+

Granzer et al., 2010 - Google Patents

Security analysis of open building automation systems

Granzer et al., 2010

View PDF
Document ID
12985371025789370885
Author
Granzer W
Kastner W
Publication year
Publication venue
International Conference on Computer Safety, Reliability, and Security

External Links

Snippet

With the integration of security-critical services into Building Automation Systems (BAS), the demands on the underlying network technologies increase rapidly. Relying on physically isolated networks and on “Security by Obscurity”, as it is still common today, is by no means …
Continue reading at www.auto.tuwien.ac.at (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals

Similar Documents

Publication Publication Date Title
US10547594B2 (en) Systems and methods for implementing data communication with security tokens
US10097517B2 (en) Secure tunnels for the internet of things
Zillner et al. ZigBee exploited: The good, the bad and the ugly
US20200358764A1 (en) System and method for generating symmetric key to implement media access control security check
US11799844B2 (en) Secure communication network
CN101094056B (en) Security system of wireless industrial control network, and method for implementing security policy
US20170201383A1 (en) Multiple factor authentication in an identity certificate service
US20080092211A1 (en) UPNP authentication and authorization
US11075907B2 (en) End-to-end security communication method based on mac protocol using software defined-networking, and communication controller and computer program for the same
Granzer et al. Security in networked building automation systems
US20120066500A1 (en) Method of Time Synchronization Communication
Tiloca et al. Axiom: DTLS-based secure IoT group communication
CN104837150B (en) IPv6 wireless sense network safety test systems
CN1685687A (en) Secure Proximity Verification of Nodes on the Network
JP2024501578A (en) Key provisioning methods and related products
US20060005010A1 (en) Identification and authentication system and method for a secure data exchange
CN101282208A (en) Method for updating master key associated with secure connection, server and network system
CN113507370A (en) Forestry Internet of things equipment authorization authentication access control method based on block chain
Granzer et al. Security analysis of open building automation systems
CN107493294A (en) A kind of secure accessing and management control method of the OCF equipment based on rivest, shamir, adelman
Buschsieweke et al. Securing critical infrastructure in smart cities: Providing scalable access control for constrained devices
Naedele An access control protocol for embedded devices
Glanzer et al. Increasing security and availability in KNX networks
Papatsaroucha et al. A Cloud-Based Key Rolling Technique for Alleviating Join Procedure Replay Attacks in LoRaWAN-based Wireless Sensor Networks
Granzer Secure Communication in Home and Building Automation Systems
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载