Securing the ZigBee protocol in the smart grid
Melaragno, Anthony Patrick
Michael, James Bret
MetadataShow full item record
The design-implement-fix process is sufficient for previously unknown attack vectors. However, engineers should use established knowledge, such as known attack patterns, in the analysis of security protocols prior to their acceptance and implementation.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.