Security Concepts Based on IEEE 802.1 X for G. hn Broadband PLC Access Networks

G Hallak, T Frauenrath, A Mengi - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
PLC channel is also broadcast, namely it is shared by the users who access it. Thus, data
security … assessed the security of PLC systems under the physical layer security perspective …

ICS/SCADA security analysis of a Beckhoff CX5020 PLC

G Bonney, H Höfken, B Paffen… - … Systems Security and …, 2015 - ieeexplore.ieee.org
… SCADA makes use of networks protocols to transport PLC administration and programming
commands. The protocols are also used for communication between PLCs. The connection …

Efficient and robust data availability solution for hybrid PLC/RF systems

HN Noura, R Melki, A Chehab, JH Fernandez - Computer Networks, 2021 - Elsevier
… (1) network coding, (2) physical layer security to overcome the damaging effects of impulsive
noise and to enhance the security level in PLC systems, and (3) the existing security attacks …

Internet-facing PLCs as a network backdoor

J Klick, S Lau, D Marzin, JO Malchow… - … and Network Security  …, 2015 - ieeexplore.ieee.org
… the PLC may connect to internal networks with many more PLCs. This is what we call the "deep"
industrial network… We, in contrast, use the PLC as a gateway to the network and leave its …

[PDF][PDF] Physical Layer Security in MIMO-ME PLC Networks with Alternating Optimization

A Pittolo, AM Tonello - … Workshop on Communication Security …, 2014 - andreatonello.com
… at the physical layer, namely physical layer security (PLS). … , or power line communication
(PLC) networks, under secrecy … increase the physical layer security of a PLC network. However…

Empirical study of PLC authentication protocols in industrial control systems

A Ayub, H Yoo, I Ahmed - … IEEE Security and Privacy Workshops …, 2021 - ieeexplore.ieee.org
… We found from our network analysis of the protocol that the PLC does not authenticate a …
of the PLC by simply injecting a worm in one of the PCs connected to the PLC network. They …

[HTML][HTML] Programmable logic controllers based systems (PLC-BS): Vulnerabilities and threats

A Serhane, M Raad, R Raad, W Susilo - SN Applied Sciences, 2019 - Springer
… In this paper, we present a general overview of PLCs, PLC-BS security … same PLC-BS
network. Also, some worms can go from one PLC to another PLC if they are on the same networks. …

A security and authentication layer for SCADA/DCS applications

A Homay, C Chrysoulas, B El Boudani… - Microprocessors and …, 2021 - Elsevier
… one or more than one advanced PLC with a memory, processor, and network, Real-Time …
but as we will see at the end none of them touch the PLC level to provide a security solution. …

CERN tests reveal security flaws with industrial network devices

S Lüders - The Industrial Ethernet Book, 2006 - cds.cern.ch
… and security management at PLC device level is unnecessary provided that the network
I agree that a lot can be done on the network side and this sells very well. CERN itself has …

Internet of things architecture based on integrated plc and 3g communication networks

HC Hsieh, CH Lai - 2011 IEEE 17th international conference …, 2011 - ieeexplore.ieee.org
… surveillance and security information collection all are IoT applications. … -PLC architecture
is defined to integrate perception layer, aggregation layer, network layer and application layer