The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Networked medical devices and health information services are becoming increasingly widespread. The requirements for assuring the system's suitability, safety and security are discussed and an example is presented for a networked medical sensor application and the assurance aspects it illustrates. In a workshop that was based on the example, key issues such as distribution of responsibilities, multiple...
Wireless Sensor and Actuator Networks has become an important area of research. They can provide flexibility, low operational and maintenance costs and they are inherently scalable. In the realm of Internet of Things the majority of devices is able to communicate with one another, and in some cases they can be deployed with an IP address. This feature is undoubtedly very beneficial in wireless sensor...
Man-in-the-Middle (MITM) attack enables an attacker to monitor the communication exchange between two parties by directing the traffic between them to pass through the attacker's machine. Most existing schemes for discovering MITM attack focus on detecting the mechanism used to direct the traffic through the attacker machine. This paper presents a new detection scheme that is based on matching the...
Demand response (DR) management is one of the key applications of future energy systems. Most of the corresponding models and algorithms require data communication between different smart grid network components to work efficiently. In this paper, 31 contributions from literature are evaluated with respect to their data communication requirements. Although the analyzed proposals on DR models do not...
This paper addresses the use of events within discrete-event systems modeling formalisms, presenting the concept of event life time when enclosed in the detection of a specific behavior defined by sequences of events. This concept defines the time interval during which a macro-event is valid (a macro-event is an event computed as the result of a pre-defined sequence of events). Two types of life times...
The Smart Grids requires distributed components to control the demand side. These components have to fulfill various requirements from communication issues to graphical user interfaces for monitoring and controlling. In this paper, we define high level requirements to software architectures for Customer Energy Management Systems and evaluate some existing solutions based on Java and OSGi. The conclusion...
Cyber-physical systems concept supports the realization of the Industrie 4.0 vision towards the computerization of traditional industries, aiming to achieve intelligent and reconfigurable factories. Standardization assumes a critical role in the industrial adoption of cyber-physical systems, namely in the integration of legacy systems as well as the smooth migration from existing running systems to...
This document examines the OData protocol as a new service oriented approach for distributed IT architectures. The main features of OData were compared with properties of well-established solutions like: REST, DCOM and Java RMI. OData's protocol is presented in the context of its application in Service-Oriented Architectures.
This paper discusses mainly the requirements of enhanced IEC 61850 security parameters for smart grid. Since IEC 61850 has been specified in 2003, smart grid was developed rapidly. This modern grid requires reliable, flexible, efficient and secured communication standards. Recent researches confirm that IEC 61850 meets the first three requirements, yet its security is still an issue due to certain...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.