2014 10th IEEE Workshop on Factory Communication Systems (WFCS 2014) 2014
DOI: 10.1109/wfcs.2014.6837593
|View full text |Cite
|
Sign up to set email alerts
|

On the security of security extensions for IP-based KNX networks

Abstract: The traditional areas of application for building automation systems (BAS) like heating, ventilation and air conditioning as well as lighting and shading are more and more extended by services requiring a more robust security infrastructure like alarm-and access control systems. Additionally, building automation networks get integrated into existing IP-based networks, or even communicate directly over the Internet. Therefore, the attack surface of BAS has increased dramatically. This requires a solid security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…Several publications are fully dedicated to DoS attacks at the automation and management layers [26,27,28,29,10,16,17,11,30,22]. Two main type of DoS attacks can be conducted at this layer [26]: host-based and network-based.…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…Several publications are fully dedicated to DoS attacks at the automation and management layers [26,27,28,29,10,16,17,11,30,22]. Two main type of DoS attacks can be conducted at this layer [26]: host-based and network-based.…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
“…In network-based DoS, the target is the network itself, where the attackers try to waste the network bandwidth up to completely interrupting the communication between the devices located in the affected segment. In terms of particular techniques to effectively launch a DoS, a prominent one was flooding [10], [28], [29], [27], [11]. In this type of DoS attacks, an attacker uses weaknesses of the network or service where they become so overwhelmed with requests that they can no longer process genuine connection requests.…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Despite some time being in use, a detailed security analysis of the KNX Security extensions is still not available [34]. An earlier analysis of a draft state of KNXnet/IP Secure, however, found numerous attack vectors and security service shortcomings [35].…”
Section: A Knx-rfmentioning
confidence: 99%