445"},{"issue":"3","key":"10.1016\/j.adhoc.2012.12.001_b0135","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/s10207-012-0162-9","article-title":"A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks","volume":"11","author":"Das","year":"2012","journal-title":"International Journal of Information Security (IJIS)"},{"key":"10.1016\/j.adhoc.2012.12.001_b0140","unstructured":"IEEE Standard, 802.15.4-2006. Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks, 2006, ISBN 0-7381-4997-7."},{"issue":"4","key":"10.1016\/j.adhoc.2012.12.001_b0145","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1109\/TSMCC.2010.2045373","article-title":"A security analysis for wireless sensor mesh networks in highly critical systems","volume":"40","author":"Alcaraz","year":"2010","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part C: Applications and Reviews"},{"issue":"4","key":"10.1016\/j.adhoc.2012.12.001_b0150","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/MIE.2011.943023","article-title":"WirelessHART versus ISA100.11a: the format war hits the factory floor","volume":"5","author":"Petersen","year":"2011","journal-title":"IEEE Industrial Electronics Magazine"},{"issue":"2","key":"10.1016\/j.adhoc.2012.12.001_b0155","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1108\/10662240910952373","article-title":"Integrating wireless sensor networks and the Internet: a security analysis","volume":"19","author":"Roman","year":"2009","journal-title":"Internet Research"},{"key":"10.1016\/j.adhoc.2012.12.001_b0160","unstructured":"D. Christin, A. Reinhardt, P.S. Mogre, R. Steinmetz, Wireless sensor networks and the Internet of things: selected challenges, in: Proceedings of the 8th GI\/ITG KuVS Fachgespr\u00e4ch Drahtlose Sensornetze, 2009."},{"key":"10.1016\/j.adhoc.2012.12.001_b0165","doi-asserted-by":"crossref","unstructured":"G. Montenegro, N. Kushalnagar, J. Hui, D. Culler. RFC 4944: transmission of IPv6 packets over IEEE 802.15.4 networks, Request for Comments, September 2007.","DOI":"10.17487\/rfc4944"},{"key":"10.1016\/j.adhoc.2012.12.001_b0170","doi-asserted-by":"crossref","unstructured":"S. Raza, S. Duquennoy, J. Hoglund, U. Roedig, T. Voigt, Secure communication for the Internet of things \u2013 a comparison of link-layer security and IPsec for 6LoWPAN, Journal of Security and Communication Networks, 2012, ISSN: 1939-0122, http:\/\/dx.doi.org\/10.1002\/sec.406.","DOI":"10.1002\/sec.406"},{"key":"10.1016\/j.adhoc.2012.12.001_b0175","doi-asserted-by":"crossref","unstructured":"N. Kushalnagar, G. Montenegro, C. Schumacher, RFC 4919: IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals, Request for Comments, August 2007.","DOI":"10.17487\/rfc4919"},{"key":"10.1016\/j.adhoc.2012.12.001_b0180","unstructured":"Z. Wei, C. Meinel, Implement role based access control with attribute certificates, in: Proceedings of the 6th International Conference on Advanced Communication Technology (ICACT\u201904), 2004, pp. 536\u2013540."},{"key":"10.1016\/j.adhoc.2012.12.001_b0185","doi-asserted-by":"crossref","unstructured":"T. Bhattasali, R. Chaki, A survey of recent intrusion detection systems for wireless sensor network, in: Proceedings of the 4th International Conference on Network Security and Applications (CNSA-2011), 2011, pp. 268\u2013280.","DOI":"10.1007\/978-3-642-22540-6_27"},{"issue":"9","key":"10.1016\/j.adhoc.2012.12.001_b0190","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1016\/j.comcom.2010.02.006","article-title":"Trust management systems for wireless sensor networks: best practices","volume":"33","author":"Lopez","year":"2010","journal-title":"Computer Communications"},{"key":"10.1016\/j.adhoc.2012.12.001_b0195","unstructured":"G. Privat, From smart devices to ambient communication, Workshop \u2018From RFID to the Internet of Things\u2019, Brussels, Belgium. (accessed 10.12)."}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870512002156?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870512002156?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T23:30:40Z","timestamp":1562455840000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870512002156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["S1570870512002156"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.adhoc.2012.12.001","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":["Computer Networks and Communications","Hardware and Architecture","Software"],"published":{"date-parts":[[2013,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Security of industrial sensor network-based remote substations in the context of the Internet of Things","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2012.12.001","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2012 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}