<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Security Ontology for Semantic SCADA</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sahli Nabil</string-name>
          <email>n.sahli@sonelgaz.dz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Benmohamed Mohamed</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>(LIRE) Distributed Computer Science Laboratory Mentouri Constantine University &amp; SONELGAZ Group Po.</institution>
          <addr-line>Box 325, Route Ain El Bey 25017 Constantine Alegria</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2012</year>
      </pub-date>
      <fpage>179</fpage>
      <lpage>192</lpage>
      <abstract>
        <p>Web services have become a significant part of embedded systems as SCADA and internet applications embedded in RTU, because (WS) was XML/SOAP support, independent to platform and very simple to use, these advantages make (WS) vulnerable to many new and old security attacks. Now, it becomes easier to attack (WS) because their semantic data is publicly accessible in UDDI registry and (WS) use http protocol and the 80 TCP port as an open tunneling as a very big vulnerability. We work for the development of better distributed defensive mechanisms for (WS) using semantic distributed (I/F/AV) bloc, security ontology's and WS-Security framework accelerated by ECC mixed coordinates cryptography integrated in our global security solution.</p>
      </abstract>
      <kwd-group>
        <kwd>SCADA</kwd>
        <kwd>Web Services (WS)</kwd>
        <kwd>IDS/Firewall/Antivirus (I/F/AV) bloc</kwd>
        <kwd>ECC Cryptography</kwd>
        <kwd>Security Ontology</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>The XML Web services open 70% of root for the hackers that firewall and IDS
can’t detect [2]. Hackers can transport all data with the 80 port, and firewall can’t
detect this attack [2]. With HTTP protocol Web services can destroy the security
strategy the 80 port is always open because it is used by the HTTP protocol used by
the web navigators, to create a tunneling, became a very big vulnerability. One of the
key challenges to successful of the integration Web services technologies in the
embedded system and the SCADA RTU (Remote Terminal Unit) is how to address
crosscutting architectural</p>
      <p>concerns such as policy management and security,
governance, authentication, a hacker’s attacks, semantic attack and traditional attack.</p>
      <p>To address this challenge, this article introduce the notion of semantic attacks in
SCADA RTU using the semantic information in the UDDI registry and security
concerns lead to the enhancement of SOAP messages via WS-Security framework. In
our research, we work to secure the semantic and intelligent Web services embedded
in the SCADA RTU, as presented in the figure 1.
     We present in this article our approach of accelerating and optimizing security
ontology with mixed coordinates ECC cryptography. We begin our article with
 
presenting SCADA platform used in our research, after that we present security of
semantic web services embedded in SCADA RTU, then we present a modified
semantic Mitnick attack, after that we present our ontology based semantic distributed
(I/F/AV) bloc for SCADA, also we present our solution for optimizing WS-Security
framework with mixed coordinates ECC for complex embedded system as SCADA,
finally we conclude with a conclusion and our future work and perspectives in our
research.</p>
      <p>Fig1. Intelligent and semantic Web services embedded in SCADA RTU
2</p>
    </sec>
    <sec id="sec-2">
      <title>SCADA Platform Used In Our Research</title>
      <p>We use the first IP-based RTU solutions that enable complete integration of
SCADA, control, and communications functionality in one rugged package. Our
simple yet powerful products leverage easy-to-use Web technologies and inexpensive
public networks. They are easy to configure and offer dramatically reduced costs
versus traditional SCADA/PLC systems as presented in the figure 2.</p>
      <p>
        Fig 2. Web services and XML technologies embedded in the SCADA RTU [
        <xref ref-type="bibr" rid="ref16">25</xref>
        ]
       The SCADA RTU integrate, internet compatibility, E-mail messaging, SMS text
messaging, Web pages served via the internet or intranets, using FTP file transfer as
(CSV,JPEG, etc.), Embedded internet and Web server text messaging, SCADA
compatibility with protocols (MODBUS, DNP3,…etc), SCADA protocol messaging
to host computer system, multi communications include (Ethernet, RS-232, RS-485,
Fiber optics, GSM/GPRS, PSTN modem, private line modem, and radio) each port
operates independently of each other, programmable control, alarm management,
data logging and intelligent end device compatibility as (sensors, actuators, digital and
intelligent camera, electronic metering devices and process inputs/outputs (fixed and
mobile assets as filters, generators, motors, pumps, valves)), as presented in the figure
3.
