{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T06:24:11Z","timestamp":1777962251424,"version":"3.51.4"},"reference-count":262,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,4,26]],"date-time":"2020-04-26T00:00:00Z","timestamp":1587859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"SENDAISEgurtasun integrala iNDustria AdImentsurako","award":["KK-2019\/00072"],"award-info":[{"award-number":["KK-2019\/00072"]}]},{"name":"CYBERPREST-Cybersegurtasunerako gaitasun osoa","award":["KK-2018-00076"],"award-info":[{"award-number":["KK-2018-00076"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2021,3,31]]},"abstract":"<jats:p>Industrial Internet of Things (IIoT) is present in many participants from the energy, health, manufacturing, transport, and public sectors. Many factors catalyze IIoT, such as robotics, artificial intelligence, and intelligent decentralized manufacturing. However, the convergence between IT, OT, and IoT environments involves the integration of heterogeneous technologies through protocols, standards, and buses. However, this integration brings with it security risks. To avoid the security risks, especially when systems in different environments interact, it is important and urgent to create an early consensus among the stakeholders on the IIoT security. The default Common Vulnerability Scoring System (CVSS) offers a mechanism to measure the severity of an asset's vulnerability and therefore a way to characterize the risk. However, CVSS by default has two drawbacks. On the one hand, to carry out a risk analysis, it is necessary to have additional metrics to the one established by CVSSv3.1. On the other hand, this index has been used mostly in IT environments and although there are numerous efforts to develop a model that suits industrial environments, there is no established proposal. Therefore, we first propose a survey of the main 33 protocols, standards, and buses used in an IIoT environment. This survey will focus on the security of each one. The second part of our study consists of the creation of a framework to characterize risk in industrial environments, i.e., to solve both problems of the CVSS index. To this end, we created the Vulnerability Analysis Framework (VAF), which is a methodology that allows the analysis of 1,363 vulnerabilities to establish a measure to describe the risk in IIoT environments.<\/jats:p>","DOI":"10.1145\/3381038","type":"journal-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T15:58:08Z","timestamp":1588607888000},"page":"1-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":78,"title":["A Survey of IIoT Protocols"],"prefix":"10.1145","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5687-1927","authenticated-orcid":false,"given":"Santiago","family":"Figueroa-Lorenzo","sequence":"first","affiliation":[{"name":"Ceit and Universidad de Navarra, San Sebasti\u00e1n, Spain"}]},{"given":"Javier","family":"A\u00f1orga","sequence":"additional","affiliation":[{"name":"Ceit and Universidad de Navarra, San Sebasti\u00e1n, Spain"}]},{"given":"Saioa","family":"Arrizabalaga","sequence":"additional","affiliation":[{"name":"Ceit and Universidad de Navarra, San Sebasti\u00e1n, Spain"}]}],"member":"320","published-online":{"date-parts":[[2020,4,26]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Practical industrial internet of things security","author":"Bhattacharjee S."},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"R. Shirey. 2007. Internet security glossary version 2. Retrieved from https:\/\/tools.ietf.org\/html\/rfc4949.  R. Shirey. 2007. Internet security glossary version 2. Retrieved from https:\/\/tools.ietf.org\/html\/rfc4949.","DOI":"10.17487\/rfc4949"},{"key":"e_1_2_1_3_1","unstructured":"S. Whalen M. Bishop and S. Engle. 2005. Protocol vulnerability analysis. Citeseer 14 (2005). Retrieved from https:\/\/pdfs.semanticscholar.org\/cb46\/7b25e76e309b15fef603882c8b9892a2ddc7.pdf 7.  S. Whalen M. Bishop and S. Engle. 2005. Protocol vulnerability analysis. Citeseer 14 (2005). Retrieved from https:\/\/pdfs.semanticscholar.org\/cb46\/7b25e76e309b15fef603882c8b9892a2ddc7.pdf 7."},{"key":"e_1_2_1_4_1","unstructured":"K. Stouffer V. Pillitteri S. Lightman M. Abrams and A. Hahn. 2015. NIST special publication 800-82: Guide to industrial control systems (ICS) security. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-82r2.pdf.  K. Stouffer V. Pillitteri S. Lightman M. Abrams and A. Hahn. 2015. NIST special publication 800-82: Guide to industrial control systems (ICS) security. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-82r2.pdf."},{"key":"e_1_2_1_5_1","unstructured":"R. Martin etal 2016. Industrial Internet Security Framework Technical Report Second. Highland Avenue Needham MA. Industrial Internet Consortium. Retrieved from https:\/\/www.iiconsortium.org\/pdf\/IIC_PUB_G4_V1.00_PB-3.pdf.  R. Martin et al. 2016. Industrial Internet Security Framework Technical Report Second. Highland Avenue Needham MA. Industrial Internet Consortium. Retrieved from https:\/\/www.iiconsortium.org\/pdf\/IIC_PUB_G4_V1.00_PB-3.pdf."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2015.7432797"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 5th International Conference on Networked Sensing Systems. 35--38","author":"Trifa V. M.","year":"2008"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of IEEE 17th International Conference on Emerging Technologies and Factory Automation (ETFA\u201912)","author":"Yang J.","year":"2012"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the IEEE International Conference on Smart Energy Grid Engineering (SEGE\u201917)","author":"Alaerjan A.","year":"2017"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17081802"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE\u201912)","author":"Khan A. A.","year":"2012"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 34th Chinese Control Conference (CCC\u201915)","author":"Wenbo Y.","year":"2015"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 24th Mediterranean Conference on Control and Automation (MED\u201916)","author":"Afifi G.","year":"2016"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 10th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES\u201919)","author":"Khanchuea K.","year":"2019"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN\u201915)","author":"Vivek G. V.","year":"2015"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA\u201916)","author":"Ashraf S. A.","year":"2016"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems (ICPS\u201919)","author":"Orosz P.","year":"2019"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 19th International Multi-Topic Conference (INMIC\u201916)","author":"Ahmed A.","year":"2016"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 2nd IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC\u201918). 1970--1975","author":"Feng X.","year":"2018"},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"G. A. Akpakwu B. J. Silva G. P. Hancke and A. M. Abu-Mahfouz. 2018. A survey on 5g networks for the internet of things: Communication technologies and challenges. IEEE Access 6 (2018) 3619--3647. DOI:https:\/\/doi.org\/10.1109\/ACCESS.2017.2779844  G. A. Akpakwu B. J. Silva G. P. Hancke and A. M. Abu-Mahfouz. 2018. A survey on 5g networks for the internet of things: Communication technologies and challenges. IEEE Access 6 (2018) 3619--3647. DOI:https:\/\/doi.org\/10.1109\/ACCESS.2017.2779844","DOI":"10.1109\/ACCESS.2017.2779844"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/LARS\/SBR\/WRE.2018.00030"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the IEEE Region 10 Humanitarian Technology Conference (R10-HTC\u201916)","author":"Kodali R. K.","year":"2016"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.29"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2015.7436385"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 6th International Conference on Digital Information, Networking, and Wireless Communications (DINWC\u201918)","author":"Halabi D.","year":"2018"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the International Conference on Electronics, Circuits, and Systems (ICECS\u201915)","author":"Grover M.","year":"2015"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the 3rd International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS\u201916)","author":"Sebastian E. J.","year":"2016"},{"key":"e_1_2_1_28_1","unstructured":"P. H. B. Shinde A. Chaudhari P. Chaure M. Chandgude and P. Waghmare. 