Secure Virtual Automation Networks based on a Generic Procedure Model

نویسندگان

  • M. Wolframm
  • H. Adamczyk
چکیده

Security is a huge topic, however an international standard for automation control systems is missing. The standardisation work is progressing, e.g. within the IEC. It is clear that behind security there are several well-known security objectives such as availability, integrity and confidentiality. It is also clear that the office domain provides thousands of different security solutions. A possible use for automation networks, 1 to 1 or with adaptations, is one task within the VAN project. Furthermore VAN sets its focus on IT-Security and thereby on communication security. The use of the brand-new procedure model which is part of the VDI/VDE guideline 2182 was applied. The first time use of this model was a challenge and also a benefit for the project.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new virtual leader-following consensus protocol to internal and string stability analysis of longitudinal platoon of vehicles with generic network topology under communication and parasitic delays

In this paper, a new virtual leader following consensus protocol is introduced to perform the internal and string stability analysis of longitudinal platoon of vehicles under generic network topology. In all previous studies on multi-agent systems with generic network topology, the control parameters are strictly dependent on eigenvalues of network matrices (adjacency or Laplacian). Since some ...

متن کامل

Wireless Network Integration into Virtual Automation Networks

Wireless automation is today an emerging topic. Industrial wireless solutions are based on Bluetooth, Wireless LAN, IEEE 802.15.4 or even proprietary radio technologies. This paper describes the functions of different wireless technologies within a Virtual Automation Network (VAN). It is shown how the VAN device architecture is applied to wireless solutions. This includes the definition of gene...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Investigating Structural Relations Model of Cyber-Aggression Based on Perceived Stress with the Mediating Role of Virtual Networks Dependency in Students of Mohaghegh Ardabili University in 2019: A Descriptive Study

Background and Objectives: The use of virtual networks has become a natural modern behavior, but the traumatic forms of their use have also received much attention in the last two decades. This study aimed at modelling structural relations of cyber-aggression based on perceived stress with the mediating role of virtual networks dependency in students of Mohaghegh Ardabili University in 2019. M...

متن کامل

The Effectiveness of 5E Educational Design model on Creativity and Social Participation of Mentally Retarded Children in Virtual Social Networks

Objective: The aim of this study was to determine the effect of Learning through Virtual Social Networks Based on the 5E Instructional Design Model on the Creativity and Social Participation of Mentally Retarded Children in the Experimental Sciences. Method: The research method was experimental and the experimental design was quasi-experimental with pretest-posttest and control group.  The stat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008