{"id":"https://openalex.org/W2898450148","doi":"https://doi.org/10.1145/3277570.3277575","title":"A brief look at the security of DeviceNet communication in industrial control systems","display_name":"A brief look at the security of DeviceNet communication in industrial control systems","publication_year":2018,"publication_date":"2018-10-25","ids":{"openalex":"https://openalex.org/W2898450148","doi":"https://doi.org/10.1145/3277570.3277575","mag":"2898450148"},"language":"en","primary_location":{"id":"doi:10.1145/3277570.3277575","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3277570.3277575","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Central European Cybersecurity Conference 2018","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076112192","display_name":"Pal-Stefan Murvay","orcid":"https://orcid.org/0000-0002-0330-4523"},"institutions":[{"id":"https://openalex.org/I3122695212","display_name":"Polytechnic University of Timi\u015foara","ror":"https://ror.org/02v91gy68","country_code":"RO","type":"education","lineage":["https://openalex.org/I3122695212"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Pal-Stefan Murvay","raw_affiliation_strings":["Politehnica University of Timisoara, Timisoara, Romania"],"affiliations":[{"raw_affiliation_string":"Politehnica University of Timisoara, Timisoara, Romania","institution_ids":["https://openalex.org/I3122695212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048951454","display_name":"Bogdan Groza","orcid":"https://orcid.org/0000-0003-3078-3635"},"institutions":[{"id":"https://openalex.org/I3122695212","display_name":"Polytechnic University of Timi\u015foara","ror":"https://ror.org/02v91gy68","country_code":"RO","type":"education","lineage":["https://openalex.org/I3122695212"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Bogdan Groza","raw_affiliation_strings":["Politehnica University of Timisoara, Timisoara, Romania"],"affiliations":[{"raw_affiliation_string":"Politehnica University of Timisoara, Timisoara, Romania","institution_ids":["https://openalex.org/I3122695212"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076112192"],"corresponding_institution_ids":["https://openalex.org/I3122695212"],"apc_list":null,"apc_paid":null,"fwci":0.1288,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.49300056,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9728000164031982,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fieldbus","display_name":"Fieldbus","score":0.7674887180328369},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6748946905136108},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.553722083568573},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5453391671180725},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4575745761394501},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43566587567329407},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4211272597312927},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.39061635732650757},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.2846536636352539},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.19719281792640686},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17508170008659363}],"concepts":[{"id":"https://openalex.org/C2776690351","wikidata":"https://www.wikidata.org/wiki/Q1141640","display_name":"Fieldbus","level":3,"score":0.7674887180328369},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6748946905136108},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.553722083568573},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5453391671180725},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4575745761394501},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43566587567329407},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4211272597312927},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.39061635732650757},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.2846536636352539},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.19719281792640686},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17508170008659363},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3277570.3277575","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3277570.3277575","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Central European Cybersecurity Conference 2018","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G7829726488","display_name":null,"funder_award_id":"PN-III-P1-1.1-PD-2016-1198","funder_id":"https://openalex.org/F4320323983","funder_display_name":"Unitatea Executiva pentru Finantarea Invatamantului Superior, a Cercetarii, Dezvoltarii si Inovarii"}],"funders":[{"id":"https://openalex.org/F4320323983","display_name":"Unitatea Executiva pentru Finantarea Invatamantului Superior, a Cercetarii, Dezvoltarii si Inovarii","ror":"https://ror.org/01q7jq182"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W87635799","https://openalex.org/W133259797","https://openalex.org/W1546161534","https://openalex.org/W1782799247","https://openalex.org/W2025394175","https://openalex.org/W2038865613","https://openalex.org/W2162325770","https://openalex.org/W2483249058","https://openalex.org/W2561371397","https://openalex.org/W2743241167","https://openalex.org/W2790556489","https://openalex.org/W2791979009","https://openalex.org/W6950685506"],"related_works":["https://openalex.org/W2364079217","https://openalex.org/W2362184146","https://openalex.org/W2370803543","https://openalex.org/W2349039118","https://openalex.org/W2360798117","https://openalex.org/W2389872255","https://openalex.org/W2360919845","https://openalex.org/W2355885288","https://openalex.org/W2393376105","https://openalex.org/W2382984469"],"abstract_inverted_index":{"Security":[0],"is":[1,31],"a":[2,33,59],"vital":[3],"aspect":[4],"of":[5,25,57,102],"industrial":[6,72],"control":[7,65],"systems":[8,30],"since":[9],"they":[10],"are":[11],"used":[12,63],"in":[13,68,104,130],"critical":[14],"infrastructures":[15],"and":[16,109,125],"manufacturing":[17],"processes.":[18],"As":[19],"demonstrated":[20],"by":[21,120],"the":[22,36,69,75,87,100,112],"increasing":[23],"number":[24],"emerging":[26],"exploits,":[27],"securing":[28],"such":[29],"still":[32],"challenge":[34],"as":[35],"employed":[37],"fieldbus":[38],"technologies":[39],"do":[40],"not":[41],"offer":[42],"intrinsic":[43],"support":[44],"for":[45,64],"basic":[46],"security":[47,55,103],"objectives.":[48],"In":[49],"this":[50],"work":[51],"we":[52],"discuss":[53,98],"some":[54],"aspects":[56],"DeviceNet,":[58],"communication":[60],"protocol":[61,80],"widely":[62],"applications":[66],"especially":[67],"North":[70],"American":[71],"sector.":[73],"Having":[74],"Controller":[76],"Area":[77],"Network":[78],"(CAN)":[79],"at":[81],"its":[82],"base,":[83],"DeviceNet":[84,105],"inherits":[85],"all":[86],"vulnerabilities":[88,116],"that":[89,114],"were":[90],"already":[91],"illustrated":[92],"on":[93,111],"CAN":[94],"in-vehicle":[95],"communication.":[96],"We":[97],"how":[99],"lack":[101],"can":[106,117,127],"be":[107,118,128],"exploited":[108],"point":[110],"fact":[113],"these":[115],"modelled":[119],"existing":[121],"formal":[122],"verification":[123],"tools":[124],"countermeasures":[126],"put":[129],"place.":[131]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
