+

Glanzer et al., 2016 - Google Patents

Increasing security and availability in KNX networks

Glanzer et al., 2016

View PDF
Document ID
16411098029745094101
Author
Glanzer H
Krammer L
Kastner W
Publication year
Publication venue
Sicherheit 2016-Sicherheit, Schutz und Zuverlässigkeit

External Links

Snippet

Buildings contain a number of technical systems in order to be able to fulfill their task of providing a comfortable, secure and safe environment. Apart from heating, ventilation and airconditioning as well as lighting and shading, critical services such as fire alarm or access …
Continue reading at dl.gi.de (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources

Similar Documents

Publication Publication Date Title
CN110996318B (en) A security communication access system for intelligent inspection robots in substations
JP3688830B2 (en) Packet transfer method and packet processing apparatus
Lim et al. Security protocols against cyber attacks in the distribution automation system
CN1833403B (en) Communication system, communication device, communication method
Granzer et al. Security in networked building automation systems
CN111770092B (en) A kind of numerical control system network security architecture and secure communication method and system
Dahlmanns et al. Transparent end-to-end security for publish/subscribe communication in cyber-physical systems
US20120066764A1 (en) Method and apparatus for enhancing security in a zigbee wireless communication protocol
Tiloca et al. Axiom: DTLS-based secure IoT group communication
Musa et al. Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security
Annessi et al. It's about time: Securing broadcast time synchronization with data origin authentication
Wang et al. Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy
Akerberg et al. Exploring security in PROFINET IO
KR102663891B1 (en) Smart home system having dual security characteristics and communication method thereof
Glanzer et al. Increasing security and availability in KNX networks
CN117896178B (en) Hidden communication method and device based on encryption protocol disguise
Granzer et al. Security analysis of open building automation systems
CN110679129B (en) Method and communication device for securing communication between first and second communication device
US20120226901A1 (en) System, Method and Apparatus For Secure Telecommunications In A Home Area Network
Papatsaroucha et al. A Cloud-Based Key Rolling Technique for Alleviating Join Procedure Replay Attacks in LoRaWAN-based Wireless Sensor Networks
Antonini et al. Security Analysis of Building Automation Networks: Threat Model and Viable Mitigation Techniques
Granzer Secure Communication in Home and Building Automation Systems
Ng et al. SEABASS: Symmetric-keychain encryption and authentication for building automation systems
Granzer et al. Security in Industrial Communication Systems
JP2005065004A (en) ENCRYPTED COMMUNICATION DATA INSPECTION METHOD, ENCRYPTED COMMUNICATION DATA INSPECTION DEVICE, AND ENCRYPTED COMMUNICATION DATA INSPECTION PROGRAM
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载