Have a personal or library account? Click to login
Use of Blockchain Mechanisms in PLC Control and Safety Critical Processes Cover
Open Access
|Dec 2021

References

  1. [1] TAY, S., CHUAN, L. TE., AZIATI, A., AHMAD, A. N. A. 2018. An Overview of Industry 4.0: Definition, Components, and Government Initiatives. J. Adv. Res. Dyn. Control Syst., Vol. 10, p. 14.
  2. [2] YARDENI, E., JOHNSON, D., QUINTANA, M. 2021. Global Economic Briefing: Industrial Production. p. 21.
  3. [3] ERVURAL, B. and ERVURAL, B. Overview of Cyber Security in the Industry 4.0 Era. 2018, pp. 267–284.<a href="https://doi.org/10.1007/978-3-319-57870-5_16" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/978-3-319-57870-5_16</a>
  4. [4] BAEZNER, M. and ROBIN, P. 2018. Stuxnet.
  5. [5] LEE, R. M., ASSANTE, M. J. and CONWAY, T. ICS Defense Use Case. 2014. Accessed: May 04, 2021. [Online]. Available at: https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltc79a41dbf7d1441e/607f235775873e466bcc539c/ICS-CPPE-case-Study-2-German-Steelworks_Facility.pdf.
  6. [6] Researchers compromise secure Siemens PLC in cyberattack 1,” eeNews Europe, Aug. 09, 2019. https://www.eenewseurope.com/news/researchers-compromise-secure-siemens-plc-cyberattack (accessed May 04, 2021).
  7. [7] BITAN, S. 2020. Rogue7: Rogue Engineering Station Attacks on Simatic S7 PLCs. Accessed: May 04, 2021. [Online]. Available at: https://www.cs.technion.ac.il/~biham/Workshops/Cyberday/2020/Slides/sara-bitan.slides.pdf.
  8. [8] PAN, X., WANG, Z. and SUN, Y. 2020. Review of PLC Security Issues in Industrial Control System. J. Cyber Secur., 2(2), pp. 69–83. doi: <a href="https://doi.org/10.32604/jcs.2020.010045.10.32604/jcs.2020.010045" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.32604/jcs.2020.010045.10.32604/jcs.2020.010045</a>
  9. [9] MAO, M., XIAO, H. 2018. Blockchain-based Technology for Industrial Control System CyperSecurity. Presented at the 2018 International Conference on Network, Communication, Computer Engineering (NCCE 2018). China, Chongqing. doi: <a href="https://doi.org/10.2991/ncce-18.2018.151.10.2991/ncce-18.2018.151" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2991/ncce-18.2018.151.10.2991/ncce-18.2018.151</a>
  10. [10] ANDRIAN, H., BUDI KURNIAWAN, N., and SUHARDI, S. 2018. Blockchain Technology and Implementation : A Systematic Literature Review, p. 374.<a href="https://doi.org/10.1109/ICITSI.2018.8695939" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ICITSI.2018.8695939</a>
  11. [11] PANDA, S. K., ELNGAR, A. A., BALAS, V. E. and KAYED, M. 2020. Bitcoin and blockchain: history and current applications.<a href="https://doi.org/10.1201/9781003032588" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1201/9781003032588</a>
  12. [12] XU, X., WEBER, I. and STAPLES, M. 2019. Cost, in Architecture for Blockchain Applications. Springer Nature Switzerland AG, pp. 175–195.
  13. [13] F. ul HASSAN et al. Blockchain And The Future of the Internet: A Comprehensive Review. ArXiv190400733 Cs, Nov. 2020, Accessed: Apr. 22, 2021. [Online]. Available at: http://arxiv.org/abs/1904.00733.
  14. [14] SANKA, A. I., IRFAN, M., HUANG, I. and CHEUNG. R. C. C. 2021. A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research. Comput. Commun., 169, pp. 179–201. doi: <a href="https://doi.org/10.1016/j.comcom.2020.12.028.10.1016/j.comcom.2020.12.028" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.comcom.2020.12.028.10.1016/j.comcom.2020.12.028</a>
  15. [15] BONEH, D. and SHOUP, V. 2020. A Graduate Course in Applied Cryptography. Stanford University.
  16. [16] SOBTI, R. and GANESAN, G. 2012. Cryptographic Hash Functions: A Review. Int. J. Comput. Sci. Issues, 9, pp. 461–479.
  17. [17] Siemens, “SIMATIC Safety - Configuring and Programming.” Accessed: May 05, 2021. [Online]. Available: https://support.industry.siemens.com/cs/document/54110126/simatic-industrial-software-simatic-safety-configuring-and-programming.
  18. [18] KIM, D. S. and TRAN DANG, H. 2019. An Overview on Industrial Control Networks. In: Industrial Sensors and Controls in Communication Networks: From Wired Technologies to Cloud Computing and the Internet of Things, D.-S. Kim and H. Tran-Dang, Eds. Cham: Springer International Publishing, pp. 3–16.
  19. [19] Nidhal BEN ALOUI. Industrial Control Systems Dynamic Code Injection, presented at the GreHack, Grenoble, FRANCE, Nov. 2015, Accessed: May 04, 2021. [Online]. Available: https://grehack.fr/data/grehack2015/paper/Grehack 2015 - Paper - Industrial Control Systems Dynamic Code Injection.pdf.
  20. [20] Siemens, Safety Programming Guideline for SIMATIC S7-1200/1500. Accessed: May 04, 2021. [Online]. Available: https://support.industry.siemens.com/cs/ww/en/view/109750255.
  21. [21] Siemens, Cycle and response times. Accessed: May 05, 2021. [Online]. Available: https://cache.industry.siemens.com/dl/files/558/59193558/att_895996/v1/s71500_cycle_and_reaction_times_function_manual_en-US_en-US.pdf.
Language: English
Page range: 1 - 6
Submitted on: May 6, 2021
Accepted on: May 13, 2021
Published on: Dec 7, 2021
Published by: Slovak University of Technology
In partnership with: Paradigm Publishing Services
Publication frequency: 2 times per year

© 2021 Dušan Horváth, Maximilián Strémy, published by Slovak University of Technology
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.