Abstract | ||
---|---|---|
There are many kinds of control networks which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automation). These do not incorporate reasonable security mechanisms as they have been mainly used for closed networks. Recently the security of control networks is becoming important because of the popularization of the Internet, the deployment of wireless technologies and the security requirements of such infrastructures. Control networks require security mechanisms which 1) enable end-to-end security that do notdepend upon specific network topology, 2) work with multiple control network technologies, and 3) are suited tosmall embedded devices commonly used in control networks. This paper shows security mechanisms which can meet the above requirements, assuming that IP is applied to the control networks. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1109/SAINT.2005.57 | SAINT |
Keywords | Field | DocType |
factory automation,building automation,process automation,reasonable security mechanism,end-to-end security,multiple control network technology,control network,security architecture,closed network,security mechanism,control networks,security requirement,embedded systems,message authentication,authorisation,internet,data integrity,cryptography,network topology | Internet security,Control system security,Computer science,Software security assurance,Computer network,Security service,Cloud computing security,Network Access Control,Enterprise information security architecture,Computer security model,Distributed computing | Conference |
ISBN | Citations | PageRank |
0-7695-2262-9 | 8 | 0.92 |
References | Authors | |
6 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Nobuo Okabe | 1 | 25 | 5.37 |
Shoichi Sakane | 2 | 19 | 3.99 |
Kazunori Miyazawa | 3 | 13 | 2.49 |
Kenichi Kamada | 4 | 17 | 3.01 |
Atsushi Inoue | 5 | 12 | 2.30 |
Masahiro Ishiyama | 6 | 34 | 6.21 |