2013
DOI: 10.1007/978-3-642-41488-6_14
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Building Automation Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…In [72], the lack of security in KNX is improved with the use of an online key server and elliptic curve cryptography (ECC). In [73], the authors propose a multiparty key agreement scheme equivalent to Diffie-Hellman problem, however, their solution seems resource demanding as it requires one minute of computation on a KNX network. Numerous security challenges in SB are discussed in [32], along with possible counter measures such as packet filtering or proxies-filters to strengthen KNX security.…”
Section: Protocol-specific Defencesmentioning
confidence: 99%
“…In [72], the lack of security in KNX is improved with the use of an online key server and elliptic curve cryptography (ECC). In [73], the authors propose a multiparty key agreement scheme equivalent to Diffie-Hellman problem, however, their solution seems resource demanding as it requires one minute of computation on a KNX network. Numerous security challenges in SB are discussed in [32], along with possible counter measures such as packet filtering or proxies-filters to strengthen KNX security.…”
Section: Protocol-specific Defencesmentioning
confidence: 99%
“…Information security in building automation systems has been studied in [4], [5], [13] and [14]. Demonstrations of working breaches have been shown in [15] with discussion over the attack motivations, methodology and possible damages as well as the difficulty of improving the situation quickly.…”
Section: Related Workmentioning
confidence: 99%