Internet protocol security and power line communication

B Hirschler, A Treytl - … on Power Line Communications and Its …, 2012 - ieeexplore.ieee.org
… IP security measures, ie, IPsec tunnel … layer 2 border nodes. The main advantage of this
solution is that the border devices in the PLC network need zero configuration for IP and security. …

Message security for automation and control applications based on IEC61131-3

A Homay, AP Martins, M de Sousa… - 2016 future …, 2016 - ieeexplore.ieee.org
… no procedure for PLC code (logic application) level security. … s network to the internet or
intranet, then we assumed the PLC’… connect to the DCS`s network and is the main responsible of …

Machine learning based physical-layer intrusion detection and location for the smart grid

G Prasad, Y Huo, L Lampe… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
… However, it has been shown that security can be further enhanced using physical layer (…
parts of the PLC network, we use the bottom-up approach of modeling the PLC channel [28]. We …

Physical layer security in wireless smart grid

X Wang, Q Liang, J Mu, W Wang… - … Networks, 2015 - Wiley Online Library
… wired data communication network based on power line communication (PLC) is apparently
… monitored, PLC can result in a costly and complicated system architecture; (ii) PLC cannot …

Stuxnet worm impact on industrial cyber-physical system security

S Karnouskos - IECON 2011-37th Annual Conference of the …, 2011 - ieeexplore.ieee.org
… vast majority of security holes and tools was used such as rootkits (including what is now
known as the first PLC rootkit), antivirus tricking, zero-day exploits, network discovery and P2P …

[PDF][PDF] vPLC: A scalable PLC testbed for IIoT security research

SA Qasim, MT Raza, I Ahmed - 2023 - researchgate.net
… of thousands of virtual PLC instances to simulate a large-scale IIoT network. The vPLC …
PLC by learning protocol semantics from network dumps of real PLCs and generating PLC

Secure and time-sensitive communication for remote process control and monitoring

T Kobzan, S Schriegel, S Althoff… - 2018 IEEE 23rd …, 2018 - ieeexplore.ieee.org
layer and provide their data to an entity on the layer above which is commonly a PLC (Programmable
Logic Controller)… the concept for a secure and timesensitive network. Firstly, the big …

Practical security strategy for SCADA automation systems and networks

F Haji, L Lindsay, S Song - Canadian Conference on Electrical …, 2005 - ieeexplore.ieee.org
… Multiple virtual LAN’s (VLAN’s) should be created for the various types of traffic that will
pass through the network. For example, Programmable Logic Controller (PLC) or control traffic …

[PDF][PDF] Physical Layer Security of In-Home PLC Systems: Analysis Based on a Measurement Campaign

H ˆAndrei Camponogara, MV Ribeiro - ieeexplore.ieee.org
… home can sense the signals transmitted among devices of an in-home PLC network
operating within another home. Figure 2 illustrates legal access, where Eve overhears private …

Secure PHY layer key generation in the asymmetric power line communication channel

F Passerini, AM Tonello - Electronics, 2020 - mdpi.com
… we analyze the spatial correlation of PLC channels. This allows … physical layer security in
power line networks exploiting the … methods for physical layer security in symmetric networks, or …