A crescente preocupação com ataques cibernéticos motivou pesquisadores a buscarem soluções de segurança para redes de sistemas de automação e controle industriais. Por isso, este trabalho realizou uma captura de dados na rede local da planta MecatrIME, do Laboratório de Mecatrônica do Instituto Militar de Engenharia (IME), a fim de elaborar uma solução para aumentar a sua segurança. Os resultados indicaram que os principais protocolos da rede são: ARP, TCP, UDP e SMB2. Então, foi proposta uma arquitetura que permite a conexão segura da planta à Internet, baseada na criação de uma zona desmilitarizada e de um sistema de detecção de intrusão, a fim de proteger a rede desses ataques cibernéticos.
Radio frequency identification systems are widely used to uniquely identify objects in many applications such as magnetic cards, security tags, and logistic management systems. Despite these advantages provided by the RFID system, there remain a multitude of security concerns related to spoofing and espionage that are all concerned with radio frequency interception. Current research analysis is promising, particularly the work of Ibrahim and Dalkiliç. Their findings are, however, limited by the amount of tags that can be processed—which under certain circumstances can exhaust the server. We designed our new protocol and conducted a performance analysis. When compared to the Ibrahim and Dalkiliç's protocol, our results revealed a drastic reduction in the communication cost that was proportional to the amount of tags authenticated. Once the results were tallied, we modeled our proposed protocol in a discrete event simulation. As a proof of concept, our protocol was then implemented in software and analyzed through an experiment whose metrics were: tag identity search speed in the back-end database and amount of tags. Our results show that the proposed protocol offers better performance compared to current standard iterations of similar technology.
Radio frequency identification systems are used in several applications for the unique recognition of objects. Due to the remote communication, malicious agents can read, alter and copy the transmitted information to damage the system. Therefore, researchers have created several protocols to protect these communications employing cryptographic techniques . Recently, Baashirah and Abuzneid proposed a serverless RFID authentication protocol (SLEC) based on elliptic curve cryptography to secure communication in RFID systems. Nevertheless, it has security vulnerabilities and its scalability is faulty. This work presents a comprehensive analysis that discusses the State of the Art of cryptographic applications in RFID systems and points out the SLEC protocol security and scalability issues.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.