首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
Evaluation of SDN security measures in the context of IEC 62443-3-3 根据 IEC 62443-3-3 评估 SDN 安全措施
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.ijcip.2024.100716
Georgios Michail Makrakis , Dakota Roberson , Constantinos Kolias , Dallin Cook

The security of assets within electrical substations is paramount to ensuring the reliable and resilient operation of the energy sector. However, implementing existing industry cybersecurity standards in these environments presents numerous technical challenges. In this work, we provide systematic guidance that emphasizes best practices and prioritizes requirement implementation. We examine the application of Software-Defined Networking (SDN) as a means to enhance security within the IEC 62443 family of standards. Specifically, we offer insights into how the security measures required for compliance with the IEC 62443 security standards can impact the stringent timing constraints of contemporary communication protocols, enabling advanced distribution system operations in the future. Utilizing a testbed modeled after a real-world electrical substation, we demonstrate that while SDN-based security features naturally introduce some additional latency, their operational impact on the network’s strict constraints is minimal.

变电站内资产的安全对于确保能源行业的可靠和弹性运行至关重要。然而,在这些环境中实施现有的行业网络安全标准面临着诸多技术挑战。在这项工作中,我们提供了系统性指导,强调最佳实践并优先考虑要求的实施。我们研究了软件定义网络(SDN)的应用,将其作为增强 IEC 62443 系列标准安全性的一种手段。具体来说,我们深入探讨了符合 IEC 62443 安全标准所需的安全措施如何影响当代通信协议的严格时序约束,从而在未来实现先进的配电系统操作。利用仿照真实世界变电站的测试平台,我们证明了虽然基于 SDN 的安全功能自然会带来一些额外的延迟,但它们对网络严格限制的运行影响微乎其微。
{"title":"Evaluation of SDN security measures in the context of IEC 62443-3-3","authors":"Georgios Michail Makrakis ,&nbsp;Dakota Roberson ,&nbsp;Constantinos Kolias ,&nbsp;Dallin Cook","doi":"10.1016/j.ijcip.2024.100716","DOIUrl":"10.1016/j.ijcip.2024.100716","url":null,"abstract":"<div><p>The security of assets within electrical substations is paramount to ensuring the reliable and resilient operation of the energy sector. However, implementing existing industry cybersecurity standards in these environments presents numerous technical challenges. In this work, we provide systematic guidance that emphasizes best practices and prioritizes requirement implementation. We examine the application of Software-Defined Networking (SDN) as a means to enhance security within the IEC 62443 family of standards. Specifically, we offer insights into how the security measures required for compliance with the IEC 62443 security standards can impact the stringent timing constraints of contemporary communication protocols, enabling advanced distribution system operations in the future. Utilizing a testbed modeled after a real-world electrical substation, we demonstrate that while SDN-based security features naturally introduce some additional latency, their operational impact on the network’s strict constraints is minimal.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100716"},"PeriodicalIF":4.1,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive vulnerability assessment for environmental facility depending on spatial characteristics in South Korea 根据韩国的空间特征对环境设施进行综合脆弱性评估
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1016/j.ijcip.2024.100715
Young Hwan Choi , Do Guen Yoo , Pill Jae Kwak , Hyung Do Kim , Jungsu Park , Jaehyeoung Park , Younghan Yoon

Among environmental facilities, wastewater treatment facilities have a crucial role in sustaining human life, and any occurrence of an earthquake or flood within these facilities can result in various social, economic, and environmental issues, either directly or indirectly. Therefore, a quantitative vulnerability assessment of wastewater treatment facilities is necessary to minimize and prevent damage from earthquakes and flood disasters. For this reason, this study introduces a novel indicator to assess the susceptibility of disasters, considering aspects of exposure, sensitivity, and adaptive capacity. The newly proposed indicator encompasses numerous evaluation criteria, topography, natural surroundings, hydraulic systems, structural composition, and non-structural features. Also, Weights derived using the combined weight calculation (CWC) method, which combined the analytic hierarchy process (AHP) and entropy weight method were applied to the indicator. It was tested across 23 cities to validate its efficacy, revealing a substantial correlation between the vulnerability index and the specific attributes of the city's wastewater treatment facilities. Therefore, this study analyzed wastewater treatment facilities by comparing the attributes of the urban areas under investigation, such as topological characteristics, urbanization levels, population density, infrastructure quality, and disaster preparedness resources available. The suggested methodology can facilitate the development of strategies aimed at averting damage caused by earthquakes or floods and reducing the adverse impact on wastewater treatment facilities while considering the unique characteristics of the urban setting in question.

