Securing the ZigBee protocol in the smart grid
Melaragno, Anthony Patrick
Michael, James Bret
MetadataShow full item record
The design-implement-fix process is sufficient for previously unknown attack vectors. However, engineers should use established knowledge, such as known attack patterns, in the analysis of security protocols prior to their acceptance and implementation.