OMG. (2015). About the Data Distribution Service
Specification Version 1.4. Object Management Group.
https://www.omg.org/spec/DDS/1.4
Kulkarni, A. M., Nayak, V. S., & Rao, P. B. (2012, April).
Comparative study of middleware for C4I systems Web
Services vis-a-vis Data Distribution Service. In 2012
International Conference on Recent Advances in
Computing and Software Systems (pp. 305-310). IEEE.
Maggi, F., Vosseler, R., Cheng, M., Kuo, P., Toyama, C.,
Yen, T. L., & Robotics, A. (2022) A Security Analysis
of the Data Distribution Service (DDS) Protocol.
Chen, F., Huo, Y., Zhu, J., & Fan, D. (2020, November). A
review on the study on MQTT security challenge. In
2020 IEEE International Conference on Smart Cloud
(SmartCloud)(pp. 128-133). IEEE.
Patel, C., & Doshi, N. (2020). A novel MQTT security
framework in generic IoT model. Procedia Computer
Science, 171, 1399-1408.
Mühlbauer, N., Kirdan, E., Pahl, M. O., & Carle, G. (2020,
September). Open-source OPC UA security and
scalability. In 2020 25th IEEE International
Conference on Emerging Technologies and Factory
Automation (ETFA) (Vol. 1, pp. 262-269). IEEE.
Iglesias-Urkia, M., Orive, A., Urbieta, A., & Casado-
Mansilla, D. (2019). Analysis of CoAP
implementations for industrial Internet of Things: a
survey. Journal of Ambient Intelligence and Humanized
Computing, 10(7), 2505-2518.
Rathod, D., & Patil, S. (2017). Security analysis of
constrained application protocol (CoAP): IoT protocol.
International Journal of Advanced Studies in
Computers, Science and Engineering, 6(8), 37.
Laghari, S. A., Manickam, S., & Karuppayah, S. (2021). A
review on SECS/GEM: A machine-to-machine (M2M)
communication protocol for industry 4.0. International
Journal of Electrical and Electronic Engineering &
Telecommunications, 10(2), 105-114.
Michaud, M. J., Dean, T., & Leblanc, S. P. (2018, October).
Attacking omg data distribution service (DDS) based
real-time mission-critical distributed systems. In 2018
13th International Conference on Malicious and
Unwanted Software (MALWARE) (pp. 68-77). IEEE.
Friesen, M., Karthikeyan, G., Heiss, S., Wisniewski, L., &
Trsek, H. (2020). A comparative evaluation of security
mechanisms in DDS, TLS and DTLS. In
Kommunikation und Bildverarbeitung in der
Automation (pp. 201-216). Springer Vieweg, Berlin,
Heidelberg.
White, R., Caiazza, G., Jiang, C., Ou, X., Yang, Z., Cortesi,
A., & Christensen, H. (2019, June). Network
reconnaissance and vulnerability excavation of secure
DDS systems. In 2019 IEEE European symposium on
security and privacy workshops (EUROS&PW) (pp. 57-
66). IEEE.
Michaud, M. (2017). Malicious use of omg data
distribution service (dds) in real-time mission critical
distributed systems (Doctoral dissertation).
Kim, H., Kim, D. K., & Alaerjan, A. (2021). ABAC-based
security model for DDS. IEEE Transactions on
Dependable and Secure Computing.
Park, A. T., Dill, R., Hodson, D. D., & Henry, W. C. (2021,
December). DDS-Cerberus: Ticketing performance
experiments and analysis. In 2021 International
Conference on Computational Science and
Computational Intelligence (CSCI) (pp. 1465-1469).
IEEE.
Abaimov, S. (2021). Towards a Privacy-preserving Deep
Learning-based Network Intrusion Detection in Data
Distribution Services. arXiv preprint
arXiv:2106.06765.
RTI Shapes Demo. (2019). RTI Community. https://commu
nity.rti.com/static/documentation/connext-dds/6.0.0/
doc/manuals/shapes_demo/RTI_Shapes_UsersManual.
pdf
RTI Core Libraries. (2016). RTI Community. https://
community.rti.com/static/documentation/connext-dds/
5.2.3/doc/manuals/connext_dds/RTI_ConnextDDS_C
oreLibraries_UsersManual.pdf
ENISA Threat Landscape 2021. (2021). ENISA.
https://www.enisa.europa.eu/publications/enisa-threat-
landscape-2021