在环境设施中,污水处理设施对维持人类生活起着至关重要的作用,这些设施内发生的任何地震或洪水都会直接或间接地导致各种社会、经济和环境问题。因此,有必要对污水处理设施进行定量脆弱性评估,以最大限度地减少和预防地震和洪水灾害造成的损失。为此,本研究引入了一个新指标来评估灾害的易损性,该指标考虑了暴露程度、敏感性和适应能力等方面。新提出的指标包含多个评估标准、地形、自然环境、水力系统、结构组成和非结构特征。此外,该指标还采用了综合权重计算法(CWC),该方法结合了层次分析法(AHP)和熵权法。该指标在 23 个城市中进行了测试,以验证其有效性,结果显示脆弱性指数与城市污水处理设施的具体属性之间存在很大的相关性。因此,本研究通过比较被调查城市地区的属性,如地形特征、城市化水平、人口密度、基础设施质量和可用的备灾资源,对污水处理设施进行了分析。所建议的方法有助于制定战略,以避免地震或洪水造成的破坏,减少对污水处理设施的不利影响,同时考虑到相关城市环境的独特性。
{"title":"Comprehensive vulnerability assessment for environmental facility depending on spatial characteristics in South Korea","authors":"Young Hwan Choi ,&nbsp;Do Guen Yoo ,&nbsp;Pill Jae Kwak ,&nbsp;Hyung Do Kim ,&nbsp;Jungsu Park ,&nbsp;Jaehyeoung Park ,&nbsp;Younghan Yoon","doi":"10.1016/j.ijcip.2024.100715","DOIUrl":"10.1016/j.ijcip.2024.100715","url":null,"abstract":"<div><p>Among environmental facilities, wastewater treatment facilities have a crucial role in sustaining human life, and any occurrence of an earthquake or flood within these facilities can result in various social, economic, and environmental issues, either directly or indirectly. Therefore, a quantitative vulnerability assessment of wastewater treatment facilities is necessary to minimize and prevent damage from earthquakes and flood disasters. For this reason, this study introduces a novel indicator to assess the susceptibility of disasters, considering aspects of exposure, sensitivity, and adaptive capacity. The newly proposed indicator encompasses numerous evaluation criteria, topography, natural surroundings, hydraulic systems, structural composition, and non-structural features. Also, Weights derived using the combined weight calculation (CWC) method, which combined the analytic hierarchy process (AHP) and entropy weight method were applied to the indicator. It was tested across 23 cities to validate its efficacy, revealing a substantial correlation between the vulnerability index and the specific attributes of the city's wastewater treatment facilities. Therefore, this study analyzed wastewater treatment facilities by comparing the attributes of the urban areas under investigation, such as topological characteristics, urbanization levels, population density, infrastructure quality, and disaster preparedness resources available. The suggested methodology can facilitate the development of strategies aimed at averting damage caused by earthquakes or floods and reducing the adverse impact on wastewater treatment facilities while considering the unique characteristics of the urban setting in question.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100715"},"PeriodicalIF":4.1,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142164705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator 确保工业控制系统的安全:开发 SCADA/IoT 测试台并在硬件模拟器上评估轻量级密码性能
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-23 DOI: 10.1016/j.ijcip.2024.100705
Darshana Upadhyay , Sagarika Ghosh , Hiroyuki Ohno , Marzia Zaman , Srinivas Sampalli

This paper addresses the critical need for enhancing security in Supervisory Control and Data Acquisition (SCADA) networks within Industrial Control Systems (ICSs) to protect the industrial processes from cyber-attacks. The purpose of our work is to propose and evaluate lightweight security measures to safeguard critical infrastructure resources. The scope of our effort involves simulating a secure SCADA/IoT-based hardware test bench for ICSs, utilizing Modbus and MQTT communication protocols. Through case studies in remote servo motor control, water distribution systems, and power system voltage level indicators, vulnerabilities such as Denial of Service (DoS) and Man-in-The-Middle (MiTM) attacks are identified, and security recommendations are provided. To execute our work, we deploy lightweight ciphers such as Prime Counter & Hash Chaining (PCHC) and Ascon algorithm with Compression Rate (ACR) for secure information exchange between the plant floor and the control center. Evaluation of these ciphers on Raspberry Pi focuses on execution speed and memory utilization. Additionally, a comparison with the AGA-12 protocol standard for SCADA networks is conducted to underscore the efficacy of the proposed security measures. Our findings include the identification of SCADA network vulnerabilities and the proposal of lightweight security measures to mitigate risks. Performance evaluation of the proposed ciphers on Raspberry Pi demonstrates their effectiveness, emphasizing the importance of deploying such measures to ensure resilience against cyber threats in SCADA environments.

