{"id":"https://openalex.org/W2048691756","doi":"https://doi.org/10.1145/2448556.2448588","title":"Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security","display_name":"Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security","publication_year":2013,"publication_date":"2013-01-17","ids":{"openalex":"https://openalex.org/W2048691756","doi":"https://doi.org/10.1145/2448556.2448588","mag":"2048691756"},"language":"en","primary_location":{"id":"doi:10.1145/2448556.2448588","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2448556.2448588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058676690","display_name":"Shahrulniza Musa","orcid":"https://orcid.org/0000-0003-4867-5085"},"institutions":[{"id":"https://openalex.org/I4528857","display_name":"University of Kuala Lumpur","ror":"https://ror.org/026wwrx19","country_code":"MY","type":"education","lineage":["https://openalex.org/I4528857"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Shahrulniza Musa","raw_affiliation_strings":["Malaysian Institute of Information Technology (MIIT) University, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Malaysian Institute of Information Technology (MIIT) University, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4528857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023104823","display_name":"Aamir Shahzad","orcid":"https://orcid.org/0000-0003-0265-545X"},"institutions":[{"id":"https://openalex.org/I4528857","display_name":"University of Kuala Lumpur","ror":"https://ror.org/026wwrx19","country_code":"MY","type":"education","lineage":["https://openalex.org/I4528857"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"AAmir Shahzad","raw_affiliation_strings":["Malaysian Institute of Information Technology (MIIT) University, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Malaysian Institute of Information Technology (MIIT) University, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4528857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035472036","display_name":"Abdulaziz Aborujilah","orcid":"https://orcid.org/0000-0002-7497-4321"},"institutions":[{"id":"https://openalex.org/I4528857","display_name":"University of Kuala Lumpur","ror":"https://ror.org/026wwrx19","country_code":"MY","type":"education","lineage":["https://openalex.org/I4528857"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Abdulaziz Aborujilah","raw_affiliation_strings":["Malaysian Institute of Information Technology (MIIT) University, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Malaysian Institute of Information Technology (MIIT) University, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4528857"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058676690"],"corresponding_institution_ids":["https://openalex.org/I4528857"],"apc_list":null,"apc_paid":null,"fwci":7.9741,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.97696868,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6460000276565552,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6460000276565552,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.5730000138282776,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.5339999794960022,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6730982661247253},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.6109298467636108},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5563778877258301},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5232835412025452},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49867963790893555},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.43275362253189087},{"id":"https://openalex.org/keywords/link-layer","display_name":"Link layer","score":0.42463985085487366},{"id":"https://openalex.org/keywords/data-link-layer","display_name":"Data link layer","score":0.4206305146217346},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.21811655163764954},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14820638298988342},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13629662990570068},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.07388505339622498},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.061271727085113525}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6730982661247253},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.6109298467636108},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5563778877258301},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5232835412025452},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49867963790893555},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.43275362253189087},{"id":"https://openalex.org/C12570599","wikidata":"https://www.wikidata.org/wiki/Q2891044","display_name":"Link layer","level":3,"score":0.42463985085487366},{"id":"https://openalex.org/C192835768","wikidata":"https://www.wikidata.org/wiki/Q194134","display_name":"Data link layer","level":4,"score":0.4206305146217346},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.21811655163764954},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14820638298988342},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13629662990570068},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.07388505339622498},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.061271727085113525},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2448556.2448588","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2448556.2448588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1530071485","https://openalex.org/W1544856668","https://openalex.org/W2040161058","https://openalex.org/W2106975460","https://openalex.org/W2152961710","https://openalex.org/W4234170459","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4249987491","https://openalex.org/W2406352538","https://openalex.org/W41342988","https://openalex.org/W2199447435","https://openalex.org/W2374193949","https://openalex.org/W2294481557","https://openalex.org/W4285325335","https://openalex.org/W2385057823","https://openalex.org/W2372799376","https://openalex.org/W40638262"],"abstract_inverted_index":{"SCADA":[0,38,51,54,92,108,118,140,161,174,212],"(Supervisory":[1],"Control":[2],"and":[3,14,28,71,83,132,150,162,185,197,205,215,260],"Data":[4,203,209,244,246],"Acquisition),":[5],"these":[6,66],"are":[7,94],"systems":[8,67,93],"based":[9],"on":[10],"real-time":[11],"processing,":[12],"control":[13,30],"design":[15],"for":[16,107,116,160,188],"real":[17,265],"time":[18,266],"infrastructure":[19],"such":[20,76,146,192,224],"as":[21,77,147,193,225,253],"water":[22],"pumping":[23],"stations,":[24],"oil":[25],"purification":[26],"plants":[27],"rail":[29],"centers":[31],"etc.":[32],"In":[33,120,152],"the":[34,48,167,173,238],"initial":[35],"structure":[36],"of":[37,99,139,217],"there":[39],"is":[40,56,181],"no":[41],"security":[42,105,144,190],"mechanism":[43],"that":[44,102,170],"prevents":[45],"or":[46],"detects":[47],"attacks":[49,101,169,223],"in":[50,62,199,237],"communication":[52,90,141],"network.":[53],"technology":[55],"not":[57],"new":[58],"but":[59],"was":[60],"deployed":[61,70],"limited":[63],"networks;":[64],"currently":[65],"have":[68],"been":[69],"accessible":[72],"by":[73,142],"many":[74],"networks":[75],"LAN/WAN,":[78],"Mobile":[79],"networks,":[80],"Web":[81],"Browsers":[82],"GPRS":[84],"through":[85],"internet":[86,100],"technology.":[87],"Using":[88],"Modern":[89],"facilities":[91],"vulnerable":[95],"from":[96,231,240,248],"different":[97],"types":[98],"create":[103],"major":[104,168],"problems":[106],"communication.":[109,119,175],"The":[110],"current":[111],"paper":[112,218,256],"proposes":[113],"cryptography":[114,158],"solutions":[115,187,220],"securing":[117],"first":[121],"part,":[122,154],"we":[123,155],"propose":[124,156],"Cryptography":[125,177],"solution":[126,159,164],"using":[127],"\"Advance":[128],"Encryption":[129],"Standard":[130],"(AES)":[131],"SHA-1":[133],"algorithms\"":[134],"to":[135,165,183,221,262],"secure":[136,264],"each":[137],"end":[138],"implementing":[143],"services":[145,191],"authentication,":[148,194],"integrity,":[149,195],"confidentiality":[151],"Second":[153],"hybrid":[157],"give":[163,186],"prevent":[166],"in-":[171],"Securing":[172],"\"Hybrid":[176],"Secure":[178],"Simulation":[179],"Model\"":[180],"used":[182],"discuss":[184],"putting":[189],"confidentiality,":[196],"non-repudiation":[198],"APDU":[200],"(Application":[201],"Protocol":[202,208],"Unit)":[204,210],"LPDU":[206],"(Link":[207],"within":[211],"DNP3":[213],"protocol,":[214],"Rest":[216],"provide":[219],"overcome/prevent":[222],"Guessing":[226],"Shared":[227],"Key,":[228],"Brute":[229],"force":[230],"Authentication;":[232],"Eavesdropping,":[233],"Key":[234],"Cracking,":[235],"Man":[236],"Middle":[239],"Confidentiality;":[241],"Frame":[242],"Injection,":[243],"Replay,":[245],"Deletion":[247],"Integrity.":[249],"We":[250],"use":[251],"DNP3Sec":[252],"framework.":[254],"Current":[255],"gives":[257],"research":[258],"Directions":[259],"methods":[261],"more":[263],"systems.":[267]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