2017. Smart home automation system using android application. Retrieved from https:\/\/www.irjet.net\/archives\/V4\/i4\/IRJET-V4I4604.pdf.  P. H. B. Shinde A. Chaudhari P. Chaure M. Chandgude and P. Waghmare. 2017. Smart home automation system using android application. Retrieved from https:\/\/www.irjet.net\/archives\/V4\/i4\/IRJET-V4I4604.pdf."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2017.8285063"},{"key":"e_1_2_1_30_1","volume-title":"IET International Conference Information Science and Control Engineering (ICISCE\u201912)","author":"Lin H. P."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR\u201910)","author":"Yang W.","year":"2010"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the IEEE Globecom Workshops (GC\u201912)","author":"Rana S.","year":"2012"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the IFIP Wireless Days Conference (WD\u201913)","author":"Schaefer F. M.","year":"2013"},{"key":"e_1_2_1_34_1","unstructured":"C. Swedberg. 2014. General motors factory installs smart bolts in engine blocks cylinder heads. RFID J. Retrieved from https:\/\/www.rfidjournal.com\/articles\/view?11329.  C. Swedberg. 2014. General motors factory installs smart bolts in engine blocks cylinder heads. RFID J. Retrieved from https:\/\/www.rfidjournal.com\/articles\/view?11329."},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 2nd International Conference on Telecommunication and Networks (TEL-NET\u201917)","author":"Bindroo O.","year":"2017"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 6th International Conference on Wireless Networks and Mobile Communications (WINCOM\u201918)","author":"Haidine A.","year":"2018"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC\u201919)","author":"Nsiah K. A.","year":"2019"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICTA.2018.8705949"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC\u201919)","author":"Du J.","year":"2019"},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the International ICCAS-SICE Joint Conference. 4591--4594","author":"Hayashi H."},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the IEEE Innovative Smart Grid Technologies-Asia (ISGT ASIA\u201915)","author":"Kuzlu M.","year":"2015"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETNCC.2011.5958516"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the IEEE Conference on Emerging Technologies and Factory Automation (ETFA\u201911)","author":"Ferrari P.","year":"2011"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2012.6201235"},{"key":"e_1_2_1_45_1","unstructured":"K. T. Smith and C. Architect. 2017. Cybersecurity and the IoT\u2014Threats. Best Practices and Lessons Learned. Retrieved from https:\/\/bit.ly\/2Ua6tMq.  K. T. Smith and C. Architect. 2017. Cybersecurity and the IoT\u2014Threats. Best Practices and Lessons Learned. Retrieved from https:\/\/bit.ly\/2Ua6tMq."},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology (TENCON\u201901)","volume":"1","author":"Hooi T. C.","year":"2001"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the 14th International Conference on Control, Automation and Systems (ICCAS\u201914)","author":"Liaw D.","year":"2014"},{"key":"e_1_2_1_48_1","volume-title":"Proceedings of the International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE\u201917)","author":"Abashar A. I.","year":"2017"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the International Conference Industrial Engineering Applications and Manufacturing (ICIEAM\u201917)","author":"Khuzyatov S. S.","year":"2017"},{"key":"e_1_2_1_50_1","unstructured":"J. Rinaldi. 2003. An overview of ethernet\/IP. An Application Layer Protocol for Industrial Automation. Retrieved from https:\/\/www.rtautomation.com\/technologies\/ethernetip\/.  J. Rinaldi. 2003. An overview of ethernet\/IP. An Application Layer Protocol for Industrial Automation. Retrieved from https:\/\/www.rtautomation.com\/technologies\/ethernetip\/."},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the 2nd International Conference on Emerging Computer Information Technology. 1--5. DOI:https:\/\/doi.org\/10","author":"Rao S.","year":"2017"},{"key":"e_1_2_1_52_1","unstructured":"Thomas Hilz. 2015. HART at the speed of Ethernet. Retrieved from http:\/\/www.controlengeurope.com\/article\/106724\/HART-at-the-speed-of-Ethernet.aspx.  Thomas Hilz. 2015. HART at the speed of Ethernet. Retrieved from http:\/\/www.controlengeurope.com\/article\/106724\/HART-at-the-speed-of-Ethernet.aspx."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAT.2013.7055082"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2007.4304113"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the 17th IEEE International Conference on Computer Information Technology (CIT\u201917)","author":"Tenkanen T.","year":"2017"},{"key":"e_1_2_1_56_1","unstructured":"Triangle Microworks. 2018. Scada Data Gateway. Retrieved from http:\/\/www.trianglemicroworks.com\/products\/scada-data-gateway\/iccp-tase-2.  Triangle Microworks. 2018. Scada Data Gateway. Retrieved from http:\/\/www.trianglemicroworks.com\/products\/scada-data-gateway\/iccp-tase-2."},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of the IEEE Students\u2019 Conference on Electrical, Electronics, and Computer Science (SCEECS\u201914)","author":"Bonganay A. C. D.","year":"2014"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1999.816721"},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the IEEE Conference on Interdisciplinary Cyber-Physical Systems (ICPS\u201918)","author":"Haskamp H.","year":"2018"},{"key":"e_1_2_1_60_1","volume-title":"Industrial Automation with SCADA\u202f: Concepts, Communications and Security","author":"Manoj K. S.","edition":"1"},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the International SoC Design Conference (ISOCC\u201914)","author":"Kim S.","year":"2014"},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the International Conference on Anti-Counterfeiting, Security and Identification (ASID\u201918)","volume":"145","author":"Chen B.","year":"2017"},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the IEEE Innovation of Smart Grid Technology-Asia (ISGT Asia\u201913)","author":"Mago N. V.","year":"2013"},{"key":"e_1_2_1_64_1","unstructured":"I.A.N.A. 2019. Service name and transport protocol port number registry. Retrieved from https:\/\/bit.ly\/346PQCN.  I.A.N.A. 2019. Service name and transport protocol port number registry. Retrieved from https:\/\/bit.ly\/346PQCN."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3333501"},{"key":"e_1_2_1_66_1","volume-title":"Proceedings of the International Conference on Business Management and Electronic Information","volume":"2","author":"Zhang X.","year":"2011"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the 4th International Conference on Advanced Computing and Communication Systems (ICACCS\u201917) 2017","author":"Nakhuva B. N.","year":"2017"},{"key":"e_1_2_1_68_1","first-page":"57","article-title":"Defense against REST-based web service attacks for enterprise systems","volume":"13","author":"Lee H.","year":"2013","journal-title":"Commun. IIMA"},{"key":"e_1_2_1_69_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. 365--379","author":"Wang R.","year":"2012"},{"key":"e_1_2_1_70_1","unstructured":"Egor Homakov. 2012. The most common oauth2 vulnerability. Retrieved from http:\/\/homakov.blogspot.com\/2012\/07\/saferweb-most-common-oauth2.html.  Egor Homakov. 2012. The most common oauth2 vulnerability. Retrieved from http:\/\/homakov.blogspot.com\/2012\/07\/saferweb-most-common-oauth2.html."},{"key":"e_1_2_1_71_1","volume-title":"Proceedings of the 12th International Conference for Internet Technology and Secured Transactions (ICITST\u201917)","author":"Clincy V.","year":"2017"},{"key":"e_1_2_1_72_1","unstructured":"Open Web Application Security Project. 