本文论述了加强工业控制系统(ICS)内的监控与数据采集(SCADA)网络安全性以保护工业流程免受网络攻击的迫切需要。我们工作的目的是提出并评估轻量级安全措施,以保护关键基础设施资源。我们的工作范围包括利用 Modbus 和 MQTT 通信协议,为 ICS 模拟基于 SCADA/IoT 的安全硬件测试台。通过对远程伺服电机控制、配水系统和电力系统电压等级指示器的案例研究,我们确定了拒绝服务(DoS)和中间人(MiTM)攻击等漏洞,并提供了安全建议。为了开展工作,我们部署了轻量级密码,如 Prime Counter & Hash Chaining (PCHC) 和 Ascon algorithm with Compression Rate (ACR),用于工厂底层和控制中心之间的安全信息交换。在 Raspberry Pi 上对这些密码的评估主要集中在执行速度和内存利用率上。此外,还与 SCADA 网络的 AGA-12 协议标准进行了比较,以强调所建议的安全措施的有效性。我们的研究结果包括识别 SCADA 网络漏洞和提出轻量级安全措施以降低风险。在树莓派(Raspberry Pi)上对所建议的密码进行的性能评估证明了其有效性,强调了部署此类措施以确保抵御 SCADA 环境中网络威胁的重要性。
{"title":"Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator","authors":"Darshana Upadhyay ,&nbsp;Sagarika Ghosh ,&nbsp;Hiroyuki Ohno ,&nbsp;Marzia Zaman ,&nbsp;Srinivas Sampalli","doi":"10.1016/j.ijcip.2024.100705","DOIUrl":"10.1016/j.ijcip.2024.100705","url":null,"abstract":"<div><p>This paper addresses the critical need for enhancing security in Supervisory Control and Data Acquisition (SCADA) networks within Industrial Control Systems (ICSs) to protect the industrial processes from cyber-attacks. The purpose of our work is to propose and evaluate lightweight security measures to safeguard critical infrastructure resources. The scope of our effort involves simulating a secure SCADA/IoT-based hardware test bench for ICSs, utilizing Modbus and MQTT communication protocols. Through case studies in remote servo motor control, water distribution systems, and power system voltage level indicators, vulnerabilities such as Denial of Service (DoS) and Man-in-The-Middle (MiTM) attacks are identified, and security recommendations are provided. To execute our work, we deploy lightweight ciphers such as Prime Counter &amp; Hash Chaining (PCHC) and Ascon algorithm with Compression Rate (ACR) for secure information exchange between the plant floor and the control center. Evaluation of these ciphers on Raspberry Pi focuses on execution speed and memory utilization. Additionally, a comparison with the AGA-12 protocol standard for SCADA networks is conducted to underscore the efficacy of the proposed security measures. Our findings include the identification of SCADA network vulnerabilities and the proposal of lightweight security measures to mitigate risks. Performance evaluation of the proposed ciphers on Raspberry Pi demonstrates their effectiveness, emphasizing the importance of deploying such measures to ensure resilience against cyber threats in SCADA environments.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100705"},"PeriodicalIF":4.1,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548224000465/pdfft?md5=aab404315863014667e25aa2e54961de&pid=1-s2.0-S1874548224000465-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142088708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience quantification and recovery strategy simulation for urban underground logistics systems under node and link attacks: A case study of Nanjing city 节点与链路攻击下城市地下物流系统的弹性量化与恢复策略模拟:南京市案例研究
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-11 DOI: 10.1016/j.ijcip.2024.100704
Ying Lu, Qingling Wang, Shiyu Huang, Wenhui Yu, Shuyue Yao

Urban Underground Logistics Systems (UULS) have become an emerging solution to mitigate urban surface traffic congestion, environmental pollution, and surface transport safety risks. However, during the operation of UULS, the use of advanced technologies such as the Internet of Things (IoT) introduces cybersecurity risks to the system. Moreover, severe natural disasters can also cause damage to underground transportation network links. Existing research and planning primarily concentrate on the system design and benefits of UULS, neglecting the system's service level under attack scenarios. This study outlines three representative UULS network prototypes and proposes a resilience quantification method centered on logistics efficiency. It also focuses on comparing the effectiveness of three recovery strategies. These strategies give priority to maximum flow, betweenness centrality, and regional importance, as well as the priority of node and link repairs. The resilience quantification method and recovery strategies are applied in a case study set in Nanjing City. The case study results reveal that the Two-echelon network shows exceptional resilience. Regarding the effectiveness of recovery strategies, the strategy based on maximum flow proves to be the most effective, and focusing on node repair can lead to higher system resilience. Based on these findings, this study offers recommendations to transportation and logistics management decision-makers, focusing on UULS resilience and recovery strategy selection. These recommendations are intended to provide valuable guidance for the planning and design of future UULS, ensuring their resilience and reliability.

