Glanzer et al., 2016 - Google Patents
Increasing security and availability in KNX networksGlanzer et al., 2016
View PDF- Document ID
- 16411098029745094101
- Author
- Glanzer H
- Krammer L
- Kastner W
- Publication year
- Publication venue
- Sicherheit 2016-Sicherheit, Schutz und Zuverlässigkeit
External Links
Snippet
Buildings contain a number of technical systems in order to be able to fulfill their task of providing a comfortable, secure and safe environment. Apart from heating, ventilation and airconditioning as well as lighting and shading, critical services such as fire alarm or access …
- 230000001052 transient 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110996318B (en) | A security communication access system for intelligent inspection robots in substations | |
| JP3688830B2 (en) | Packet transfer method and packet processing apparatus | |
| Lim et al. | Security protocols against cyber attacks in the distribution automation system | |
| CN1833403B (en) | Communication system, communication device, communication method | |
| Granzer et al. | Security in networked building automation systems | |
| CN111770092B (en) | A kind of numerical control system network security architecture and secure communication method and system | |
| Dahlmanns et al. | Transparent end-to-end security for publish/subscribe communication in cyber-physical systems | |
| US20120066764A1 (en) | Method and apparatus for enhancing security in a zigbee wireless communication protocol | |
| Tiloca et al. | Axiom: DTLS-based secure IoT group communication | |
| Musa et al. | Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security | |
| Annessi et al. | It's about time: Securing broadcast time synchronization with data origin authentication | |
| Wang et al. | Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy | |
| Akerberg et al. | Exploring security in PROFINET IO | |
| KR102663891B1 (en) | Smart home system having dual security characteristics and communication method thereof | |
| Glanzer et al. | Increasing security and availability in KNX networks | |
| CN117896178B (en) | Hidden communication method and device based on encryption protocol disguise | |
| Granzer et al. | Security analysis of open building automation systems | |
| CN110679129B (en) | Method and communication device for securing communication between first and second communication device | |
| US20120226901A1 (en) | System, Method and Apparatus For Secure Telecommunications In A Home Area Network | |
| Papatsaroucha et al. | A Cloud-Based Key Rolling Technique for Alleviating Join Procedure Replay Attacks in LoRaWAN-based Wireless Sensor Networks | |
| Antonini et al. | Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques | |
| Granzer | Secure Communication in Home and Building Automation Systems | |
| Ng et al. | SEABASS: Symmetric-keychain encryption and authentication for building automation systems | |
| Granzer et al. | Security in Industrial Communication Systems | |
| JP2005065004A (en) | ENCRYPTED COMMUNICATION DATA INSPECTION METHOD, ENCRYPTED COMMUNICATION DATA INSPECTION DEVICE, AND ENCRYPTED COMMUNICATION DATA INSPECTION PROGRAM |