      </p>
      <p>Fig3. SCADA platform and protocols used in our research</p>
      <p>For critical applications as SCADA in energy networks security and monitoring,
communications redundancy is supported. The RTU SCADA used in Algerian
Ministry of Energy and Mining offer an ultra-compact OEM solution, it can be
rapidly adapted to many embedded applications and can be connected to the internet
for worldwide monitoring, can be served to internet portals regularly or upon events.
3</p>
      <p>Security of Semantic Web Services Embedded In SCADA RTU
Semantic (WS) have raised many new unexplored security issues as new ways of
exploiting inherit old security threats, semantic (WS), which can publish the
information about their functional and non-functional properties, add additional
security threats. The hackers do not need to scan the Web and SCADA network to
find targets. They just go to UDDI Business Registry in the SCADA control room and
get all the information’s they need to attack semantic Web services. Now, the whole
semantic (WS) attack consists of several stages during which a hacker discovers
weakness, then penetrates the semantic (WS) layer and gets access to SCADA critical
applications and infrastructures.</p>
      <p>
        For example, the XML Injection attack [
        <xref ref-type="bibr" rid="ref2">7</xref>
        ] occurs when user input is passed to the
XML stream, it can be stopped by scanning the XML stream. Another type of attacks
on (WS) is Denial of Service (DoS) attack when attackers can send extremely
complicated but legal XML documents, it forces the system to create huge objects in a
memory and deplete system’s free memory. Distributed and multi-phased attacks such
as the Mitnick attack [
        <xref ref-type="bibr" rid="ref3">8</xref>
        ] are more dangerous for semantic (WS) embedded in the
SCADA RTU because IDS [
        <xref ref-type="bibr" rid="ref13 ref4">9, 18</xref>
        ] can detect them only by acting as a coalition with
firewall as a semantic bloc. We need antivirus in the coalition bloc for other kind of
vulnerability as distributed and mobile virus. Semantic (WS) embedded in the
SCADA RTU are vulnerable at a lot of attacks as: (Application Attacks, Discovery
attacks, Semantic Attacks, SOAP Attacks, XML Attacks ….etc.), as presented in the
figure 4, in the following subsections.
      </p>
      <p>
        The attacker begin by finding Web services using UDDI registry, after that he
discover points of weakness in WSDL documents which can be used as a
vulnerability guide book for getting access to SCADA RTU critical applications and
infrastructures, and create a lot of damages as different kind of semantic Web
services attacks: Discovery Attacks [
        <xref ref-type="bibr" rid="ref7">12</xref>
        ], WS DoS Attacks [
        <xref ref-type="bibr" rid="ref2">7</xref>
        ], CDATA Field
Attacks [
        <xref ref-type="bibr" rid="ref2">7</xref>
        ], SOAP Attacks [
        <xref ref-type="bibr" rid="ref7">12</xref>
        ], Application Attacks [
        <xref ref-type="bibr" rid="ref2">7</xref>
        ] [
        <xref ref-type="bibr" rid="ref4">9</xref>
        ] [
        <xref ref-type="bibr" rid="ref5">10</xref>
        ] [
        <xref ref-type="bibr" rid="ref6">11</xref>
        ], XML Attacks
[
        <xref ref-type="bibr" rid="ref2">7</xref>
        ], Semantic WS Attacks [
        <xref ref-type="bibr" rid="ref2">7</xref>
        ]
      </p>
    </sec>
    <sec id="sec-3">
      <title>Modified Semantic Mitnick Attack</title>
      <p>The Mitnick attack step is presented in the figure 5 below.</p>
      <p>Fig .5. The Mitnick attack Steps [22]</p>
      <p>The Mitnick attack can be modified for using in conjunction with the XML
Injection attack, semantic (WS) Mitnick attack is organized as follows:
1. An Attacker navigates to UDDI registry and asks for a service (Gas
temperature) for example.