城市地下物流系统(UULS)已成为缓解城市地面交通拥堵、环境污染和地面交通安全风险的新兴解决方案。然而,在 UULS 运行过程中,物联网(IoT)等先进技术的使用会给系统带来网络安全风险。此外,严重的自然灾害也会对地下交通网络链接造成破坏。现有的研究和规划主要集中在 UULS 的系统设计和优势上,忽视了系统在攻击情况下的服务水平。本研究概述了三个具有代表性的 UULS 网络原型,并提出了一种以物流效率为中心的弹性量化方法。研究还重点比较了三种恢复策略的有效性。这些策略优先考虑最大流量、介度中心性和区域重要性,以及节点和链路修复的优先级。复原力量化方法和复原策略在南京市的案例研究中得到了应用。案例研究结果表明,"双核网络 "表现出了卓越的恢复能力。在恢复策略的有效性方面,基于最大流量的策略被证明是最有效的,而专注于节点修复则能带来更高的系统恢复能力。基于这些发现,本研究针对 UULS 的恢复能力和恢复策略选择,向运输和物流管理决策者提出了建议。这些建议旨在为未来 UULS 的规划和设计提供有价值的指导,确保其恢复能力和可靠性。
{"title":"Resilience quantification and recovery strategy simulation for urban underground logistics systems under node and link attacks: A case study of Nanjing city","authors":"Ying Lu,&nbsp;Qingling Wang,&nbsp;Shiyu Huang,&nbsp;Wenhui Yu,&nbsp;Shuyue Yao","doi":"10.1016/j.ijcip.2024.100704","DOIUrl":"10.1016/j.ijcip.2024.100704","url":null,"abstract":"<div><p>Urban Underground Logistics Systems (UULS) have become an emerging solution to mitigate urban surface traffic congestion, environmental pollution, and surface transport safety risks. However, during the operation of UULS, the use of advanced technologies such as the Internet of Things (IoT) introduces cybersecurity risks to the system. Moreover, severe natural disasters can also cause damage to underground transportation network links. Existing research and planning primarily concentrate on the system design and benefits of UULS, neglecting the system's service level under attack scenarios. This study outlines three representative UULS network prototypes and proposes a resilience quantification method centered on logistics efficiency. It also focuses on comparing the effectiveness of three recovery strategies. These strategies give priority to maximum flow, betweenness centrality, and regional importance, as well as the priority of node and link repairs. The resilience quantification method and recovery strategies are applied in a case study set in Nanjing City. The case study results reveal that the Two-echelon network shows exceptional resilience. Regarding the effectiveness of recovery strategies, the strategy based on maximum flow proves to be the most effective, and focusing on node repair can lead to higher system resilience. Based on these findings, this study offers recommendations to transportation and logistics management decision-makers, focusing on UULS resilience and recovery strategy selection. These recommendations are intended to provide valuable guidance for the planning and design of future UULS, ensuring their resilience and reliability.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100704"},"PeriodicalIF":4.1,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of cross-border electricity interconnection projects using a MCDA method 使用 MCDA 方法评估跨境电力联网项目
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-08 DOI: 10.1016/j.ijcip.2024.100703
Natalia Naval, Jose M. Yusta

The European Union is promoting cross-border electricity interconnection projects to achieve energy objectives, reduce the current fragmented European market, and eradicate the isolation of the most disadvantaged areas. However, selecting these projects is a complex task because there are multiple objectives, criteria, participants and alternatives involved. This paper aims to develop a multi-criteria decision analysis (MCDA) method for appropriately assessing and prioritizing cross-border electricity interconnection projects considering technical, economic, environmental and social criteria. Additionally, this work analyzes interconnection effects on the resilience of interconnected power systems. To verify its validity, this method is applied to prioritize new Spain-France interconnection infrastructure projects. From the results obtained, the technical and environmental criteria have proven to be the most important, since cross-border electricity interconnection projects are aimed at better market-coupling, less congestion and higher reliability while minimizing environmental impacts. In short, the proposed methodology provides a comprehensive view of the impact of these projects.

欧盟正在推动跨境电力互联项目,以实现能源目标,减少目前分散的欧洲市场,并消除最落后地区的孤立状态。然而,选择这些项目是一项复杂的任务,因为其中涉及多个目标、标准、参与者和备选方案。本文旨在开发一种多标准决策分析(MCDA)方法,用于考虑技术、经济、环境和社会标准,对跨境电力互联项目进行适当评估和优先排序。此外,本文还分析了互联对互联电力系统恢复能力的影响。为了验证该方法的有效性,我们将其应用于西班牙-法国新的互联基础设施项目的优先排序。从获得的结果来看,技术和环境标准被证明是最重要的,因为跨境电力互联项目的目的是更好地耦合市场、减少拥堵和提高可靠性,同时最大限度地减少对环境的影响。总之,所提出的方法能够全面反映这些项目的影响。
{"title":"Assessment of cross-border electricity interconnection projects using a MCDA method","authors":"Natalia Naval,&nbsp;Jose M. Yusta","doi":"10.1016/j.ijcip.2024.100703","DOIUrl":"10.1016/j.ijcip.2024.100703","url":null,"abstract":"<div><p>The European Union is promoting cross-border electricity interconnection projects to achieve energy objectives, reduce the current fragmented European market, and eradicate the isolation of the most disadvantaged areas. However, selecting these projects is a complex task because there are multiple objectives, criteria, participants and alternatives involved. This paper aims to develop a multi-criteria decision analysis (MCDA) method for appropriately assessing and prioritizing cross-border electricity interconnection projects considering technical, economic, environmental and social criteria. Additionally, this work analyzes interconnection effects on the resilience of interconnected power systems. To verify its validity, this method is applied to prioritize new Spain-France interconnection infrastructure projects. From the results obtained, the technical and environmental criteria have proven to be the most important, since cross-border electricity interconnection projects are aimed at better market-coupling, less congestion and higher reliability while minimizing environmental impacts. In short, the proposed methodology provides a comprehensive view of the impact of these projects.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100703"},"PeriodicalIF":4.1,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548224000441/pdfft?md5=8b19846c0ed1e9f07e6bf1f0af07250e&pid=1-s2.0-S1874548224000441-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141939998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber attacks on critical infrastructures and satellite communications 对关键基础设施和卫星通信的网络攻击
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-03 DOI: 10.1016/j.ijcip.2024.100701
Dr. Antonio Carlo , Dr. Kim Obergfaell

