Safety and Security Checking in the Design of Internet Based Control Systems
نویسندگان
چکیده
Internet-based control is becoming new generations of control systems, in which the Internet is used as a platform for global remote monitoring and control. The obvious benefit is to enable global collaboration and data sharing between operators from geographically dispersed locations. However, connection to an open network and the use of universal technology presents new problems that did not exist with the conventional design and construction of control systems, such as safety and security. This paper presents the safety and security checking procedures used in the design of Internet based control systems. A process control case study is used to illustrate the checking procedures. Copyright © 2005 IFAC
منابع مشابه
A framework of security and safety checking for internet-based control systems
Internet-based control is a way of using the internet as a platform for remote monitoring and control operation. The obvious benefit is to enable remote monitoring and maintenance of process plants and to initiate global collaboration and data sharing between operators from geographically dispersed locations. However, connection to an open network and the use of universal technology present hig...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملThe mediating role of academic engagement in the relationship between Internet addiction and psychological safety with academic buoyancy
The purpose of this study was to investigate the mediating role of academic engagement in the relationship between Internet addiction and psychological safety with academic buoyancy. The research method was a correlation of the type path analysis. The population of this study included all undergraduate students of Lorestan University in the academic year 2021-2022. The statistical sample size w...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005