2018. REST Security Cheat Sheet. Retrieved from https:\/\/www.owasp.org\/index.php\/REST_Security_Cheat_Sheet.  Open Web Application Security Project. 2018. REST Security Cheat Sheet. Retrieved from https:\/\/www.owasp.org\/index.php\/REST_Security_Cheat_Sheet."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/REV.2015.7087259"},{"key":"e_1_2_1_74_1","unstructured":"F. Greco. 2014. API design and websocket. Retrieved from https:\/\/www.slideshare.net\/grecof\/api-designandweb-socket?from_action=save.  F. Greco. 2014. API design and websocket. Retrieved from https:\/\/www.slideshare.net\/grecof\/api-designandweb-socket?from_action=save."},{"key":"e_1_2_1_75_1","unstructured":"H. D. Center. 2019. WebSocket Security. Retrieved from https:\/\/devcenter.heroku.com\/articles\/websocket-security.  H. D. Center. 2019. WebSocket Security. Retrieved from https:\/\/devcenter.heroku.com\/articles\/websocket-security."},{"key":"e_1_2_1_76_1","unstructured":"M. Shema S. Shekyan and V. Toukharian. 2012. Hacking with webSockets. Retrieved from https:\/\/bit.ly\/38SmPxt.  M. Shema S. Shekyan and V. Toukharian. 2012. Hacking with webSockets. Retrieved from https:\/\/bit.ly\/38SmPxt."},{"key":"e_1_2_1_77_1","volume-title":"Proceedings of the International Conference on Computational and Information Sciences. 1628--1631","author":"Chen G.","year":"2013"},{"key":"e_1_2_1_78_1","unstructured":"IBM. 2019. Developing client applications. Retrieved from https:\/\/www.ibm.com\/support\/knowledgecenter\/en\/SSWMAJ_5.0.0\/com.ibm.ism.doc\/Developing\/develop_guide.html.  IBM. 2019. Developing client applications. Retrieved from https:\/\/www.ibm.com\/support\/knowledgecenter\/en\/SSWMAJ_5.0.0\/com.ibm.ism.doc\/Developing\/develop_guide.html."},{"key":"e_1_2_1_79_1","unstructured":"IBM Integration Bus. 2019. Configuring the integration node to use SSL with JMS nodes. Retrieved from https:\/\/ibm.co\/36ENEDH.  IBM Integration Bus. 2019. Configuring the integration node to use SSL with JMS nodes. Retrieved from https:\/\/ibm.co\/36ENEDH."},{"key":"e_1_2_1_80_1","unstructured":"O. Corporation. 2010. Using JAAS-Based Authentication. Retrieved from https:\/\/docs.oracle.com\/cd\/E19879-01\/820-6740\/gepfq\/index.html.  O. Corporation. 2010. Using JAAS-Based Authentication. Retrieved from https:\/\/docs.oracle.com\/cd\/E19879-01\/820-6740\/gepfq\/index.html."},{"key":"e_1_2_1_81_1","unstructured":"G. S. Kalra. 2014. A pentesters guide to hacking activeMQ-based JMS applications. Retrieved from https:\/\/bit.ly\/2P43Vg6.  G. S. Kalra. 2014. A pentesters guide to hacking activeMQ-based JMS applications. Retrieved from https:\/\/bit.ly\/2P43Vg6."},{"key":"e_1_2_1_82_1","unstructured":"Object Management Group (OMG). 2019. The Real-Time Publish-Subscribe Wire Protocol DDS Interoperability Wire Protocol (DDSI-RTPS) Version 2.3. Retrieved from https:\/\/www.omg.org\/spec\/DDSI-RTPS\/2.3\/PDF.  Object Management Group (OMG). 2019. The Real-Time Publish-Subscribe Wire Protocol DDS Interoperability Wire Protocol (DDSI-RTPS) Version 2.3. Retrieved from https:\/\/www.omg.org\/spec\/DDSI-RTPS\/2.3\/PDF."},{"key":"e_1_2_1_83_1","unstructured":"OMG. 2012. Extensible and dynamic topic types for dds. Retrieved from https:\/\/www.omg.org\/spec\/DDS-XTypes\/About-DDS-XTypes\/.  OMG. 2012. Extensible and dynamic topic types for dds. Retrieved from https:\/\/www.omg.org\/spec\/DDS-XTypes\/About-DDS-XTypes\/."},{"key":"e_1_2_1_84_1","volume-title":"Proceedings of the IEEE\/ACM 18th International Symposium on Distributed Simulation and Real Time Applications. 77--84","author":"Bertaux L.","year":"2014"},{"key":"e_1_2_1_85_1","volume-title":"Proceedings of the International Conference on Information Networking (ICOIN\u201916)","author":"Yoon G.","year":"2016"},{"key":"e_1_2_1_86_1","volume-title":"Proceedings of the IEEE International Conference on Smart Energy Grid Engineering (SEGE\u201918)","author":"Alaerjan A.","year":"2018"},{"key":"e_1_2_1_87_1","volume-title":"Proceedings of the International Conference on Applied Electronics (AE\u201915)","author":"Peniak P."},{"key":"e_1_2_1_88_1","unstructured":"OMG. 2018. DDS Security. Retrieved from https:\/\/www.omg.org\/spec\/DDS-SECURITY\/About-DDS-SECURITY\/.  OMG. 2018. DDS Security. Retrieved from https:\/\/www.omg.org\/spec\/DDS-SECURITY\/About-DDS-SECURITY\/."},{"key":"e_1_2_1_89_1","volume-title":"Proceedings of the Australian Information Security Management Conference. 132--139","author":"White T."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2018.8659368"},{"key":"e_1_2_1_91_1","doi-asserted-by":"crossref","unstructured":"P. Saint-andre. 2011. Extensible messaging and presence protocol (XMPP): Core. Retrieved from https:\/\/xmpp.org\/rfcs\/rfc6120.html.  P. Saint-andre. 2011. Extensible messaging and presence protocol (XMPP): Core. Retrieved from https:\/\/xmpp.org\/rfcs\/rfc6120.html.","DOI":"10.17487\/rfc6120"},{"key":"e_1_2_1_92_1","doi-asserted-by":"crossref","unstructured":"Peter Saint-Andre. 2014. Extensible messaging and presence protocol (XMPP): Core. Retrieved from https:\/\/xmpp.org\/rfcs\/rfc6120.html.  Peter Saint-Andre. 2014. Extensible messaging and presence protocol (XMPP): Core. Retrieved from https:\/\/xmpp.org\/rfcs\/rfc6120.html.","DOI":"10.17487\/RFC7622"},{"key":"e_1_2_1_93_1","unstructured":"K. Zeilenga. 2019. XEP-0258: Security Labels in XMPP. Retrieved from https:\/\/xmpp.org\/extensions\/xep-0258.html.  K. Zeilenga. 2019. XEP-0258: Security Labels in XMPP. Retrieved from https:\/\/xmpp.org\/extensions\/xep-0258.html."},{"key":"e_1_2_1_94_1","unstructured":"C. Davidland and L. George. 2019. XEP-0419: Improving baseline security in XMPP. Retrieved from https:\/\/xmpp.org\/extensions\/xep-0419.html.  C. Davidland and L. George. 2019. XEP-0419: Improving baseline security in XMPP. Retrieved from https:\/\/xmpp.org\/extensions\/xep-0419.html."},{"key":"e_1_2_1_95_1","unstructured":"P. Saint-andre. 2018. XEP-0205: Best practices to discourage denial of service attacks. Retrieved from https:\/\/xmpp.org\/extensions\/xep-0205.html.  P. Saint-andre. 2018. XEP-0205: Best practices to discourage denial of service attacks. Retrieved from https:\/\/xmpp.org\/extensions\/xep-0205.html."},{"key":"e_1_2_1_96_1","volume-title":"Proceedings of the International Conference on Communications (COMM\u201918)","author":"Chifor B.","year":"2018"},{"key":"e_1_2_1_97_1","volume-title":"Proceedings of the 5th International Conference on Internet of Things: Systems, Management, and Security. 216--221","author":"Esser A.","year":"2018"},{"key":"e_1_2_1_98_1","volume-title":"Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI\u201917)","author":"Sudar C.","year":"2017"},{"key":"e_1_2_1_99_1","volume-title":"Proceedings of the International Conference on Intelligent Transportation, Big Data 8 Smart City (ICITBS\u201918)","author":"Li B.","year":"2018"},{"key":"e_1_2_1_100_1","volume-title":"Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN\u201918)","author":"Liu Z.","year":"2018"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.041513.00174"},{"key":"e_1_2_1_102_1","doi-asserted-by":"crossref","unstructured":"Y. Mehmood C. G\u00f6rg M. Muehleisen and A. Timm-Giel. 2015. Mobile M2M communication architectures upcoming challenges applications and future directions. EURASIP J. Wirel. Commun. Netw. 250 (2015). DOI:https:\/\/doi.org\/10.1186\/s13638-015-0479-y  Y. Mehmood C. G\u00f6rg M. Muehleisen and A. Timm-Giel. 2015. Mobile M2M communication architectures upcoming challenges applications and future directions. EURASIP J. Wirel. Commun. Netw. 250 (2015). DOI:https:\/\/doi.org\/10.1186\/s13638-015-0479-y","DOI":"10.1186\/s13638-015-0479-y"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5490974"},{"key":"e_1_2_1_104_1","unstructured":"T. Specification. 2015. Security architecture (3GPP TS 33.401 version 12.13.0 Release 12). Retrieved from https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2296.  T. Specification. 