Article Information  
Securing Gateways within Clustered Power Centric Network of Nodes

Keywords: Cyber Technology, Knowledge Networks, Power Centric Nodes, Security, SCADA

Mehran University Research Journal of Engineering & Technology

Volume 35 ,  Issue 1


1. Reddy, R., “Personal Knowledge Networks in the Mobile Millennium”, Proceedings of IEEE International Symposium on IT in Medicine and Education, West Virginia University, USA, 2009
2. Nousala, S., “Understanding the Value and Transference of Tacit Knowledge in Socio-Technical Networks and Complex Systems: Study of Simultaneous Internal and External Organizational Knowledge Networks”, Proceedings of 8th International Conference on ITST, RMIT, Australia, 2008
3. Newman, M., “The Structure and Function of Complex Networks”, University of Michigan, USA, 2003
4. Andersen, D., Balakrishnan, H., Kaashoek, F., and Morris, R., “Resilient Overlay Networks”, Proceedings of 18th ACM Symposium on Operating Systems Principles), Banff, Canada, October 2001
5. Clarke, I., Sandberg, O., Wiley, B., and Hong, T., “Freenet: A Distributed Anonymous Information Storage and Retrieval System”, National Science Foundation and Marshall Aid Commemoration Commission, 2001
6. Akyildiz, I., Su, W., Sankarasubramaniam, Y., and Cayirci, E., "A Survey on Sensor Networks", IEEE Communications Magazine, Volume 40, No. 8, pp. 102-114, 2002.
7. Karp, B., and Kung, H., "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks", MobiCom, Harvard University, 2000
8. Thames, J., "Advancing Cyber Security with a Semantic Path Merger Packet Classification Algorithm", Ph.D. Thesis, Georgia Institute of Technology, 2012
9. Harn, L., and Lin, C., "An Efficient Group Authentication for Group Communications", International Journal of Network Security& Its Applications, Volume 5, No. 3, May, 2013
10. Zhang, J., "Effective and Scalable Botnet Detection in Network Traffic", Ph.D. Thesis, Georgia Institute of Technology, 2012
11. Alserhani, F., "A Framework for Correlation and Aggregation of Security Alerts in Communication Networks", Ph.D. Thesis, University of Bradford, 2011.
12. Rakshit, A., "A Host-Based Security Assessment Architecture for Effective Leveraging of Shared Knowledge", Masters Thesis, Kansas State University, India, 2009
13. Ferreira, A., Vilaca, M., Oliveira, L., Habib, E., Wong, H., and Loureiro, A., "On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks", Federal University of Minas Gerais, Brazil, 2005.
14. Zhu, H., Chigan, C., and Bao, F., "Turing Assessor: A New Tool for Cyber Security Quantification", Proceedings of IEEE WCNC, 2006
15. Sridharan, V., "Cyber Security in Power Systems", Masters Thesis, Georgia Institute of Technology, 2012.
16.,, Backtrack Linux 2014
17. Teixeira, A., "Toward Secure and Reliable Networked Control Systems", Masters Thesis, KTH Royal Institute of Technology, 2011.
18. Blaze, M., Ioannidis, J., and Keromytis, A., "Trust Management and Network Layer Security Protocols", AT&T Laboratories, Distributed Systems Labs, University of Pennsylvania, 2000
19. Kanyamee, K., and Sathitwiriyawong, C., "HighAvailability Decentralized Cryptographic Multi-Agent Key Recovery",The International Arab Journal of Information Technology, Volume 11, No. 1, January, 2014.
20. Rao, R, "Secure Routing in Cluster based Wireless Sensor Networks using Symmetric Cryptography with Session Keys", International Journal of Computer Applications, Volume 55, October 2012
21. Costantini, K.C., "Development of a Cyber Attack Simulator for Network Modeling and Cyber Security Analysis", Masters Thesis, Rochester Institute of Technology, 2007.
22. Cirani, S., Ferrari, G., and Veltri, L., "Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview", Algorithms, Volume 6, pp. 197-226, 2013