2. The Attacker attaches to UDDI and asks for WSDL files.
3. For blocking communications between Host1 and Host2, Attacker starts a</p>
      <p>Syn/Flood attack against Host1.
4. Attacker sends multiple TCP packets to Host2 in order to predict a TCP
sequence number generated by Host2.
5. Attacker pretends to be Host1 by spoofing Host1’s IP address and tries to
establish a TCP session between Host1 and Host2 by sending a Syn packet to
Host2 (the Step 1 of a three way handshake).
6. Host2 responds to Host1 with a Syn/Ack packet (Step2 of a three way
handshake), however, Host1 cannot send a RST packet to terminate a
connection because of a Syn/Flood (Dos) attack from Step3.
7. Attacker cannot see a Syn/Ack packet from Step 6, however, Attacker can
apply a TCP sequence number from Step4 and Host1’s IP address and send a
Syn/Ack packet with a predicted number in response to a Syn/Ack packet sent
to Host1 (Step 3 of a three way handshake).
8. Now, a Host2 thinks that a TCP session is established with a trusted Host1.</p>
      <p>Attacker can attack Host2 semantic Web services that believe that has a
session with Host2.
9. Attackers inspects Host2 WSDL files in order to find dangerous methods.
10. Attacker tests these methods in order to find possibilities for the XML</p>
      <p>Injection attack.
11. An attacker applies XML Injection for changing Attacker’s ID and getting
more privileges.
12. If the XML Injection attack is not successful Attacker can try the SQL
Injection attack or any other injection attacks as XPATH attack or others,
against semantic Web services because Host2 still believes that it is connected
to Host1.</p>
      <p>Our OWL class for the modified Mitnick attack is shown as follows:
&lt;owl :Class rdf :ID= ‘&amp;WSAttacks ;WSMitnick’&gt;
&lt;owl: intersectionOf rdf: parseType=”Collection”&gt;
&lt;owl:Class rdf:about=”#Probing”/&gt;
&lt;owl:Class rdf:about=”#WSProbing”/&gt;
&lt;owl:Class rdf:about=’#SynFlood”/&gt;
&lt;owl:Class rdf:about=”#XMLInjection”/&gt;
&lt;/owl:intersectionOf&gt;
&lt;/owl:Class&gt;</p>
      <p>To detect the modified Mitnick attack, the distributed bloc (I/F/AV) installed in the
network between Host1 and Host2 should operate as a coalition using the security
attack ontology based on distributed (I/F/AV) bloc cooperation, in SCADA systems
Host1 must be client and Host2 the RTU.</p>
    </sec>
    <sec id="sec-4">
      <title>5 Our Ontology Based Semantic Distributed (I/F/AV) Bloc for</title>
    </sec>
    <sec id="sec-5">
      <title>SCADA</title>
      <p>
        Using Ontology for creating distributed defenses using IDS [
        <xref ref-type="bibr" rid="ref12">17</xref>
        ] is introduced in
[
        <xref ref-type="bibr" rid="ref3">8</xref>
        ], but, it takes into account only application attacks. A lot of security ontology’s of
Web services are described in [
        <xref ref-type="bibr" rid="ref14">19</xref>
        ], describes types of security information including
security mechanisms, objectives, algorithms, credentials and protocols using security
ontology’s as SWSL[3], WSMO [4], KAoS[5], METOR-S[6], OWL-S [
        <xref ref-type="bibr" rid="ref15">20</xref>
        ]. It’s
applied to SOA to show how Web services can publish their security requirements
and capabilities. Security properties and security policies of Web services must be
expressed in SCL [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">14, 15, 16</xref>
        ], as automatic reasoning. Our security threats of
embedded semantic Web services in SCADA RTU and our proposed defense
techniques based distributed semantic (I/F/AV) bloc presented in the figure 6 bellow
using VPN Tunneling security technique (VPN1 for ERP and information system and
VPN2 for SCADA system), Packet Filtering and Port Filtering.