2015. Security architecture (3GPP TS 33.401 version 12.13.0 Release 12). Retrieved from https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2296."},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7263367"},{"key":"e_1_2_1_106_1","unstructured":"3GPP. 2012. Service requirements for Home Node B (HNB) and Home eNode B (HeNB). Retrieved from https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=626.  3GPP. 2012. Service requirements for Home Node B (HNB) and Home eNode B (HeNB). Retrieved from https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=626."},{"key":"e_1_2_1_107_1","unstructured":"3GPP. 2017. Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Retrieved from https:\/\/bit.ly\/2tfmBBr.  3GPP. 2017. Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Retrieved from https:\/\/bit.ly\/2tfmBBr."},{"key":"e_1_2_1_108_1","unstructured":"S. Teral. 2019. 5G best choice architecture. IHS Markit Technol. Retrieved from https:\/\/cdn.ihs.com\/www\/prot\/pdf\/0519\/IHSMarkit5GBestChoiceArchitecture.pdf.  S. Teral. 2019. 5G best choice architecture. IHS Markit Technol. Retrieved from https:\/\/cdn.ihs.com\/www\/prot\/pdf\/0519\/IHSMarkit5GBestChoiceArchitecture.pdf."},{"key":"e_1_2_1_109_1","unstructured":"5G Americas. 2018. The evolution of security in 5G. Retrieved from https:\/\/www.5gamericas.org\/wp-content\/uploads\/2019\/08\/5G-Security-White-Paper-07-26-19-FINAL.pdf.  5G Americas. 2018. The evolution of security in 5G. Retrieved from https:\/\/www.5gamericas.org\/wp-content\/uploads\/2019\/08\/5G-Security-White-Paper-07-26-19-FINAL.pdf."},{"key":"e_1_2_1_110_1","volume-title":"Proceedings of the International Conference on Big Data and Internet of Thing. 186--190","author":"Suryanegara M."},{"key":"e_1_2_1_111_1","unstructured":"5G Americas. 2018. The evolution of security in 5G. Retrieved from https:\/\/www.5gamericas.org\/wp-content\/uploads\/2019\/08\/5G-Security-White-Paper-07-26-19-FINAL.pdf.  5G Americas. 2018. The evolution of security in 5G. Retrieved from https:\/\/www.5gamericas.org\/wp-content\/uploads\/2019\/08\/5G-Security-White-Paper-07-26-19-FINAL.pdf."},{"key":"e_1_2_1_112_1","volume-title":"Coppen","author":"Cohn J.","year":"2015"},{"key":"e_1_2_1_113_1","unstructured":"M. Version. 2019. MQTT Version 5.0. Retrieved from https:\/\/docs.oasis-open.org\/mqtt\/mqtt\/v5.0\/mqtt-v5.0.html.  M. Version. 2019. MQTT Version 5.0. Retrieved from https:\/\/docs.oasis-open.org\/mqtt\/mqtt\/v5.0\/mqtt-v5.0.html."},{"key":"e_1_2_1_114_1","volume-title":"Proceedings of the International Conference on Engineering 8 MIS (ICEMIS\u201917)","author":"Yassein M. B.","year":"2017"},{"key":"e_1_2_1_115_1","volume-title":"Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI\u201918)","author":"Harsha M. S.","year":"2018"},{"key":"e_1_2_1_116_1","unstructured":"M. Erber. 2019. Role based access control to secure an MQTT broker. Retrieved from https:\/\/www.hivemq.com\/blog\/rbac-for-the-control-center-with-ese\/.  M. Erber. 2019. Role based access control to secure an MQTT broker. Retrieved from https:\/\/www.hivemq.com\/blog\/rbac-for-the-control-center-with-ese\/."},{"key":"e_1_2_1_117_1","volume-title":"Proceedings of the IEEE International Conference on Communications Workshops (ICC\u201916)","author":"Niruntasukrat A.","year":"2016"},{"key":"e_1_2_1_118_1","unstructured":"T. H. Team. 2015. TLS\/SSL-MQTT security fundamentals. Retrieved from https:\/\/www.hivemq.com\/blog\/mqtt-security-fundamentals-tls-ssl\/.  T. H. Team. 2015. TLS\/SSL-MQTT security fundamentals. Retrieved from https:\/\/www.hivemq.com\/blog\/mqtt-security-fundamentals-tls-ssl\/."},{"key":"e_1_2_1_119_1","doi-asserted-by":"crossref","unstructured":"S. H. Ramos M. T. Villalba and R. Lacuesta. 2018. MQTT security: A novel fuzzing approach. Wirel. Commun. Mob. Comput. 11 (2018).  S. H. Ramos M. T. Villalba and R. Lacuesta. 2018. MQTT security: A novel fuzzing approach. Wirel. Commun. Mob. Comput. 11 (2018).","DOI":"10.1155\/2018\/8261746"},{"key":"e_1_2_1_120_1","volume-title":"Proceedings of the 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI\u201917)","author":"Andy S.","year":"2017"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/ADCOM.2014.7103240"},{"key":"e_1_2_1_122_1","doi-asserted-by":"crossref","unstructured":"C. Bormann S. Lemay H. Tschofenig K. Hartke B. Silverajan and B. Raymor. 2018. CoAP (constrained application protocol) over TCP TLS and WebSockets. Retrieved from https:\/\/tools.ietf.org\/html\/rfc8323.  C. Bormann S. Lemay H. Tschofenig K. Hartke B. Silverajan and B. Raymor. 2018. CoAP (constrained application protocol) over TCP TLS and WebSockets. Retrieved from https:\/\/tools.ietf.org\/html\/rfc8323.","DOI":"10.17487\/RFC8323"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDSC.2016.7460363"},{"key":"e_1_2_1_124_1","volume-title":"Proceedings of the 2nd International Conference on Future Generation Communication Technologies (FGCT\u201913)","author":"Alghamdi T. A.","year":"2013"},{"key":"e_1_2_1_125_1","volume-title":"Proceedings of the IEEE International Conference on Communications (ICC\u201915)","author":"Capossele A.","year":"2015"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"e_1_2_1_127_1","volume-title":"Proceedings of the 5th International Conference on Advanced Computing 8 Communication Systems (ICACCS\u201919)","author":"Arvind S.","year":"2019"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/SysEng.2017.8088251"},{"key":"e_1_2_1_129_1","volume-title":"Semantic service provisioning for 6LoWPAN: Powering internet of things applications on web","author":"Han N. S."},{"key":"e_1_2_1_130_1","doi-asserted-by":"crossref","unstructured":"M. Phillips P. Adams D. Rokicki and E. Johnson. 2011. URI Scheme for Java(tm) Message Service 1.0. Retrieved from https:\/\/tools.ietf.org\/html\/rfc6167.  M. Phillips P. Adams D. Rokicki and E. Johnson. 2011. URI Scheme for Java(tm) Message Service 1.0. Retrieved from https:\/\/tools.ietf.org\/html\/rfc6167.","DOI":"10.17487\/rfc6167"},{"key":"e_1_2_1_131_1","unstructured":"R. Cohn. 2012. A Comparison of AMQP and MQTT. Retrieved from https:\/\/lists.oasis-open.org\/archives\/amqp\/201202\/msg00086\/StormMQ_WhitePaper_-_A_Comparison_of_AMQP_and_MQTT.pdf.  R. Cohn. 2012. A Comparison of AMQP and MQTT. Retrieved from https:\/\/lists.oasis-open.org\/archives\/amqp\/201202\/msg00086\/StormMQ_WhitePaper_-_A_Comparison_of_AMQP_and_MQTT.pdf."},{"key":"e_1_2_1_132_1","unstructured":"RabittMQ. 2019. Authentication Authorisation Access Control. Retrieved from https:\/\/www.rabbitmq.com\/access-control.html.  RabittMQ. 2019. Authentication Authorisation Access Control. Retrieved from https:\/\/www.rabbitmq.com\/access-control.html."},{"key":"e_1_2_1_133_1","unstructured":"D. Braue. 2019. Small unsophisticated developers perpetuating IoT security lapses. Retrieved from https:\/\/www.cso.com.au\/article\/560521\/small-unsophisticated-developers-perpetuating-iot-security-lapses-ibm\/.  D. Braue. 2019. Small unsophisticated developers perpetuating IoT security lapses. Retrieved from https:\/\/www.cso.com.au\/article\/560521\/small-unsophisticated-developers-perpetuating-iot-security-lapses-ibm\/."},{"key":"e_1_2_1_134_1","volume-title":"Proceedings of the Australian Information Security Management Conference. 70--80","author":"Mcateer I. N."},{"key":"e_1_2_1_135_1","unstructured":"I. Bluetooth SIG. 2016. Bluetooth core specification version 5.0. Retrieved from https:\/\/www.bluetooth.org\/docman\/handlers\/DownloadDoc.ashx?doc_id=421043.  I. Bluetooth SIG. 2016. Bluetooth core specification version 5.0. Retrieved from https:\/\/www.bluetooth.org\/docman\/handlers\/DownloadDoc.ashx?doc_id=421043."},{"key":"e_1_2_1_136_1","unstructured":"Bluetooth SIG Proprietary. 2019. Bluetooth Core Specification v5.1. Retrieved from https:\/\/bit.ly\/2REkBwf.  Bluetooth SIG Proprietary. 2019. Bluetooth Core Specification v5.1. Retrieved from https:\/\/bit.ly\/2REkBwf."},{"key":"e_1_2_1_137_1","unstructured":"K. Ren. 2016. Bluetooth pairing part three low-energy legacy pairing passkey entry. Retrieved from https:\/\/blog.bluetooth.com\/bluetooth-pairing-passkey-entry.  