{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T05:14:49Z","timestamp":1719033289155},"reference-count":20,"publisher":"SAGE Publications","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["10044457"],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015]]},"abstract":"This study examined the security of SCADA system and its protocols, more specifically, SCADA\/DNP3 protocol security. To achieve the study goals, a SCADA simulation environment is designed for water pumping process through connectivity of intelligent sensors, the payload is constructed, and security is deployed inside DNP3 protocol stack and then bytes are multicast to subcontrollers.<\/jats:p>","DOI":"10.1155\/2015\/738687","type":"journal-article","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T21:03:03Z","timestamp":1445893383000},"page":"1-15","source":"Crossref","is-referenced-by-count":6,"title":["The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission"],"prefix":"10.1177","volume":"2015","author":[{"given":"Aamir","family":"Shahzad","sequence":"first","affiliation":[]},{"given":"Kalum Priyanath","family":"Udagepola","sequence":"additional","affiliation":[]},{"given":"Young-keun","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5935-9523","authenticated-orcid":true,"given":"Soojin","family":"Park","sequence":"additional","affiliation":[]},{"given":"Malrey","family":"Lee","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"key":"8","year":"2006"},{"key":"9","year":"2004"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/tpwrs.2008.2002298"},{"issue":"4","key":"28","first-page":"160","volume":"20","year":"2005","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"29","first-page":"150","volume-title":"SCADA protocol vulnerabilities","year":"2012"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2005.37"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13346-6_6"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/sec.834"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23948-9_4"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/sec.860"},{"issue":"3","key":"17","first-page":"1241","volume":"15","year":"2012","journal-title":"Information"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.3923\/tasr.2014.381.395"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_34"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19542-6_10"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_10"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1145\/1538788.1538820"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tpwrs.2008.926456"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/tpwrd.2009.2034830"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2014.2487.2497"},{"key":"18","year":"2003"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2015\/738687.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2015\/738687.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/738687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T11:53:06Z","timestamp":1509709986000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/ijdsn\/2015\/738687\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":20,"alternative-id":["738687","738687"],"URL":"https:\/\/doi.org\/10.1155\/2015\/738687","relation":{},"ISSN":["1550-1329","1550-1477"],"issn-type":[{"value":"1550-1329","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}