      </p>
      <p>As shown in the table 1, Web services are generally modeled as resting on top of
TCP/IP application protocols such as HTTP. For securing embedded Web services in
SCADA RTU we use protocols as (HTTPS, IPSEC, SSL) and other techniques as
content filtering and a mixed coordinates ECC encryption with (affines, Montgomery
and jacobian) coordinates.</p>
      <p>
        Our Security solution for embedded semantic (WS) uses standards as
(OWL/OWLS) [
        <xref ref-type="bibr" rid="ref15">21, 20</xref>
        ], for more detail read [
        <xref ref-type="bibr" rid="ref6 ref9">11, 14</xref>
        ]. We use WS-Security framework (XML
Signature, XML Encryption, WS-Security, WS-SecureConversetion equivalent as
SSL in SOAP level, WS-Trust, WS-Federation, WS-Policy and WS-SecurityPolicy,
WS-Privacy for management of confidentiality politic with the use of jetton and
WSAuthorization) as specified in the figure 7.
      </p>
      <p>Our security solution uses WS-Security framework as presented in the figure 8,
our solution include all XML security techniques as transforming, caching, ECC
encryption and decryption, auditing, logging, screening and filtering, verification,
validation, authentication, authorization, and accounting.</p>
      <p>Our solution use ten (10) steps as : message signature operation, message crypt
operation, associating a jetton in the SOAP message (steps : 1,5) and the SOAP
message preparation (step 4) in distance customer, and SOAP message transmission
(step 7), validation operations , decrypting SOAP messages and to certificate them
(steps: 8,9,10) in SCADA RTU, also the Service Registry, Policy Store and Identity
Provider (steps :2,3,6) , as presented in the figure 9.</p>
      <p>Fig.9. The Ten (10) steps of our security solution for SCADA</p>
      <p>Our solution includes a lot of security levels as (applicative security, data
security, environment security and message SOAP security). We present in the figure
10 and 11 our SOAP message security proposed solution. 
6
ECC</p>
    </sec>
    <sec id="sec-6">
      <title>Optimizing WS-Security Framework with Mixed Coordinates</title>
      <p>
                 Elliptic curve cryptography (ECC), independently introduced by Koblitz and
Miller in the 80’s [
        <xref ref-type="bibr" rid="ref17">27</xref>
        ], has attracted increasing attention in recent years due to its
shorter key length requirement in comparison with other public-key cryptosystems
such as RSA. Shorter key length means reduced power consumption and computing
effort, and less storage requirement, factors that are fundamental for SCADA systems
as presented in the figure 12. Comparing (WS) secured by WS-Security framework
to unsecured Web services, the WS-Security is by factor 100 slower than Web
services. WS-Security should be used only where security has the highest priority
over performance, but it is not the case of the embedded complex system as SCADA
system and embedded Web services in the SCADA RTU. Our approach is to
optimize WS-Security framework by using our solution based mixed coordinates
ECC [24] for the operations (to crypt, to decrypt, to sign and to verify signature)
SOAP messages as presented in our solution figures 8 and 9.
 Our analyze in the database « Explicit-Formulas Database » [23] determine the
result shown below in Figure 13 and 14.
      </p>
      <p>Coordinats</p>
      <p>Modifiees
Brier &amp; Joye
Montgomery</p>
      <p>Affines
Projectives
Jacobiennes
Chudnovsky</p>
      <p>Addition
13M+6S
9M+2S
4M+2S
I+2M+S
12M+2S
12M+4S
11M+3S</p>
      <p>Doubling
4M+4S
6M+3S
3M+2S
I+2M+2S
7M+5S
4M+6S
5M+6S</p>
      <p>Mixed Addition
9M+2S
7M+4S</p>
      <p>Fig. 13. Cost of ECC coordinates in the field Fp</p>
      <p>Coordinats</p>
      <p>Affines
Projectif (c=1, d=1)</p>
      <p>Jacobien
Lopez-Dahab</p>
      <p>Addition</p>
      <p>I+M
13M
14M
14M</p>
      <p>Doubling</p>
      <p>I+M
7M
5M
4M</p>
      <p>Mixed Addition</p>
      <p>12M
10M
8M
Our ECC optimized algorithm « Mixed-Coordinates-ECC-Algo » is presented
below:</p>
      <p>We compute the doubling operations with « Montgomery » coordinates
for preparing the addition operation in the field Fp and with « Affines»
coordinates for the field F2m .</p>
      <p>We compute the addition of the last point computed and another point in
the curve, with « Affines » coordinates, for the two fields Fp and F2m.