K. Ren. 2016. Bluetooth pairing part three low-energy legacy pairing passkey entry. Retrieved from https:\/\/blog.bluetooth.com\/bluetooth-pairing-passkey-entry."},{"key":"e_1_2_1_138_1","first-page":"15","article-title":"A Comprehensive Review of RFID and Bluetooth Security","volume":"7","author":"Figueroa Lorenzo S.","year":"2019","journal-title":"Practical Analysis. Technologies"},{"key":"e_1_2_1_139_1","unstructured":"M. Ryan. 2015. Crackle. Retrieved from https:\/\/lacklustre.net\/projects\/crackle\/.  M. Ryan. 2015. Crackle. Retrieved from https:\/\/lacklustre.net\/projects\/crackle\/."},{"key":"e_1_2_1_140_1","volume-title":"Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC\u201917)","author":"Cope P.","year":"2017"},{"key":"e_1_2_1_141_1","unstructured":"J. Padgette etal 2017. NIST Special Publication 800-121 Revision 2 Guide to Bluetooth Security. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-121r2.pdf.  J. Padgette et al. 2017. NIST Special Publication 800-121 Revision 2 Guide to Bluetooth Security. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-121r2.pdf."},{"key":"e_1_2_1_142_1","unstructured":"Zigbee Alliance. 2019. ZigBee Specification v 1.0. Retrieved from https:\/\/www.zigbee.org\/wp-content\/uploads\/2014\/11\/docs-05-3474-20-0csg-zigbee-specification.pdf.  Zigbee Alliance. 2019. ZigBee Specification v 1.0. Retrieved from https:\/\/www.zigbee.org\/wp-content\/uploads\/2014\/11\/docs-05-3474-20-0csg-zigbee-specification.pdf."},{"key":"e_1_2_1_143_1","unstructured":"Zigbee Alliance. 2012. Zigbee Specification v2. Retrieved from https:\/\/zigbee.org\/download\/zigbee-3-0-base-device-behavior-specification\/.  Zigbee Alliance. 2012. Zigbee Specification v2. Retrieved from https:\/\/zigbee.org\/download\/zigbee-3-0-base-device-behavior-specification\/."},{"key":"e_1_2_1_144_1","unstructured":"T. Zillner and S. Strobl. 2015. Zigbee exploited. The good the bad and the ugly. In Black Hat USA. Retrieved from https:\/\/zigbee.org\/download\/new-white-paper-zigbee-securing-the-wireless-iot\/.  T. Zillner and S. Strobl. 2015. Zigbee exploited. The good the bad and the ugly. In Black Hat USA. Retrieved from https:\/\/zigbee.org\/download\/new-white-paper-zigbee-securing-the-wireless-iot\/."},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1109\/HIS.2014.7086198"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2516102"},{"key":"e_1_2_1_147_1","unstructured":"NFC Forum. 2017. Core protocol technical specifications. Retrieved from https:\/\/nfc-forum.org\/our-work\/specifications-and-application-documents\/specifications\/protocol-technical-specifications\/.  NFC Forum. 2017. Core protocol technical specifications. Retrieved from https:\/\/nfc-forum.org\/our-work\/specifications-and-application-documents\/specifications\/protocol-technical-specifications\/."},{"key":"e_1_2_1_148_1","volume-title":"Proceedings of the 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS\u201919)","author":"Figueroa S.","year":"2019"},{"key":"e_1_2_1_149_1","doi-asserted-by":"crossref","unstructured":"S. Figueroa J. A\u00f1orga and S. Arrizabalaga. 2019. An attribute-based access control model in RFID systems based on blockchain decentralized applications for healthcare environments. Computers 8 3 (2019). DOI:https:\/\/doi.org\/10.3390\/computers8030057  S. Figueroa J. A\u00f1orga and S. Arrizabalaga. 2019. An attribute-based access control model in RFID systems based on blockchain decentralized applications for healthcare environments. Computers 8 3 (2019). DOI:https:\/\/doi.org\/10.3390\/computers8030057","DOI":"10.3390\/computers8030057"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_7"},{"key":"e_1_2_1_151_1","first-page":"21","article-title":"Practical relay attack on contactless transactions by using NFC mobile phones","volume":"8","author":"Francis L.","year":"2012","journal-title":"Cryptol. Info. Secur. Ser."},{"key":"e_1_2_1_152_1","volume-title":"Proceedings of the 4th Workshop on RFID Security (RFIDsec\u201908)","author":"Hancke G. P.","year":"2008"},{"key":"e_1_2_1_153_1","unstructured":"LoRa Alliance Technical Commitee. 2017. LoRaWAN 1.1 Specification. Retrieved from https:\/\/lora-alliance.org\/resource-hub\/lorawanr-specification-v11.  LoRa Alliance Technical Commitee. 2017. LoRaWAN 1.1 Specification. Retrieved from https:\/\/lora-alliance.org\/resource-hub\/lorawanr-specification-v11."},{"key":"e_1_2_1_154_1","volume-title":"Proceedings of the 3rd IEEE International Conference on Cybernetics (CYBCONF\u201917)","author":"Aras E.","year":"2017"},{"key":"e_1_2_1_155_1","volume-title":"IOP Conf. Ser. Mater. Sci. Eng. 396","author":"Chacko S.","year":"2018"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.03.004"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19112613"},{"key":"e_1_2_1_158_1","unstructured":"M. Iot and S. Report. 2019. Security features of LTE-M and NB-IoT networks. Retrieved from https:\/\/www.gsma.com\/iot\/resources\/security-features-of-ltem-nbiot.  M. Iot and S. Report. 2019. Security features of LTE-M and NB-IoT networks. Retrieved from https:\/\/www.gsma.com\/iot\/resources\/security-features-of-ltem-nbiot."},{"key":"e_1_2_1_159_1","volume-title":"Proceedings of the Global IoT Summit (GIoTS\u201919)","author":"Coman F. L.","year":"2019"},{"key":"e_1_2_1_160_1","volume-title":"Proceedings of the IEEE 17th International Symposium on Network Computing and Applications (NCA\u201918)","author":"Raposo D.","year":"2018"},{"key":"e_1_2_1_161_1","unstructured":"R. Budampati and S. Kolavennu. 2016. Industrial Wireless Sensor Networks. Monitoring Control and Automation. Elsevier.  R. Budampati and S. Kolavennu. 2016. Industrial Wireless Sensor Networks. Monitoring Control and Automation. Elsevier."},{"key":"e_1_2_1_162_1","volume-title":"Proceedings of the IEEE Conference on Emerging Technologies 8 Factory Automation. 1--8. DOI:https:\/\/doi.org\/10","author":"Raza S.","year":"2009"},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2045373"},{"key":"e_1_2_1_164_1","doi-asserted-by":"crossref","unstructured":"L. Bayou D. Espes N. Cuppens-Boulahia and F. Cuppens. 2017. Security analysis of wirelessHART communication scheme bt\u2014Foundations and practice of security. (2017) 223--238. Retrieved from https:\/\/hal.archives-ouvertes.fr\/hal-01411385\/document.  L. Bayou D. Espes N. Cuppens-Boulahia and F. Cuppens. 2017. Security analysis of wirelessHART communication scheme bt\u2014Foundations and practice of security. (2017) 223--238. Retrieved from https:\/\/hal.archives-ouvertes.fr\/hal-01411385\/document.","DOI":"10.1007\/978-3-319-51966-1_15"},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5473869"},{"key":"e_1_2_1_166_1","unstructured":"M. Smith. 2018. EZ-Wave: A Z-Wave hacking tool capable of breaking bulbs abusing Z-Wave devices. Retrieved from https:\/\/www.csoonline.com\/article\/3024217\/ez-wave-z-wave-hacking-tool-capable-of-breaking-bulbs-and-abusing-z-wave-devices.html.  M. Smith. 2018. EZ-Wave: A Z-Wave hacking tool capable of breaking bulbs abusing Z-Wave devices. Retrieved from https:\/\/www.csoonline.com\/article\/3024217\/ez-wave-z-wave-hacking-tool-capable-of-breaking-bulbs-and-abusing-z-wave-devices.html."},{"key":"e_1_2_1_167_1","unstructured":"L. Rouch. 2019. A universal controller to take over a z-wave network. Black Hat Present. Retrieved from https:\/\/ubm.io\/2U4WKau.  L. Rouch. 2019. A universal controller to take over a z-wave network. Black Hat Present. Retrieved from https:\/\/ubm.io\/2U4WKau."},{"key":"e_1_2_1_168_1","unstructured":"B. Fouladi and S. Ghanoun. 2013. Security evaluation of the z-wave wireless protocol. Black Hat 6 (2013). Retrieved from https:\/\/bit.ly\/2PurBZS.  B. Fouladi and S. Ghanoun. 2013. Security evaluation of the z-wave wireless protocol. Black Hat 6 (2013). Retrieved from https:\/\/bit.ly\/2PurBZS."},{"key":"e_1_2_1_169_1","volume-title":"e. V. (PNO)","author":"P.","year":"2014"},{"key":"e_1_2_1_170_1","volume-title":"Proceedings of the 4th International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC\u201914)","author":"Yang M.","year":"2014"},{"key":"e_1_2_1_171_1","unstructured":"C. Henning. 