The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
KNX is a worldwide open standard for home and building automation, which originated from a classical fieldbus protocol. While the needs for interacting with the upcoming Internet of Things (IoT) were already partially addressed by the recent KNX Web Services application note, KNX IP networking still supports IPv4 only. This paper proposes the usage of IPv6 networking as native KNX medium. The most...
The frequency and cost of cyber-attacks continues to grow in commercial information systems. In power systems critical infrastructure, any level of breach may be unacceptable. Securing this infrastructure requires new approaches to communications networks which are not readily vulnerable to remote attack. Standard protocols like Ethernet and IP are difficult to secure. Within well-defined domains,...
Recent developments favor the adoption of IP-based protocols in automotive and aerospace domains. The increased connectivity between components helps to cut costs and enables better re-use of standardized components. However, increased connectivity also increases the attack surface of the overall system and necessitates dedicated security solutions. This paper presents an anomaly detection system...
Increasing demand on data center and computer labs in Indonesia affected by the increasing number of users who use the computer for business or education. One of the main requirements that can not be separated from the use of a computer is a storage area in the form of a USB Flash Disk, External HD, HD to Internal HD for the need for a large-scale computer servers located in the data center, laboratory...
To accommodate more hosts in the network, IP Version 6 (IPv6) is used. It also allows flexibility in allocating addresses and efficient routing for internet traffic using Stateless Autoconfiguration method (SLAAC) and Neighbor Discovery Protocol (NDP). Although efficient, NDP and SLAAC represent a significant security risk in IPv6. IPSec, which is mandated by the IPv6 specifications for security,...
Security is a critical success criterion for implementation and operation of Smart Grids at any scale. In this paper I describe the status and specifics of Smart Grids where data communication and automation networks are integrated with the power grid. Increased connectivity in order to achieve higher flexibility, visibility and better control presents many benefits. On the other hand, increased connectivity...
The smart grid is a new advanced electrical network promoted by the government to address environmental sustainability, energy generation, distribution and consumption efficiency issues. As one of the enabling technologies, Advanced Metering Infrastructure refers to systems which measure, collect and analyze energy usage, and interact with advanced devices such as smart meters through various communication...
Recently, the network management of sensor nodes has gained interest as more sensors are being networked with Internet technologies as opposed to traditional instrumentation and measurement networks. Sensor networking standardization efforts lead a more interoperable way of identification and communication among sensors, and networking technologies provide multiple-access mechanisms to a high number...
Correctional Service Canada (CSC) operates 57 Institutions equipped with a range of mission critical Security, Communications and Access Management systems. These include CCTV assessment, intrusion detection, radio communications and door control systems. User Interfaces range from colour graphic touch screens to knobs, push buttons etc. Operational and technical challenges include the following issues:...
As more and more digital appliances populate our homes, networking them to form a home automation (HA) system not only becomes an option, but almost a necessity. While comfort, security, and energy efficiency can be provided by many existing systems, they all remain complex islands that are difficult to expand and customize. We propose Internet technology to remedy the situation and to become the...
The IP multimedia subsystem (IMS) portends major changes for all parties involved in the exchange of digital content and services. As the IMS architecture moves from specifications to implementations, real-world considerations can influence deployments in ways that have noteworthy security implications. In this work, we present and exemplify a systematic security evaluation of IMS deployments using...
This paper deals with principles, architecture and solution to problems of virtual automation networks for purposes of automation. Virtual automation networks represent recent trend of communication in heterogeneous networks in industrial automation. Heterogeneous networks consist of industrial automation systems such as fieldbuses, office LANs, and public networks (Internet and telecommunication...
A scheme that exploits the broadcast nature of the wireless communication in order to achieve multicast content delivery is presented in this paper. As opposed to broadcasting, this method enables the clients to determine on-line the delivered content, and thus preserves the advantages of an individual service. On the other hand, a multicast content delivery is much more efficient than a unicast content...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.