All addition operation will be computed with « Affines » coordinates for
the two fields Fp and F2m.</p>
      <p>All mixed addition operation will be computed by « Lopez-Dahab »
coordinate for the field F2m and « Jacobiennes » coordinates for the field
Fp.
7</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>
        The SCADA RTU including embedded Web services and embedded XML creates a
new big challenge in security for SCADA, because network security is maturing and
semantic embedded Web services security not mature. Specific procedures for
securing embedded XML SCADA network applications are not yet widely known.
We present our security solution introduced in this paper for embedded SOA security
design, with a distributed implementation of a distributed semantic bloc (I/F/AV)
between client and RTU. Our approaches is composed with ten (10) steps using ECC
mixed coordinates cryptography solution and WS-Security framework, adapted and
optimized for SCADA systems. We use a bloc of products such XML semantic
firewalls, proxies, IDS, gateways, VPN technologies, security protocols (HTTPS,
IPSEC, and SSL), a security framework as WS-Security and ECC mixed coordinates
cryptography integrated in our solution. We propose a security solution of semantic
Web services embedded in RTU using security ontology’s as OWL/OWL-S. We
work to do more optimization and to implement our solution with a real material used
in Algerian ministry of energy and mining as TBOX RTU manufactured by
CSESemaphore Group Company [
        <xref ref-type="bibr" rid="ref16">25</xref>
        ] and TOSSIM (PowerTossim &amp; TinyViz) simulator
[
        <xref ref-type="bibr" rid="ref18">28</xref>
        ].
2. Soaj2ee.blogspirit.com/files/whitepaper/soaj2ee-security-transport.pdf
3. SWSL, http://www.daml.org/services/swsl/
4. WSMO, http://www.wsmo.org/
5. KAoS. http://www.ihmc.us/research/projects/KAoS/
6. METEOR-S, http://lsdis.cs.uga.edu/projects/meteor-s/
http://www.w3.org/Submission/OWL-S/
21. OWL, http://w3.org/TR/owl-features/
22. http://wiki.cas.mcmaster.ca/index.php/The_Mitnick_attack
23. http://www.hyperelliptic.org/EFD/
      </p>
      <p>Explicit-Formulas Database
www.CSE-Semaphore.com
hang Shantz, comparing elliptic</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Aymen</surname>
            <given-names>BOUGHATTAS</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Med Aymen</surname>
            <given-names>BAOUAB</given-names>
          </string-name>
          ,
          <article-title>Web service security (WS-Security), a master degree memory</article-title>
          <year>2008</year>
          /2009 Nancy Franch University,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          7.
          <string-name>
            <given-names>A.</given-names>
            <surname>Stamos</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Stender</surname>
          </string-name>
          , “Attaking Web Services:
          <article-title>The Next Generation of Vulnerable Entreprise Apps, BlackHat2005</article-title>
          , USA,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          8.
          <string-name>
            <given-names>J.</given-names>
            <surname>Undercoffer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Finin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and J.</given-names>
            <surname>Pinkston</surname>
          </string-name>
          ,
          <article-title>A target-centric ontology for intrusion detection</article-title>
          ,
          <source>Int, Joint Conference on Artificial Intelligence, Mexico</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          9.