2014. PROFINET for network geeks (and those who want to be). Retrieved from https:\/\/us.profinet.com\/profinet-network-geeks-want\/.  C. Henning. 2014. PROFINET for network geeks (and those who want to be). Retrieved from https:\/\/us.profinet.com\/profinet-network-geeks-want\/."},{"key":"e_1_2_1_172_1","volume-title":"Proceedings of the International Conference onPerformance Engineering (ICPE\u201915) and International Conference on New Technologies and Distributed Systems (NTDS\u201915)","author":"Drias Z.","year":"2015"},{"key":"e_1_2_1_173_1","volume-title":"Proceedings of the International Computer Software and Applications Conference","volume":"1","author":"\u00c5kerberg J.","year":"2009"},{"key":"e_1_2_1_174_1","unstructured":"Tridium Europe Limited. 2017. Tridium Niagara Framework Smart Buildings Guide Specification. West Sussex.  Tridium Europe Limited. 2017. Tridium Niagara Framework Smart Buildings Guide Specification. West Sussex."},{"key":"e_1_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906943"},{"key":"e_1_2_1_176_1","unstructured":"P. Zito 2017. What is tridium? Part 1. Retrieved from http:\/\/buildingautomationmonthly.com\/what-is-tridium\/.  P. Zito 2017. What is tridium? Part 1. Retrieved from http:\/\/buildingautomationmonthly.com\/what-is-tridium\/."},{"key":"e_1_2_1_177_1","unstructured":"Tridium. 2017. Niagara AX 3. 8u3 Features overview. Retrieved from https:\/\/bit.ly\/2rhOx6R.  Tridium. 2017. Niagara AX 3. 8u3 Features overview. Retrieved from https:\/\/bit.ly\/2rhOx6R."},{"key":"e_1_2_1_178_1","volume-title":"Black Hat USA","author":"Rios B.","year":"2014"},{"key":"e_1_2_1_179_1","volume-title":"Proceedings of the 13th International Conference on Computer Engineering and Systems (ICCES\u201918)","author":"Elshaer A. M.","year":"2018"},{"key":"e_1_2_1_180_1","volume-title":"Proceedings of the International Conference on Computing, Networking and Communications (ICNC\u201917)","author":"King Z.","year":"2017"},{"key":"e_1_2_1_181_1","volume-title":"Black Hat USA","author":"Beresford D.","year":"2011"},{"key":"e_1_2_1_182_1","unstructured":"Siemens. 2013. S7-1500\u2014Industrial Ethernet CP. Retrieved from https:\/\/support.industry.siemens.com\/cs\/attachments\/76476576\/GH_CP1543-1_76_en-US.pdf.  Siemens. 2013. S7-1500\u2014Industrial Ethernet CP. Retrieved from https:\/\/support.industry.siemens.com\/cs\/attachments\/76476576\/GH_CP1543-1_76_en-US.pdf."},{"key":"e_1_2_1_183_1","unstructured":"D. Nardella. 2018. Snap 7. Retrieved from http:\/\/snap7.sourceforge.net\/.  D. Nardella. 2018. Snap 7. Retrieved from http:\/\/snap7.sourceforge.net\/."},{"key":"e_1_2_1_184_1","unstructured":"Siemens AG. 2019. Security with SIMATIC control. Retrieved from https:\/\/support.industry.siemens.com\/cs\/attachments\/90885010\/77431846_Security_SIMATIC_DOKU_V20_en.pdf.  Siemens AG. 2019. Security with SIMATIC control. Retrieved from https:\/\/support.industry.siemens.com\/cs\/attachments\/90885010\/77431846_Security_SIMATIC_DOKU_V20_en.pdf."},{"key":"e_1_2_1_185_1","volume-title":"Hacktivity","author":"Timorin A.","year":"2014"},{"key":"e_1_2_1_186_1","unstructured":"ODVA. 2019. Securing EtherNet\/IP Networks. Retrieved from https:\/\/bit.ly\/2Ywb1go.  ODVA. 2019. Securing EtherNet\/IP Networks. Retrieved from https:\/\/bit.ly\/2Ywb1go."},{"key":"e_1_2_1_187_1","volume-title":"Proceedings of the CEUR Workshop Proceedings. 54--57","author":"Tacliad F."},{"key":"e_1_2_1_188_1","unstructured":"Hart Communication Fundation. 2013. Hart communication. application guide. Retrieved from https:\/\/www.fieldcommgroup.org\/sites\/default\/files\/technologies\/hart\/ApplicationGuide_r7.1.pdf.  Hart Communication Fundation. 2013. Hart communication. application guide. Retrieved from https:\/\/www.fieldcommgroup.org\/sites\/default\/files\/technologies\/hart\/ApplicationGuide_r7.1.pdf."},{"key":"e_1_2_1_189_1","volume-title":"WirelessHART: A security analysis","author":"Duijsens M."},{"key":"e_1_2_1_190_1","unstructured":"F. C. Group. 2019. Digital transformation in the age of IIoT. Retrieved from https:\/\/bit.ly\/36jjUga.  F. C. Group. 2019. Digital transformation in the age of IIoT. Retrieved from https:\/\/bit.ly\/36jjUga."},{"key":"e_1_2_1_191_1","unstructured":"S. Shah and P. Bhargava. 2013. HART over IP for industrial automation networks. Retrieved from https:\/\/www.einfochips.com\/images\/in_sight\/HART_Over_IP_EEIOL_2013JAN30_NET_TA_01.pdf.  S. Shah and P. Bhargava. 2013. HART over IP for industrial automation networks. Retrieved from https:\/\/www.einfochips.com\/images\/in_sight\/HART_Over_IP_EEIOL_2013JAN30_NET_TA_01.pdf."},{"key":"e_1_2_1_192_1","unstructured":"F. C. Group. 2019. Hart technology. Leading the Digital Transformation. Retrieved from https:\/\/www.fieldcommgroup.org\/sites\/default\/files\/technologies\/hart\/HART%20brochure%20web%20view.pdf.  F. C. Group. 2019. Hart technology. Leading the Digital Transformation. Retrieved from https:\/\/www.fieldcommgroup.org\/sites\/default\/files\/technologies\/hart\/HART%20brochure%20web%20view.pdf."},{"key":"e_1_2_1_193_1","unstructured":"S. I. A. GmbH. 2015. HART-IP solution communicates at Ethernet speed. Retrieved from https:\/\/industrial.softing.com\/fileadmin\/sof-files\/pdf\/de\/ia\/Articles\/HART-IP_IEB-1502.pdf].  S. I. A. GmbH. 2015. HART-IP solution communicates at Ethernet speed. Retrieved from https:\/\/industrial.softing.com\/fileadmin\/sof-files\/pdf\/de\/ia\/Articles\/HART-IP_IEB-1502.pdf]."},{"key":"e_1_2_1_194_1","volume-title":"Proceedings of S4x14","author":"Bolshev A.","year":"2019"},{"key":"e_1_2_1_195_1","volume-title":"BACnet: Answers to frequently asked questions. HPAC Heating\/Piping\/AirConditioning","year":"1997"},{"key":"e_1_2_1_196_1","unstructured":"R. Automation. 2006. BACnet MS\/TP Adapter. Retrieved from https:\/\/bit.ly\/38PkxiL.  R. Automation. 2006. BACnet MS\/TP Adapter. Retrieved from https:\/\/bit.ly\/38PkxiL."},{"key":"e_1_2_1_197_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCA.1999.801208"},{"key":"e_1_2_1_198_1","doi-asserted-by":"crossref","unstructured":"H. Merz T. Hansemann and C. H\u00fcbner. 2018. BACnet BT\u2014Building automation: Communication Systems with EIB\/KNX LON and BACnet H. Merz T. Hansemann and C. H\u00fcbner (Eds). Springer International Publishing Cham 209--302.  H. Merz T. Hansemann and C. H\u00fcbner. 2018. BACnet BT\u2014Building automation: Communication Systems with EIB\/KNX LON and BACnet H. Merz T. Hansemann and C. H\u00fcbner (Eds). Springer International Publishing Cham 209--302.","DOI":"10.1007\/978-3-319-73223-7_5"},{"key":"e_1_2_1_199_1","unstructured":"B. Isler. 2010. BACnet to leverage IT. A Whitepaper on BACnet\/IT. Retrieved from http:\/\/www.bacnet.org\/Bibliography\/BACnet_IT_WhitePaper_2016121.pdf.  B. Isler. 2010. BACnet to leverage IT. A Whitepaper on BACnet\/IT. Retrieved from http:\/\/www.bacnet.org\/Bibliography\/BACnet_IT_WhitePaper_2016121.pdf."},{"key":"e_1_2_1_200_1","unstructured":"D. Robin etal 2010. Ashrae Standard BACnet\u2014A data communication protocol for building automation and control networks. Retrieved from http:\/\/www.bacnet.org\/Addenda\/Add-135-2008t.pdf.  D. Robin et al. 2010. Ashrae Standard BACnet\u2014A data communication protocol for building automation and control networks. Retrieved from http:\/\/www.bacnet.org\/Addenda\/Add-135-2008t.pdf."},{"key":"e_1_2_1_201_1","volume-title":"SEC 2015: ICT Systems Security and Privacy Protection. 616--629","author":"Kaur J.","year":"1846"},{"key":"e_1_2_1_202_1","unstructured":"B. Bowers. 2013. How to own a building bacNET attack framework. In ShmooCon. Retrieved from https:\/\/archive.org\/details\/Shmoocon.  B. Bowers. 2013. How to own a building bacNET attack framework. In ShmooCon. Retrieved from https:\/\/archive.org\/details\/Shmoocon."},{"key":"e_1_2_1_203_1","volume-title":"Proceedings of the IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA\u201914)","author":"Pan Z."},{"key":"e_1_2_1_204_1","unstructured":"N. I. Corporation. 2017. The Modbus Protocol In-Depth. Retrieved from http:\/\/www.ni.com\/white-paper\/52134\/en\/.  