Comparative analysis of the security of configuration protocols for industrial control devices.
Luis Martín-LirasMiguel A. PradaJuan J. Fuertes-MartínezAntonio Morán ÁlvarezSerafín AlonsoManuel Domínguez-GonzálezPublished in: Int. J. Crit. Infrastructure Prot. (2017)
Keyphrases
- control strategy
- comparative analysis
- control method
- security protocols
- security properties
- cryptographic protocols
- authentication protocol
- fusion scheme
- semi quantitative
- mobile devices
- wired networks
- communication protocols
- security requirements
- security issues
- security analysis
- industrial applications
- network security
- embedded devices
- security services
- key agreement protocol
- intrusion detection
- smart grid
- application level
- key distribution
- communication networks
- remote control
- information security