2012
DOI: 10.1007/978-3-642-33678-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Towards an IT Security Protection Profile for Safety-Related Communication in Railway Automation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…t.manipulation may be considered to be a particular threat leading to unauthorized access and is very similar to the masquerade threat from EN 50159. More details can be found in [1,13].…”
Section: Comparison Of Threats Between En 50159 / En 50129 and Commonmentioning
confidence: 99%
“…t.manipulation may be considered to be a particular threat leading to unauthorized access and is very similar to the masquerade threat from EN 50159. More details can be found in [1,13].…”
Section: Comparison Of Threats Between En 50159 / En 50129 and Commonmentioning
confidence: 99%
“…Therefore, IT security requirements for railway automation is needed. Bock et al [11] discussed this issue and represented the CC-based IT security requirements for the railway domain as a protection profile. They also developed a reference architecture to distinguish IT security and safety requirements and discussed security objectives and threats in this application domain.…”
Section: Protection Profile In Railway Automationmentioning
confidence: 99%
“…They do not scale to a one-affects-all attack, because each field element has to be attacked individually. Also it is considered virtually impossible to protect against such physical attacks in a large-scale infrastructure like nationwide railway signalling [6,7]. For this reason, only protection against high-impact one-affects-all attacks is the main scope of this paper.…”
Section: Attacker Modelmentioning
confidence: 99%