          <string-name>
            <given-names>J.</given-names>
            <surname>Mirkovic</surname>
          </string-name>
          , “D-WARD:
          <article-title>Source-End Defence Against Distributed Denial-of-Services Attacks”</article-title>
          ,
          <source>The Phd thesis</source>
          , University of California,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          10. P.Lindstrom, “Attacking and Defending Web Services”,
          <string-name>
            <given-names>A Spire</given-names>
            <surname>Research</surname>
          </string-name>
          <string-name>
            <surname>Repport</surname>
          </string-name>
          ,
          <year>January 2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          11. W.Negm, “
          <article-title>Anatomy of a Web Services Attack: A Guide to Threats</article-title>
          and Preventive Countermesures”,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          12. S.Faut, “SOAP Web Services Attacks:
          <article-title>Are you web applications vulnerable”</article-title>
          ,
          <source>SPI Dynamics</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          13. T.Erl, “WS-*
          <string-name>
            <surname>Specifications</surname>
          </string-name>
          ,
          <article-title>An Overview of the WS-Security Framework”</article-title>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          14.
          <string-name>
            <given-names>K.</given-names>
            <surname>Khan</surname>
          </string-name>
          and J.Han, “
          <article-title>A Security Characterisation Framework for Trustworthy Component Based Software Systems”</article-title>
          ,COMPSAC2003, USA,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          15.
          <string-name>
            <given-names>A.</given-names>
            <surname>Vorobiev</surname>
          </string-name>
          and J.Han, “
          <article-title>Specifiying Dynamic Security Properties of Web Service Based Systems”</article-title>
          , SKG2006,Guilin, China,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          16. K.Khan, “
          <article-title>Security Characterisation and Compositional Analysis for Component-based Software Systems”</article-title>
          ,
          <source>PHD thesis</source>
          , Monash University,
          <year>April 2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          17. S. Axelsson, “Research in Intrusion-Detection
          <string-name>
            <surname>Systems</surname>
          </string-name>
          : A Survey,
          <source>Technical report 98-17</source>
          , Chalmers University of Technology,
          <year>1998</year>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          18. G. Denker,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Ton</surname>
          </string-name>
          ,
          <article-title>OWL-S Semantics of Security Web Services: a Case Study, SRI Internayional</article-title>
          , Menlo Park, California, USA,
          <year>2004</year>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          19. A.
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Luo</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Kang</surname>
          </string-name>
          ,
          <article-title>Security Ontology for Annotating Ressources</article-title>
          ,
          <string-name>
            <surname>ODBASE</surname>
          </string-name>
          <year>2005</year>
          , Cyprus,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          20.
          <string-name>
            <surname>OWL-S: Semantic Markup for Web</surname>
            <given-names>Services</given-names>
          </string-name>
          ,
          <year>November 2004</year>
          , 24. H.
          <string-name>
            <surname>Cohen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Miyaji</surname>
            , and
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Ono</surname>
          </string-name>
          .
          <article-title>Efficient elliptic curve exponentiation using mixed coordinates</article-title>
          .
          <source>In ASIACRYPT, LNCS</source>
          . Springer,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          25. CSE-Global group company,
          <source>europe Belgium 26. A.Patel</source>
          , Arvinderpal Wander, Hans Ebele,
          <article-title>Sheulling C curve cryptography</article-title>
          and RSA on 8-
          <string-name>
            <surname>Bit</surname>
            <given-names>CPUs</given-names>
          </string-name>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          27.
          <string-name>
            <given-names>N.</given-names>
            <surname>Koblitz</surname>
          </string-name>
          .
          <article-title>A Family of Jacobians Suitable for Discrete Log Cryptosystems</article-title>
          . In Shafi Goldwasser, editor,
          <source>Advances in Cryptology - Crypto '88</source>
          , volume
          <volume>403</volume>
          of Lecture Notes in Computer Science, pages
          <fpage>94</fpage>
          -
          <lpage>99</lpage>
          , Berlin,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          28.
          <string-name>
            <surname>Victor</surname>
            <given-names>Shnayder</given-names>
          </string-name>
          , Mark Hempstead, Borrong Chen,
          <article-title>Geoff Werner Allen, and Matt Welsh, Simulating the Power Consumption of LargeScale Sensor Network Applications</article-title>
          , Harvard University, Baltimore, Maryland, USA, SenSys'04,
          <string-name>
            <surname>November</surname>
          </string-name>
          3-
          <issue>5</issue>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>