N. I. Corporation. 2017. The Modbus Protocol In-Depth. Retrieved from http:\/\/www.ni.com\/white-paper\/52134\/en\/."},{"key":"e_1_2_1_205_1","unstructured":"M. Organization. 2018. Modbus\/TCP Security. Retrieved from http:\/\/modbus.org\/docs\/MB-TCP-Security-v21_2018-07-24.pdf.  M. Organization. 2018. Modbus\/TCP Security. Retrieved from http:\/\/modbus.org\/docs\/MB-TCP-Security-v21_2018-07-24.pdf."},{"key":"e_1_2_1_206_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDUSCON.2018.8627306"},{"key":"e_1_2_1_207_1","doi-asserted-by":"crossref","unstructured":"S. Figueroa-Lorenzo J. A\u00f1orga and S. Arrizabalaga. 2019. A role-based access control model in modbus SCADA systems: A centralized model approach. Sensors 19 20 (2019). DOI:https:\/\/doi.org\/10.3390\/s19204455  S. Figueroa-Lorenzo J. A\u00f1orga and S. Arrizabalaga. 2019. A role-based access control model in modbus SCADA systems: A centralized model approach. Sensors 19 20 (2019). DOI:https:\/\/doi.org\/10.3390\/s19204455","DOI":"10.3390\/s19204455"},{"key":"e_1_2_1_208_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2008.08.003"},{"key":"e_1_2_1_209_1","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2015.7129084"},{"key":"e_1_2_1_210_1","unstructured":"O. Foundation. 2002. OPC alarms and events custom interface. Retrieved from http:\/\/advosol.com\/OpcSpecs\/OPC%20AE%201.10%20Specification.pdf.  O. Foundation. 2002. OPC alarms and events custom interface. Retrieved from http:\/\/advosol.com\/OpcSpecs\/OPC%20AE%201.10%20Specification.pdf."},{"key":"e_1_2_1_211_1","unstructured":"OPC Foundation. 2003. OPC historical data access specification. Retrieved from http:\/\/advosol.com\/OpcSpecs\/OPC%20HDA%201.20%20Specification.pdf.  OPC Foundation. 2003. OPC historical data access specification. Retrieved from http:\/\/advosol.com\/OpcSpecs\/OPC%20HDA%201.20%20Specification.pdf."},{"key":"e_1_2_1_212_1","unstructured":"O. Foundation. 1998. OPC Overview. Retrieved from https:\/\/invent.ge\/2Pp0ek2.  O. Foundation. 1998. OPC Overview. Retrieved from https:\/\/invent.ge\/2Pp0ek2."},{"key":"e_1_2_1_213_1","unstructured":"B. P. Hunkar OPC UA vs. OPC Classic. Retrieved from http:\/\/www.dsinteroperability.com\/OPCClassicVSUA.pdf.  B. P. Hunkar OPC UA vs. OPC Classic. Retrieved from http:\/\/www.dsinteroperability.com\/OPCClassicVSUA.pdf."},{"key":"e_1_2_1_214_1","unstructured":"D. P. E. Byres. 2009. OPC security white paper #1 understanding OPC and how it is deployed. Retrieved from http:\/\/www.opcti.com\/opc-security-white-paper-1.aspx.  D. P. E. Byres. 2009. OPC security white paper #1 understanding OPC and how it is deployed. Retrieved from http:\/\/www.opcti.com\/opc-security-white-paper-1.aspx."},{"key":"e_1_2_1_215_1","unstructured":"B. Mcilvride and A. Thomas. 2008. OPC tunnelling\u2014Know your options. Retrieved from https:\/\/bit.ly\/2RwlxCp.  B. Mcilvride and A. Thomas. 2008. OPC tunnelling\u2014Know your options. Retrieved from https:\/\/bit.ly\/2RwlxCp."},{"key":"e_1_2_1_216_1","unstructured":"D. Kominek. 2011. Effective OPC security for control systems\u2014Solutions you can bank on. Retrieved from https:\/\/bit.ly\/37yZtgf.  D. Kominek. 2011. Effective OPC security for control systems\u2014Solutions you can bank on. Retrieved from https:\/\/bit.ly\/37yZtgf."},{"key":"e_1_2_1_217_1","unstructured":"Microsoft. 2018. How to configure RPC dynamic port allocation to work with firewalls. Retrieved from https:\/\/bit.ly\/2GHS8ix.  Microsoft. 2018. How to configure RPC dynamic port allocation to work with firewalls. Retrieved from https:\/\/bit.ly\/2GHS8ix."},{"key":"e_1_2_1_218_1","unstructured":"U. Steinkrauss. 2010. Whitepaper\u2014Overview: OPC unified architecture. Technical overview and short description. Retrieved from http:\/\/www.ascolab.com\/images\/stories\/ascolab\/doc\/ua_whitepaper_technicaloverview_e.pdf.  U. Steinkrauss. 2010. Whitepaper\u2014Overview: OPC unified architecture. Technical overview and short description. Retrieved from http:\/\/www.ascolab.com\/images\/stories\/ascolab\/doc\/ua_whitepaper_technicaloverview_e.pdf."},{"key":"e_1_2_1_219_1","volume-title":"Proceedings of the IEEE International Conference on Industrial Informatics (INDIN\u201913)","author":"Imtiaz J.","year":"2013"},{"key":"e_1_2_1_220_1","volume-title":"OPC Unified Architecture","author":"Wolfgang Mahnke M. D.","edition":"1"},{"key":"e_1_2_1_221_1","volume-title":"Proceedings of the Microsoft Conference Center. 54","author":"Pocock N."},{"key":"e_1_2_1_222_1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI). 2019. OPC UA Security Analysis. [Online]. Retrieved from https:\/\/opcfoundation.org\/wp-content\/uploads\/2017\/11\/OPC-UA-Security-Advise-EN.pdf.  Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI). 2019. OPC UA Security Analysis. [Online]. Retrieved from https:\/\/opcfoundation.org\/wp-content\/uploads\/2017\/11\/OPC-UA-Security-Advise-EN.pdf."},{"key":"e_1_2_1_223_1","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2015.7102199"},{"key":"e_1_2_1_224_1","unstructured":"Ken Curtis. 2005. A DNP3 protocol primer introduction. Retrieved from https:\/\/www.academia.edu\/35049898\/A_DNP3_Protocol_Primer.  Ken Curtis. 2005. A DNP3 protocol primer introduction. Retrieved from https:\/\/www.academia.edu\/35049898\/A_DNP3_Protocol_Primer."},{"key":"e_1_2_1_225_1","volume-title":"Formal security analysis of the DNP3-secure authentication protocol","author":"Amoah R."},{"key":"e_1_2_1_226_1","unstructured":"F. Cleveland. 2016. IEC TC57 WG15: IEC 62351 Security standards for the power system information infrastructure. Retrieved from http:\/\/iectc57.ucaiug.org\/wg15public\/Public%20Documents\/White%20Paper%20on%20Security%20Standards%20in%20IEC%20TC57.pdf.  F. Cleveland. 2016. IEC TC57 WG15: IEC 62351 Security standards for the power system information infrastructure. Retrieved from http:\/\/iectc57.ucaiug.org\/wg15public\/Public%20Documents\/White%20Paper%20on%20Security%20Standards%20in%20IEC%20TC57.pdf."},{"key":"e_1_2_1_227_1","unstructured":"G. Devarajan. 2007. Unraveling SCADA protocols: Using sulley fuzzer. In DefCon. Retrieved from https:\/\/bit.ly\/2PAhK54.  G. Devarajan. 2007. Unraveling SCADA protocols: Using sulley fuzzer. In DefCon. Retrieved from https:\/\/bit.ly\/2PAhK54."},{"key":"e_1_2_1_228_1","volume-title":"Proceedings of S4x14","author":"Pe C. S.","year":"2014"},{"key":"e_1_2_1_229_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018981.3018985"},{"key":"e_1_2_1_230_1","volume-title":"IEEE Standard for Local Area Network\/Wide Area Network (LAN\/WAN) Node Communication Protocol to Complement the Utility Industry End Device Data Tables","author":"EE.","edition":"5"},{"key":"e_1_2_1_231_1","doi-asserted-by":"publisher","DOI":"10.1109\/PSAMP.2007.4740906"},{"key":"e_1_2_1_232_1","unstructured":"C. Greer etal 2014. NIST framework and roadmap for smart grid interoperability standards release 3.0. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.1108r3.pdf.  C. Greer et al. 2014. NIST framework and roadmap for smart grid interoperability standards release 3.0. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.1108r3.pdf."},{"key":"e_1_2_1_233_1","unstructured":"I. T. Union. 1999. X.237 bis. Retrieved from https:\/\/bit.ly\/2rrr96O.  I. T. Union. 1999. X.237 bis. Retrieved from https:\/\/bit.ly\/2rrr96O."},{"key":"e_1_2_1_234_1","unstructured":"F. D. R. Inc. 2017. Energy communications management exchange AMI\/smartgrid engineering and consulting services. Retrieved from https:\/\/www.ecmx.org\/public\/.  F. D. R. Inc. 2017. Energy communications management exchange AMI\/smartgrid engineering and consulting services. Retrieved from https:\/\/www.ecmx.org\/public\/."},{"key":"e_1_2_1_235_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43933-3_17"},{"key":"e_1_2_1_236_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICED.2016.7576251"},{"key":"e_1_2_1_237_1","first-page":"1482","article-title":"Understanding and simulating the IEC 61850 standard","volume":"22","author":"Liang Y.","year":"2007","journal-title":"IEEE Trans. Power Deliv."