The cyber-attack on the Ukrainian positioning network at the beginning of the ongoing Russia-Ukraine war demonstrated how the branching of satellite connections can have severe repercussions for communication systems. While ground-based networks are changing, the vulnerability of critical infrastructure to cyber-attacks and technical failures has become a serious concern. As cyber attackers are increasingly targeting industrial control systems rather than stealing data, attacks have become more sophisticated and significant. Future connectivity to 5 G networks, the entry of new private players in this sector, and the economic growth of emerging countries will further increase the attack surface of the space sector. A risk-based approach is therefore needed to increase protection and resilience against cyber-attacks. This requires a comprehensive understanding of the technologies and their vulnerabilities, as well as the ability to quickly develop solutions to counter attacks. Responding effectively with legal and policy means is essential to adapting to changes and to providing continuity and security of services. This paper highlights the main qualities of communication technology, its vulnerabilities, and the critical challenges to achieving cyber resilience. It identifies significant assets, defence solutions, and legal and policy aspects that should be further researched to enhance the cyber resilience of European assets.

正在进行的俄乌战争初期对乌克兰定位网络的网络攻击表明,卫星连接的分支会对通信系统造成严重影响。在地面网络发生变化的同时,关键基础设施易受网络攻击和技术故障影响的问题已成为人们严重关切的问题。由于网络攻击者越来越多地瞄准工业控制系统,而不是窃取数据,攻击变得更加复杂和严重。未来与 5 G 网络的连接、新的私营企业进入这一领域以及新兴国家的经济增长,都将进一步增加空间部门的攻击面。因此,需要采取基于风险的方法来加强对网络攻击的保护和抵御能力。这就需要全面了解技术及其脆弱性,并有能力迅速制定应对攻击的解决方案。利用法律和政策手段有效应对,对于适应变化、提供服务的连续性和安全性至关重要。本文重点介绍了通信技术的主要特性、其脆弱性以及实现网络复原力的关键挑战。它确定了应进一步研究的重要资产、防御解决方案以及法律和政策方面,以提高欧洲资产的网络复原力。
{"title":"Cyber attacks on critical infrastructures and satellite communications","authors":"Dr. Antonio Carlo ,&nbsp;Dr. Kim Obergfaell","doi":"10.1016/j.ijcip.2024.100701","DOIUrl":"10.1016/j.ijcip.2024.100701","url":null,"abstract":"<div><p>The cyber-attack on the Ukrainian positioning network at the beginning of the ongoing Russia-Ukraine war demonstrated how the branching of satellite connections can have severe repercussions for communication systems. While ground-based networks are changing, the vulnerability of critical infrastructure to cyber-attacks and technical failures has become a serious concern. As cyber attackers are increasingly targeting industrial control systems rather than stealing data, attacks have become more sophisticated and significant. Future connectivity to 5 G networks, the entry of new private players in this sector, and the economic growth of emerging countries will further increase the attack surface of the space sector. A risk-based approach is therefore needed to increase protection and resilience against cyber-attacks. This requires a comprehensive understanding of the technologies and their vulnerabilities, as well as the ability to quickly develop solutions to counter attacks. Responding effectively with legal and policy means is essential to adapting to changes and to providing continuity and security of services. This paper highlights the main qualities of communication technology, its vulnerabilities, and the critical challenges to achieving cyber resilience. It identifies significant assets, defence solutions, and legal and policy aspects that should be further researched to enhance the cyber resilience of European assets.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100701"},"PeriodicalIF":4.1,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141939996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based anonymous authentication and data aggregation for advanced metering infrastructure in smart grid 基于区块链的匿名认证和数据聚合,用于智能电网中的高级计量基础设施
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-03 DOI: 10.1016/j.ijcip.2024.100702
Tingrui Pei , Zhiwen Hou , Jun Zhou , Chixin Xiao , Juan Zou

