Hardening of the modbus protocol
##plugins.themes.academic_pro.article.main##
Abstract
##plugins.themes.academic_pro.article.details##
References
- Modbus, Modbus application protocol specification V1.1b3,
- Aamir Shahzad, Malrey Lee, Young-Keun Lee Suntae Kim, Naixue Xiong Jae Young Choi and Younghwa Cho, “Real Time Modbus Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information” in Symmetry Open Access Journal, 2015.
- Igor Nai Fovino, Andrea Carcano, Marcelo Masera and Alberto Trombetta, “design and implementation of a secure modbus protocol” in ICCIP: Critical Infrastructure Protection, pp. 83-96, 2009.
- Gabor jakaboczki, eva adamko, “vulnerabilities of modbus rtu protocol – a case study” in annals of the oradea university fascicle of management and technological engineering issue #1, May 2015.
- Zakarya drias, Ahmed serhrouchni and Olivier vogel, “Taxonomy of attacks on Industrial Control protocols” in Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), IEEE, 2015.
- The Modbus Organization. Modbus Messaging on TCP/IP Implementation Guide V1.0a; Modbus Organization: Hopkinton, MA, USA, pp. 2–15, 2004.
- Nikita Arora, Yogita Gigras, Block and Stream Cipher Based Cryptographic Algorithms: A Survey in International Journal of Information and Computation Technology. ISSN 0974-2239 Vol. 4, No. 2, pp. 189-196, 2014.
- Stallings, William. Cryptography and Network Security Principles and Practice. Boston: Pearson, 2011.
- Abhiram Amaraneni, Mahendra Lagineni, Rajesh Kalluri, Senthil kumar R.K, Ganga Prasad G.L “Transient analysis of cyberattacks on Power SCADA using RTDS” the Journal of CPRI, Vol. 11, No. 1, March 2015
- Samanth P, R Kalluri, RK Senthil Kumar, BS Bindhumadhava. ‘SCADA communication protocols: vulnerabilities, attacks and possible mitigations’ at CSI Transactions on ICT ISSN 2277-9078 during April 2013