Granzer et al., 2010 - Google Patents
Security analysis of open building automation systemsGranzer et al., 2010
View PDF- Document ID
- 12985371025789370885
- Author
- Granzer W
- Kastner W
- Publication year
- Publication venue
- International Conference on Computer Safety, Reliability, and Security
External Links
Snippet
With the integration of security-critical services into Building Automation Systems (BAS), the demands on the underlying network technologies increase rapidly. Relying on physically isolated networks and on “Security by Obscurity”, as it is still common today, is by no means …
- 238000004458 analytical method 0 title abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10547594B2 (en) | Systems and methods for implementing data communication with security tokens | |
| US10097517B2 (en) | Secure tunnels for the internet of things | |
| Zillner et al. | ZigBee exploited: The good, the bad and the ugly | |
| US20200358764A1 (en) | System and method for generating symmetric key to implement media access control security check | |
| US11799844B2 (en) | Secure communication network | |
| CN101094056B (en) | Security system of wireless industrial control network, and method for implementing security policy | |
| US20170201383A1 (en) | Multiple factor authentication in an identity certificate service | |
| US20080092211A1 (en) | UPNP authentication and authorization | |
| US11075907B2 (en) | End-to-end security communication method based on mac protocol using software defined-networking, and communication controller and computer program for the same | |
| Granzer et al. | Security in networked building automation systems | |
| US20120066500A1 (en) | Method of Time Synchronization Communication | |
| Tiloca et al. | Axiom: DTLS-based secure IoT group communication | |
| CN104837150B (en) | IPv6 wireless sense network safety test systems | |
| CN1685687A (en) | Secure Proximity Verification of Nodes on the Network | |
| JP2024501578A (en) | Key provisioning methods and related products | |
| US20060005010A1 (en) | Identification and authentication system and method for a secure data exchange | |
| CN101282208A (en) | Method for updating master key associated with secure connection, server and network system | |
| CN113507370A (en) | Forestry Internet of things equipment authorization authentication access control method based on block chain | |
| Granzer et al. | Security analysis of open building automation systems | |
| CN107493294A (en) | A kind of secure accessing and management control method of the OCF equipment based on rivest, shamir, adelman | |
| Buschsieweke et al. | Securing critical infrastructure in smart cities: Providing scalable access control for constrained devices | |
| Naedele | An access control protocol for embedded devices | |
| Glanzer et al. | Increasing security and availability in KNX networks | |
| Papatsaroucha et al. | A Cloud-Based Key Rolling Technique for Alleviating Join Procedure Replay Attacks in LoRaWAN-based Wireless Sensor Networks | |
| Granzer | Secure Communication in Home and Building Automation Systems |