This paper proposes a blockchain-based scheme, focusing on anonymous identity authentication and data aggregation, for safer and more reliable bidirectional communication between the utility company and power consumers based on Advanced Metering Infrastructure (AMI). Firstly, to cope with the mutual identity authentication between resource-constrained Smart Meters, a lightweight anonymous authentication strategy is designed using Elliptic Curve Cryptography. Meanwhile, a reputation-based consensus protocol is developed to accomplish data aggregation in AMI by using decentralization and non-tampering features of the blockchain. During the communication, in each time slot, the proposed scheme only needs to select a trusted user randomly to undertake the mining node rather than to introduce a third-party in a centralized manner to summarize and record the user-side data into the blockchain. Such scheme can effectively prevent data tampering and also be effective to decrease the processing complexity. The AVISPA tool is adopted to formally evaluate its security. The simulation results show promising performance. The proposed scheme not only can guarantee secure communication but also effectively decrease the computational cost in AMI.

本文提出了一种基于区块链的方案,重点关注匿名身份验证和数据聚合,以实现基于高级计量基础设施(AMI)的公用事业公司与电力用户之间更安全、更可靠的双向通信。首先,为了应对资源受限的智能电表之间的相互身份验证,设计了一种使用椭圆曲线加密技术的轻量级匿名身份验证策略。同时,利用区块链的去中心化和不可篡改特性,开发了基于信誉的共识协议,以完成 AMI 中的数据聚合。在通信过程中,在每个时隙,所提出的方案只需随机选择一个可信用户来承担挖矿节点,而不需要以中心化的方式引入第三方将用户端数据汇总并记录到区块链中。这种方案可以有效防止数据被篡改,也能有效降低处理复杂度。本文采用 AVISPA 工具对其安全性进行了正式评估。仿真结果表明该方案性能良好。所提出的方案不仅能保证通信安全,还能有效降低 AMI 的计算成本。
{"title":"Blockchain-based anonymous authentication and data aggregation for advanced metering infrastructure in smart grid","authors":"Tingrui Pei ,&nbsp;Zhiwen Hou ,&nbsp;Jun Zhou ,&nbsp;Chixin Xiao ,&nbsp;Juan Zou","doi":"10.1016/j.ijcip.2024.100702","DOIUrl":"10.1016/j.ijcip.2024.100702","url":null,"abstract":"<div><p>This paper proposes a blockchain-based scheme, focusing on anonymous identity authentication and data aggregation, for safer and more reliable bidirectional communication between the utility company and power consumers based on Advanced Metering Infrastructure (AMI). Firstly, to cope with the mutual identity authentication between resource-constrained Smart Meters, a lightweight anonymous authentication strategy is designed using Elliptic Curve Cryptography. Meanwhile, a reputation-based consensus protocol is developed to accomplish data aggregation in AMI by using decentralization and non-tampering features of the blockchain. During the communication, in each time slot, the proposed scheme only needs to select a trusted user randomly to undertake the mining node rather than to introduce a third-party in a centralized manner to summarize and record the user-side data into the blockchain. Such scheme can effectively prevent data tampering and also be effective to decrease the processing complexity. The AVISPA tool is adopted to formally evaluate its security. The simulation results show promising performance. The proposed scheme not only can guarantee secure communication but also effectively decrease the computational cost in AMI.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100702"},"PeriodicalIF":4.1,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141939995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic dynamic resilience quantification for infrastructure systems in multi-hazard environments 多灾害环境下基础设施系统的概率动态复原力量化
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1016/j.ijcip.2024.100698
Ahmed Badr , Zoe Li , Wael El-Dakhakhni

Resilience has been evolving as a key criterion for infrastructure systems as it ensures the system's dynamic performance pre-, during, and post-hazard disruptions. However, estimating these performances is challenging due to system and operation complexities, and the probabilistic dynamic nature of infrastructure system. Moreover, infrastructure systems are usually exposed to multi-hazard environments, with their own probabilistic behavior, leading to additional complexity in terms of estimating the system response and, subsequently, the overall system resilience. As such, this study develops a probabilistic resilience-centric system dynamics modeling approach to quantify infrastructure dynamic resilience based on a holistic representation of infrastructure systems under multi-hazard scenarios, whereby the probabilistic natures of both the hazards and system are incorporated. Unlike the traditional resilience quantification approaches that represent system resilience by a single value calculated after the system's full recovery, the developed model focuses on tracking the temporal evolution of system resilience along the entire period of system performance deterioration and recovery. A real-world hydropower dam, as an example for infrastructure systems, in British Columbia, Canada is used as a demonstration application to show model utility in developing resilience-guided assessment plans for infrastructure systems. Overall, the developed approach empowers the decision-makers with insights into critical operational periods, the required time to reach specified resilience targets, and the efficiency of risk mitigation measures in real-time.

