I. Forward-project, Deliverable D3.1: White book: Emerging ICT threats, 2010.

S. M. Rinaldi, J. P. Peerenboom, and T. K. Kelly, Identifying, understanding, and analyzing critical infrastructure interdependencies, IEEE Control Systems Magazine, vol.21, issue.6, pp.11-25, 2001.
DOI : 10.1109/37.969131

G. T. Center, Emerging cyber threats report for, 2008.

N. Sp800-82, Draft guide to industrial control systems (ICS) security, 2008.

H. Chan and A. Perrig, Security and privacy in sensor networks, Computer, vol.36, issue.10, pp.103-105, 2003.
DOI : 10.1109/MC.2003.1236475

A. Perrig, J. Stankovic, and D. Wagner, Security in wireless sensor networks, Communications of the ACM, vol.47, issue.6, pp.53-57, 2004.
DOI : 10.1145/990680.990707

H. Kagan, Interview about wireless devices adoption in the industry and the future trends, 2008.

J. Berra, Emerson first to offer WirelessHART automation products, 2008.

M. T. Hoske and I. Mcpherson, Industrial wireless implementation guide, Control Engineering, 2008.

K. Masica, Recommended practices guide for securing ZigBee wireless networks in process control system environments, Draft, 2007.

T. Noonan and E. Archuleta, The National Infrastructure Advisory Council's final report and recommendations on the insider threat to critical infrastructures, 2008.

M. Keeney, Insider threat study: Computer system sabotage in critical infrastructure sectors, Executive summary, 2005.

P. Welander, Securing legacy control systems, 2009.

. Wikipedia, Next generation networking (NGN all-IP) http://en.wikipedia.org/ wiki, 2008.

P. M. Fonash, Cybersecurity & Communications (CS&C) overview, Technology trends, & challenges, 2008.

R. Kim, J. Jang, and H. Youm, An efficient IP traceback mechanism for the NGN based on IPv6 Protocol, 2008.

T. Zhimeng, W. Bo, Y. , and W. , Security technologies for NGN, 2007.

G. Yuxi, IP Bearer Network for NGN, 2005.