Abstract | ||
---|---|---|
There are many kinds of control networks, which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automation). They are now introducing IP and face the issues of security and configuration complexity. The authors have proposed a model which intends to solve these issues while satisfying restrictions, i.e. small embedded devices, isolated networks and private naming system/name space, which are required when introducing new functionality into existing control networks. Secure boot-strap sequence and device-to-device communication using the chain of trust are the points of the model. This paper shows the practicability of the model through implementing the model experimentally. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1093/ietisy/e89-d.12.2822 | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS |
Keywords | Field | DocType |
control networks, security, auto-configuration | Process automation system,Computer science,Computer security,Computer network,Automation,Home automation,Building automation,Autonomous system (mathematics),Auto-configuration,Chain of trust,Private network | Journal |
Volume | Issue | ISSN |
E89D | 12 | 1745-1361 |
Citations | PageRank | References |
2 | 0.41 | 10 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Nobuo Okabe | 1 | 25 | 5.37 |
Shoichi Sakane | 2 | 19 | 3.99 |
Kazunori Miyazawa | 3 | 13 | 2.49 |
Kenichi Kamada | 4 | 17 | 3.01 |
Masahiro Ishiyama | 5 | 34 | 6.21 |
Atsushi Inoue | 6 | 12 | 2.30 |
Hiroshi Esaki | 7 | 409 | 74.27 |