抗灾能力已逐渐成为基础设施系统的一个关键标准,因为它能确保系统在灾害中断之前、期间和之后的动态性能。然而,由于系统和运行的复杂性,以及基础设施系统的概率动态特性,对这些性能进行估算具有挑战性。此外,基础设施系统通常会暴露在多种灾害环境中,其本身也具有概率行为,这就增加了估算系统响应的复杂性,进而增加了整体系统复原力的复杂性。因此,本研究开发了一种以抗灾能力为中心的概率系统动力学建模方法,以量化基础设施的动态抗灾能力,该方法基于基础设施系统在多灾害情景下的整体表示,其中纳入了灾害和系统的概率性质。传统的复原力量化方法以系统完全恢复后计算出的单一数值来表示系统复原力,与之不同的是,所开发的模型侧重于跟踪系统复原力在整个系统性能恶化和恢复期间的时间演变。以加拿大不列颠哥伦比亚省的一座实际水电站大坝为例,展示了模型在制定基础设施系统恢复力指导评估计划中的实用性。总之,所开发的方法使决策者能够深入了解关键运行期、达到指定恢复能力目标所需的时间以及......风险缓解措施的效率。
{"title":"Probabilistic dynamic resilience quantification for infrastructure systems in multi-hazard environments","authors":"Ahmed Badr ,&nbsp;Zoe Li ,&nbsp;Wael El-Dakhakhni","doi":"10.1016/j.ijcip.2024.100698","DOIUrl":"10.1016/j.ijcip.2024.100698","url":null,"abstract":"<div><p>Resilience has been evolving as a key criterion for infrastructure systems as it ensures the system's dynamic performance pre-, during, and post-hazard disruptions. However, estimating these performances is challenging due to system and operation complexities, and the probabilistic dynamic nature of infrastructure system. Moreover, infrastructure systems are usually exposed to multi-hazard environments, with their own probabilistic behavior, leading to additional complexity in terms of estimating the system response and, subsequently, the overall system resilience. As such, this study develops a probabilistic resilience-centric system dynamics modeling approach to quantify infrastructure dynamic resilience based on a holistic representation of infrastructure systems under multi-hazard scenarios, whereby the probabilistic natures of both the hazards and system are incorporated. Unlike the traditional resilience quantification approaches that represent system resilience by a single value calculated after the system's full recovery, the developed model focuses on tracking the temporal evolution of system resilience along the entire period of system performance deterioration and recovery. A real-world hydropower dam, as an example for infrastructure systems, in British Columbia, Canada is used as a demonstration application to show model utility in developing resilience-guided assessment plans for infrastructure systems. Overall, the developed approach empowers the decision-makers with insights into critical operational periods, the required time to reach specified resilience targets, and the efficiency of risk mitigation measures in <em>real-time</em>.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100698"},"PeriodicalIF":4.1,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548224000398/pdfft?md5=cf0b554879a85aad377f598558d3e1ea&pid=1-s2.0-S1874548224000398-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141867424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enterprise architecture modeling for cybersecurity analysis in critical infrastructures — A systematic literature review 用于关键基础设施网络安全分析的企业架构建模 - 系统文献综述
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-14 DOI: 10.1016/j.ijcip.2024.100700
Yuning Jiang , Manfred A. Jeusfeld , Michael Mosaad , Nay Oo

As digital landscapes become increasingly complex, safeguarding sensitive information and systems against cyber threats has become a paramount concern for organizations. This paper provides a comprehensive review of how enterprise architecture modeling is used in the context of cybersecurity assessment, particularly focusing on critical infrastructures. The use of enterprise architecture models for cybersecurity is motivated by the main purpose of enterprise architecture, namely to represent and manage business and IT assets and their interdependence. While enterprise architecture modeling originally served to assess Business/IT alignment, they are increasingly used to assess the cybersecurity of the enterprise. The research questions explored include the types of enterprise architecture models used for cybersecurity assessment, how security aspects are incorporated into these models, the theoretical frameworks and reference theories applied, the research methods used for evaluation, and the strengths and limitations of these models in supporting cybersecurity assessment. This review encompasses research papers published before 2024, focusing on high-quality research from peer-reviewed journals and reputable conferences, thereby providing a structured and comprehensive overview of the current state of research in this domain.

