|
[1] W. Wolf, “The Good News and the Bad News,” in Computer, vol. 40, no. 11, pp. 104-105, Nov. 2007. [2] C. K. Keerthi, M. A. Jabbar and B. Seetharamulu, “Cyber Physical Systems(CPS):Security Issues, Challenges and Solutions,” 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Coimbatore, 2017, pp. 1-4. doi: 10.1109/ICCIC.2017.8524312 [3] J. Giraldo, E. Sarkar, A. A. Cardenas, M. Maniatakos and M. Kantarcioglu, “Security and Privacy in Cyber-Physical Systems: A Survey of Surveys,” in IEEE Design & Test, vol. 34, no. 4, pp. 7-17, Aug. 2017. doi: 10.1109/MDAT.2017.2709310 [4] A. Humayed, J. Lin, F. Li and B. Luo, “Cyber-Physical Systems Security—A Survey,” IEEE INTERNET OF THINGS JOURNAL, vol. 4, no. 6, pp. 1802-1831, 2017. [5] Cyber Security for Industrial Control Systems: A New Approach. Darktrace, 2017. [6] S. McLaughlin et al., “The Cybersecurity Landscape in Industrial Control Systems,” Proceedings of the IEEE, vol. 104, no. 5, pp. 1039-1057, May 2016. [7] M. Sahithi, B. MuraliKrishna, M. Jyothi, K. Purnima, A. Jhansi Rani and N. Naga Sudha, “Implementation of Random Number Generator Using LFSR for High Secured Multi Purpose Applications,” International Journal of Computer Science and Information Technologies, vol. 3, pp. 3287-3290, 2012. [8] C. Lin, S. Wu and M. Lee, “Cyber attack and defense on industry control systems,” 2017 IEEE Conference on Dependable and Secure Computing, Taipei, 2017, pp. 524-526. doi: 10.1109/DESEC.2017.8073874 [9] J. Giraldo, E. Sarkar, A. A. Cardenas, M. Maniatakos and M. Kantarcioglu, “Security and Privacy in Cyber-Physical Systems: A Survey of Surveys,” IEEE Design & Test, vol. 34, no. 4, pp. 7-17, Aug. 2017. [10] D. J. Gaushell and H. T. Darlington, “Supervisory control and data acquisition,” Proceedings of the IEEE, vol. 75, no. 12, pp. 1645-1658, Dec. 1987. [11] M. A. Laughton, D. J. Warne (ed), Electrical Engineer's Reference book, 16th edition,Newnes, 2003 Chapter 16 Programmable Controller [12] R. D'Andrea and G. E. Dullerud, “Distributed control design for spatially interconnected systems,” IEEE Transactions on Automatic Control, vol. 48, no. 9, pp. 1478-1495, Sept. 2003. doi: 10.1109/TAC.2003.816954. [13] H. Meyer, F. Fuchs and K. Thiel, Manufacturing Execution Systems (MES): Optimal Design, Planning, and Deployment. McGraw-Hill Education, 2009. [14] “More than 40% of ICS computers were attacked in H1 2018”, Kaspersky, 2018. [Online]. Available:https://www.kaspersky.com/about/press-releases/2018_ics-computers-attacked-in-h1 [15] Antiy Labs, “Report on the Worm Stuxnet’s Attack,” Antiy CERT, October, 2010. [16] Germany’s Federal Office for Information Security (BSI)”,The State of IT Security in Germany 2014,” [Online]. Accessed on June 2019 Available: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Securitysituation/IT-Security-Situation-in-Germany-2014.pdf?__blob=publicationFile&v=3 [17] “Repository of Industrial Security Incidents (RISI) Online Incident Database,” https://www.risidata.com/Database [18] MODBUS Messaging on TCP/IP Implementation Guide, 1st ed. Modbus-IDA, 2006. [19] S. Mazumdar and T. Som, “Data Encryption with Linear Feedback Shift Register,” International Journal of Scientific & Engineering Research, vol. 3, no. 6, 2012. [20] H. Delfs and H. Knebl, Introduction to Cryptography:Principles and Applications, 2nd ed. Springer, 2007. [21] P. Mahajan and A. Sachdeva, “A Study of Encryption Algorithms AES, DES and RSA for Security,” Global Journal of Computer Science and Technology Network, Web & Security, vol. 13, no. 15, 2013. [22] “About NIST”, NIST, 2015. [Online]. Accessed on June 2019, Available: https://www.nist.gov/about-nist. [23] Milind Mathur.and Ayush Kesarwani “Comparison Between DES , 3DES ,RC2 , RC6 , BLOWFISH And AES,” Proceedings of National Conference on New Horizons, university of Oklahoma, , ISBN 978-93-82338- 79-6,2013 [24] Joan Daemen , Vincent Rijmen “ADVANCED ENCRYPTION STANDARD (AES),” FIPS PUB November 26, 2001. [25] K. Bhattacharjee, K. Maity and S. Dasa, “A Search for Good Pseudo-random Number Generators: Survey and Empirical Studies,” 2018. Available: https://arxiv.org/abs/1811.04035v1. [26] D. Knuth, Art of Computer Programming, Volume 2: Seminumerical Algorithms, 3rd ed. Addison-Wesley Professional, 1997. [27] C.-C Li and B. Sun, “Using Linear Congruential Generators for Cryptographic Purposes,” 20th International Conference on Computers and Their Applications, New Orleans, LA, March, 2005 [28] A. Partow, “Primitive Polynomial List”, Partow.net. [Online]. Accessed on June 2019 Available: https://www.partow.net/programming/polynomials/index.html. [29] Rohner, P. (1996). Automation with Programmable Logic Controllers, UNSW Press [30] O. Emmanuel, “Microcontroller vs PLC: A Detailed Comparison”, [Online]. Accessed on: January 2018, Available: https://circuitdigest.com/article/microcontroller-vs-plc-detailed-comparison-and-difference-between-plc-and-microcontroller [31] A. Rongala, “Benefits of C / C++ over Other Programming Languages - Invensis Technologies”, Invensis Technologies, 2015. [Online]. Accessed on June 2019 Available:https://www.invensis.net/blog/it/benefits-of-c-c-plus-plus-over-other-programming-languages/ [32] E. Parr, Programmable Controllers: An Engineer's Guide. Elsevier, 2014, pp. 38-39. [33] Jawahar Thakur and Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis,” International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 1, Issue 2, December 2011.
|