Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
… 2) Cross NET-PHY layer security: In this concept, the network layer functionalities including
routing path determination, amplification with forwarding (relaying), and switching from port (…

Plc 4.0: A control system for industry 4.0

M Azarmipour, H Elfaham, C Gries… - IECON 2019-45th …, 2019 - ieeexplore.ieee.org
… This approach implements PLC as a virtual entity in a private cloud (to ensure security) that
layer that abstracts the low level platform interface such as processor, memory and network

[PDF][PDF] Exploitation of the PLC channel properties to enable secure communications

F Passerini, AM Tonello - wsplc2018.fe.uni-lj.si
… Pittolo and AM Tonello, “Physical layer security in plc networks: Achievable secrecy rate
and channel effects,” in 2013 IEEE 17th International Symposium on Power Line …

Developing cyber-physical experimental capabilities for the security analysis of the future Smart Grid

B Genge, C Siaterlis - … and Exhibition on Innovative Smart Grid …, 2011 - ieeexplore.ieee.org
layer is typically split among two networks: the control network and the process network. The
… For the communication between the RPLC and Master units, we used the Modbus over TCP …

An Industrial Environmental Security Monitoring System in Mobile Device Based on Soft PLC

F Yan, H Zhou, ZH Peng, M Chen… - … , Big Data & Smart …, 2020 - ieeexplore.ieee.org
… The first layer is designed to gather data that is connected to the soft PLC Proview, the
second layer is a wireless transmission network, and the final one is a data display layer for …

Intrusion detection on ics and scada networks

M Gaiceanu, M Stanculescu, PC Andrei… - … on Industrial Control …, 2020 - Springer
… an efficient cyber security technique is called defence-in-depth and consists in layer security
… is controlled by either RTU or a PLC. The communication hardware allows data transfer …

Protecting modbus/TCP-based industrial automation and control systems using message authentication codes

F Katulić, D Sumina, S Groš, I Erceg - IEEE access, 2023 - ieeexplore.ieee.org
… ) for the network layer, TCP as the transport layer protocol, and … Control PLC writes 10 and
reads 30 registers from the DT PLC. … 16 shows a flowchart of the developed security FB, which …

Powerline-channel adopted layer-design and link-layer for reliable data transmission

G Bumiller - 2015 IEEE International Symposium on Power …, 2015 - ieeexplore.ieee.org
… Gateway) end-to-end security protection like transport layer security (TLS) has to be supported…
As PLC networks are mainly multi hop networks, the repeating function is part of this layer. …

An investigation on feasibility and security for cyberattacks on generator synchronization process

NK Kandasamy - IEEE Transactions on Industrial Informatics, 2019 - ieeexplore.ieee.org
… hardening or physical layer hardening so that any other PLC/controller on the network that
has access to the … The authors believe that though it is important to secure the intrusion holes …

Introduction to industrial control networks

B Galloway, GP Hancke - IEEE Communications surveys & …, 2012 - ieeexplore.ieee.org
networks must be familiar with both traditional enterprise concerns, such as network security,
… the device, or through a network to which the PLC is attached. The programming software …