随着数字环境变得日益复杂,保护敏感信息和系统免受网络威胁已成为企业最关心的问题。本文全面回顾了企业架构建模在网络安全评估中的应用,尤其侧重于关键基础设施。将企业架构模型用于网络安全的动机是企业架构的主要目的,即表示和管理业务与 IT 资产及其相互依存关系。企业架构建模最初用于评估业务/IT 的一致性,但现在越来越多地用于评估企业的网络安全。探讨的研究问题包括用于网络安全评估的企业架构模型类型、如何将安全方面纳入这些模型、应用的理论框架和参考理论、用于评估的研究方法,以及这些模型在支持网络安全评估方面的优势和局限性。本综述涵盖 2024 年之前发表的研究论文,重点关注同行评审期刊和知名会议上的高质量研究,从而对该领域的研究现状提供一个结构化的全面概述。
{"title":"Enterprise architecture modeling for cybersecurity analysis in critical infrastructures — A systematic literature review","authors":"Yuning Jiang ,&nbsp;Manfred A. Jeusfeld ,&nbsp;Michael Mosaad ,&nbsp;Nay Oo","doi":"10.1016/j.ijcip.2024.100700","DOIUrl":"10.1016/j.ijcip.2024.100700","url":null,"abstract":"<div><p>As digital landscapes become increasingly complex, safeguarding sensitive information and systems against cyber threats has become a paramount concern for organizations. This paper provides a comprehensive review of how enterprise architecture modeling is used in the context of cybersecurity assessment, particularly focusing on critical infrastructures. The use of enterprise architecture models for cybersecurity is motivated by the main purpose of enterprise architecture, namely to represent and manage business and IT assets and their interdependence. While enterprise architecture modeling originally served to assess Business/IT alignment, they are increasingly used to assess the cybersecurity of the enterprise. The research questions explored include the types of enterprise architecture models used for cybersecurity assessment, how security aspects are incorporated into these models, the theoretical frameworks and reference theories applied, the research methods used for evaluation, and the strengths and limitations of these models in supporting cybersecurity assessment. This review encompasses research papers published before 2024, focusing on high-quality research from peer-reviewed journals and reputable conferences, thereby providing a structured and comprehensive overview of the current state of research in this domain.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100700"},"PeriodicalIF":4.1,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141698603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robustness evaluation method and defense strategy of electricity-heat integrated energy system 电热一体化能源系统的鲁棒性评估方法和防御策略
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1016/j.ijcip.2024.100699
Funian Hu, Chenhui Peng, Jun Chen

Even though electricity-heat integrated energy systems (IESs) can improve energy utilization, the faults generated by extreme events can induce more complex and wider impacts. Therefore, it is urgent to study the effective defense strategies associated with electricity-heat IES. Considering the theory of complex networks, a dynamic model was established in this paper which comprehensively considered the actual operating characteristics and cascading failure process of the electricity-heat IES. The structural and functional robustness of the electricity-heat IES after failure was evaluated by link survivability, capacity survivability and power survivability. According to the post-disaster system robustness evaluation results and system characteristics without adopting the defense strategy, the critical links of the system were identified. Also, seven defense strategies were formulated based on the cascading failure mechanism of the electricity-heat IES. The testing network coupled with an improved IEEE118-node power grid and 23-node heat supply network was used to verify the effectiveness of the proposed defense strategy and to provide a theoretical basis for the resilience enhancement strategy and defense resource allocation of the electricity-heat IES.

尽管电热综合能源系统(IES)可以提高能源利用率,但极端事件产生的故障会带来更复杂、更广泛的影响。因此,研究与电热综合能源系统相关的有效防御策略迫在眉睫。结合复杂网络理论,本文建立了一个动态模型,综合考虑了电热IES的实际运行特性和级联故障过程。通过链路存活率、容量存活率和功率存活率评估了故障后电热IES的结构和功能鲁棒性。根据灾后系统鲁棒性评估结果和未采用防御策略时的系统特征,确定了系统的关键环节。同时,根据电热互联系统的级联失效机制,制定了七种防御策略。测试网络结合改进的 IEEE118 节点电网和 23 节点供热网络,验证了所提防御策略的有效性,并为电-热 IES 的弹性增强策略和防御资源分配提供了理论依据。
{"title":"Robustness evaluation method and defense strategy of electricity-heat integrated energy system","authors":"Funian Hu,&nbsp;Chenhui Peng,&nbsp;Jun Chen","doi":"10.1016/j.ijcip.2024.100699","DOIUrl":"https://doi.org/10.1016/j.ijcip.2024.100699","url":null,"abstract":"<div><p>Even though electricity-heat integrated energy systems (IESs) can improve energy utilization, the faults generated by extreme events can induce more complex and wider impacts. Therefore, it is urgent to study the effective defense strategies associated with electricity-heat IES. Considering the theory of complex networks, a dynamic model was established in this paper which comprehensively considered the actual operating characteristics and cascading failure process of the electricity-heat IES. The structural and functional robustness of the electricity-heat IES after failure was evaluated by link survivability, capacity survivability and power survivability. According to the post-disaster system robustness evaluation results and system characteristics without adopting the defense strategy, the critical links of the system were identified. Also, seven defense strategies were formulated based on the cascading failure mechanism of the electricity-heat IES. The testing network coupled with an improved IEEE118-node power grid and 23-node heat supply network was used to verify the effectiveness of the proposed defense strategy and to provide a theoretical basis for the resilience enhancement strategy and defense resource allocation of the electricity-heat IES.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100699"},"PeriodicalIF":4.1,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141606269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1