Securing Gateways within Clustered Power Centric
Network of Nodes
Keywords: Cyber Technology, Knowledge Networks, Power Centric Nodes, Security, SCADA
Mehran University Research Journal of Engineering & Technology
Volume 35 , Issue 1
QAISAR JAVAID , MUHAMMAD DAUD AWAN , SYED HUSNAIN A NAQVI ,
References
1. |
Reddy, R., “Personal Knowledge Networks in the Mobile
Millenniumâ€, Proceedings of IEEE International
Symposium on IT in Medicine and Education, West
Virginia University, USA, 2009 |
2. |
Nousala, S., “Understanding the Value and Transference
of Tacit Knowledge in Socio-Technical Networks and
Complex Systems: Study of Simultaneous Internal and
External Organizational Knowledge Networksâ€,
Proceedings of 8th International Conference on ITST,
RMIT, Australia, 2008 |
3. |
Newman, M., “The Structure and Function of Complex
Networksâ€, University of Michigan, USA, 2003 |
4. |
Andersen, D., Balakrishnan, H., Kaashoek, F., and
Morris, R., “Resilient Overlay Networksâ€, Proceedings
of 18th ACM Symposium on Operating Systems
Principles), Banff, Canada, October 2001 |
5. |
Clarke, I., Sandberg, O., Wiley, B., and Hong, T.,
“Freenet: A Distributed Anonymous Information Storage
and Retrieval Systemâ€, National Science Foundation and
Marshall Aid Commemoration Commission, 2001 |
6. |
Akyildiz, I., Su, W., Sankarasubramaniam, Y., and Cayirci,
E., "A Survey on Sensor Networks", IEEE
Communications Magazine, Volume 40, No. 8,
pp. 102-114, 2002. |
7. |
Karp, B., and Kung, H., "GPSR: Greedy Perimeter
Stateless Routing for Wireless Networks", MobiCom,
Harvard University, 2000 |
8. |
Thames, J., "Advancing Cyber Security with a Semantic
Path Merger Packet Classification Algorithm", Ph.D.
Thesis, Georgia Institute of Technology, 2012 |
9. |
Harn, L., and Lin, C., "An Efficient Group
Authentication for Group Communications",
International Journal of Network Security& Its
Applications, Volume 5, No. 3, May, 2013 |
10. |
Zhang, J., "Effective and Scalable Botnet Detection in
Network Traffic", Ph.D. Thesis, Georgia Institute of
Technology, 2012 |
11. |
Alserhani, F., "A Framework for Correlation and
Aggregation of Security Alerts in Communication
Networks", Ph.D. Thesis, University of Bradford, 2011. |
12. |
Rakshit, A., "A Host-Based Security Assessment
Architecture for Effective Leveraging of Shared
Knowledge", Masters Thesis, Kansas State University,
India, 2009 |
13. |
Ferreira, A., Vilaca, M., Oliveira, L., Habib, E., Wong,
H., and Loureiro, A., "On the Security of Cluster-Based
Communication Protocols for Wireless Sensor
Networks", Federal University of Minas Gerais, Brazil,
2005. |
14. |
Zhu, H., Chigan, C., and Bao, F., "Turing Assessor: A
New Tool for Cyber Security Quantification",
Proceedings of IEEE WCNC, 2006 |
15. |
Sridharan, V., "Cyber Security in Power Systems", Masters
Thesis, Georgia Institute of Technology, 2012. |
16. |
Backtrack-linux.org, www.backtrack-linux.org, ©
Backtrack Linux 2014 |
17. |
Teixeira, A., "Toward Secure and Reliable Networked
Control Systems", Masters Thesis, KTH Royal Institute
of Technology, 2011. |
18. |
Blaze, M., Ioannidis, J., and Keromytis, A., "Trust
Management and Network Layer Security Protocols",
AT&T Laboratories, Distributed Systems Labs, University
of Pennsylvania, 2000 |
19. |
Kanyamee, K., and Sathitwiriyawong, C., "HighAvailability
Decentralized Cryptographic Multi-Agent
Key Recovery",The International Arab Journal of
Information Technology, Volume 11, No. 1,
January, 2014. |
20. |
Rao, R, "Secure Routing in Cluster based Wireless Sensor
Networks using Symmetric Cryptography with Session
Keys", International Journal of Computer Applications,
Volume 55, October 2012 |
21. |
Costantini, K.C., "Development of a Cyber Attack
Simulator for Network Modeling and Cyber Security
Analysis", Masters Thesis, Rochester Institute of
Technology, 2007. |
22. |
Cirani, S., Ferrari, G., and Veltri, L., "Enforcing Security
Mechanisms in the IP-Based Internet of Things: An
Algorithmic Overview", Algorithms, Volume 6,
pp. 197-226, 2013 |
|
|
|