},{"key":"e_1_2_1_238_1","unstructured":"International Standard. 2003. IEC 61850-7-1: Communication networks and systems in substations\u2013Part 7-1: Basic communication structure for substation and feeder equipment\u2013Principles and models. Retrieved from https:\/\/webstore.iec.ch\/p-preview\/info_iec61850-7-1%7Bed1.0%7Den.pdf.  International Standard. 2003. IEC 61850-7-1: Communication networks and systems in substations\u2013Part 7-1: Basic communication structure for substation and feeder equipment\u2013Principles and models. Retrieved from https:\/\/webstore.iec.ch\/p-preview\/info_iec61850-7-1%7Bed1.0%7Den.pdf."},{"key":"e_1_2_1_239_1","volume-title":"IEC-61850 protocol analysis and online intrusion detection system for SCADA networks using machine learning","author":"Patel S.","year":"1828"},{"key":"e_1_2_1_240_1","unstructured":"O. S. G. Platform. 2019. Introduction to the open smart grid platform. IEC-61850. Retrieved from http:\/\/documentation.opensmartgridplatform.org\/Protocols\/IEC61850\/index.html.  O. S. G. Platform. 2019. Introduction to the open smart grid platform. IEC-61850. Retrieved from http:\/\/documentation.opensmartgridplatform.org\/Protocols\/IEC61850\/index.html."},{"key":"e_1_2_1_241_1","volume-title":"Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm\u201916)","author":"Strobel M.","year":"2016"},{"key":"e_1_2_1_242_1","unstructured":"IEC. 2006. International standard IEC 60870-5-104. DOI:https:\/\/doi.org\/IEC 61672-1  IEC. 2006. International standard IEC 60870-5-104. DOI:https:\/\/doi.org\/IEC 61672-1"},{"key":"e_1_2_1_243_1","volume-title":"Proceedings of the IEEE Power 8 Energy Society General Meeting. 1--5. DOI:https:\/\/doi.org\/10","author":"Yang Y.","year":"2013"},{"key":"e_1_2_1_244_1","unstructured":"J. T. Michalski A. Lanzone J. Trent and S. Smith. 2007. Secure ICCP integration considerations and recommendations. Retrieved from https:\/\/www.energy.gov\/sites\/prod\/files\/oeprod\/DocumentsandMedia\/19-Secure_ICCP_Integration.pdf.  J. T. Michalski A. Lanzone J. Trent and S. Smith. 2007. Secure ICCP integration considerations and recommendations. Retrieved from https:\/\/www.energy.gov\/sites\/prod\/files\/oeprod\/DocumentsandMedia\/19-Secure_ICCP_Integration.pdf."},{"key":"e_1_2_1_245_1","unstructured":"QED Secure Solutions. 2019. Risk Scoring System. Retrieved from https:\/\/www.riskscoringsystem.com\/.  QED Secure Solutions. 2019. Risk Scoring System. Retrieved from https:\/\/www.riskscoringsystem.com\/."},{"key":"e_1_2_1_246_1","unstructured":"A. Manion. 2019. [Online]. TEMSL. Retrieved from https:\/\/www.youtube.com\/watch?v=-6cThOCm9co8feature=youtu.be8t=1303.  A. Manion. 2019. [Online]. TEMSL. Retrieved from https:\/\/www.youtube.com\/watch?v=-6cThOCm9co8feature=youtu.be8t=1303."},{"key":"e_1_2_1_247_1","unstructured":"C. Bodungen. 2019. Industrial vulnerability scoring system (IVSS). Retrieved from https:\/\/securingics.com\/IVSS\/IVSS.html.  C. Bodungen. 2019. Industrial vulnerability scoring system (IVSS). Retrieved from https:\/\/securingics.com\/IVSS\/IVSS.html."},{"key":"e_1_2_1_248_1","unstructured":"MITRE Corporation. 2018. Common Vulnerabilities and Exposures (CVE). Retrieved from https:\/\/cve.mitre.org\/.  MITRE Corporation. 2018. Common Vulnerabilities and Exposures (CVE). Retrieved from https:\/\/cve.mitre.org\/."},{"key":"e_1_2_1_249_1","unstructured":"MITRE Corporation 2019. Common attack pattern enumeration and classification (CAPEC). Retrieved from https:\/\/capec.mitre.org\/index.html.  MITRE Corporation 2019. Common attack pattern enumeration and classification (CAPEC). Retrieved from https:\/\/capec.mitre.org\/index.html."},{"key":"e_1_2_1_250_1","unstructured":"MITRE Corporation. 2018. Common weakness enumeration: CWE. Retrieved from https:\/\/cwe.mitre.org\/index.html.  MITRE Corporation. 2018. Common weakness enumeration: CWE. Retrieved from https:\/\/cwe.mitre.org\/index.html."},{"key":"e_1_2_1_251_1","unstructured":"MITRE Corporation. 2018. Common platform enumeration: CPE dictionary. Retrieved from https:\/\/cpe.mitre.org\/.  MITRE Corporation. 2018. Common platform enumeration: CPE dictionary. Retrieved from https:\/\/cpe.mitre.org\/."},{"key":"e_1_2_1_252_1","unstructured":"Offensive Security. 2019. Offensive Security. Retrieved from https:\/\/www.offensive-security.com\/.  Offensive Security. 2019. Offensive Security. Retrieved from https:\/\/www.offensive-security.com\/."},{"key":"e_1_2_1_253_1","unstructured":"O. Security. 2019. The exploit database\u2014Offensive security. Retrieved from https:\/\/www.exploit-db.com\/.  O. Security. 2019. The exploit database\u2014Offensive security. Retrieved from https:\/\/www.exploit-db.com\/."},{"key":"e_1_2_1_254_1","unstructured":"Micrososoft. 2019. Security Bulletins. Retrieved from https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/securitybulletins.  Micrososoft. 2019. Security Bulletins. Retrieved from https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/securitybulletins."},{"key":"e_1_2_1_255_1","unstructured":"National Institute of Standards and Technology (NIST). 2018. National Vulnerability Database. Retrieved from https:\/\/nvd.nist.gov\/vuln.  National Institute of Standards and Technology (NIST). 2018. National Vulnerability Database. Retrieved from https:\/\/nvd.nist.gov\/vuln."},{"key":"e_1_2_1_256_1","unstructured":"A. Dulaunoy. 2018. CVE-Search (Common Vulnerabilities and Exposures). Retrieved from https:\/\/www.cvedetails.com\/.  A. Dulaunoy. 2018. CVE-Search (Common Vulnerabilities and Exposures). Retrieved from https:\/\/www.cvedetails.com\/."},{"key":"e_1_2_1_257_1","unstructured":"S. \u00d6zkan. 2018. CVE-details (Common Vulneravility Exposure). Retrieved from www.cvedetails.com.  S. \u00d6zkan. 2018. CVE-details (Common Vulneravility Exposure). Retrieved from www.cvedetails.com."},{"key":"e_1_2_1_258_1","unstructured":"R. Borgaonkar. 2019. New vulnerabilities in 5G Security Architecture 8 Countermeasures. Retrieved from https:\/\/infosec.sintef.no\/en\/informasjonssikkerhet\/2019\/08\/new-vulnerabilities-in-5g-security-architecture-countermeasures\/.  R. Borgaonkar. 2019. New vulnerabilities in 5G Security Architecture 8 Countermeasures. Retrieved from https:\/\/infosec.sintef.no\/en\/informasjonssikkerhet\/2019\/08\/new-vulnerabilities-in-5g-security-architecture-countermeasures\/."},{"key":"e_1_2_1_259_1","unstructured":"A. Shaik and R. Borgaonkar. 2019. Black Hat 2019: 5G Security Flaw Allows MiTM Targeted Attacks. Retrieved from https:\/\/blacklakesecurity.com\/black-hat-2019-5g-security-flaw-allows-mitm-targeted-attacks\/.  A. Shaik and R. Borgaonkar. 2019. Black Hat 2019: 5G Security Flaw Allows MiTM Targeted Attacks. Retrieved from https:\/\/blacklakesecurity.com\/black-hat-2019-5g-security-flaw-allows-mitm-targeted-attacks\/."},{"key":"e_1_2_1_260_1","unstructured":"3GPP System Architecture Evolution (SAE). 2018. Retrieved from https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2296.  3GPP System Architecture Evolution (SAE). 2018. Retrieved from https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2296."},{"key":"e_1_2_1_261_1","first-page":"501","article-title":"Security architecture and procedures for 5G System","volume":"33","author":"GPP.","year":"2018","journal-title":"Technical Specification (TS)"},{"key":"e_1_2_1_262_1","volume-title":"GSMA mobile security hall of fame","author":"G. Association","year":"2019"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381038","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3381038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:58Z","timestamp":1750203898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381038"}},"subtitle":["A Measure of Vulnerability Risk Analysis Based on CVSS"],"short-title":[],"issued":{"date-parts":[[2020,4,26]]},"references-count":262,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3,31]]}},"alternative-id":["10.1145\/3381038"],"URL":"https:\/\/doi.org\/10.1145\/3381038","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,26]]},"assertion":[{"value":"2019-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}