2008 IEEE International Workshop on Factory Communication Systems 2008
DOI: 10.1109/wfcs.2008.4638716
|View full text |Cite
|
Sign up to set email alerts
|

Key set management in networked building automation systems using multiple key servers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2008
2008
2010
2010

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…This includes a detailed design of the IDS and the communication protocol that manages an isolation and redundant path activation. Furthermore, the DoS prevention and detection mechanisms shall be evaluated with the help of a prototype implementation and a simulation framework of a secure building automation system [5]. Finally, the automatic generation of tree graphs out of the engineering tools will be assessed.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…This includes a detailed design of the IDS and the communication protocol that manages an isolation and redundant path activation. Furthermore, the DoS prevention and detection mechanisms shall be evaluated with the help of a prototype implementation and a simulation framework of a secure building automation system [5]. Finally, the automatic generation of tree graphs out of the engineering tools will be assessed.…”
Section: Discussionmentioning
confidence: 99%
“…A protection against interception (e.g., network sniffing), modification (e.g., man-in-the-middle attacks), and fabrication (e.g., replay attacks) can be achieved by guaranteeing integrity, freshness, and confidentiality [5] of the transmitted control data. To achieve these security objectives, a secured channel has to be provided.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the use of a single key server introduces a single point of failure. Therefore, a scheme based on multiple key servers is desirable [22]. To support all kinds of applications, the use of different communication models shall be possible.…”
Section: Security In Building Automation Standardsmentioning
confidence: 99%
“…A communication group is denoted as G x where ID Gx holds the unique ID within the network. Based on these three different types of communication relationship, all six communication types typically found in building automation [7] can be supported by the SAL: secure point-to-point control data communication and device management are performed within sessions using secure unicast, secure loose group communication and network management are handled by network relationships using secure broadcast, and secure strict group communication and group management are provided by communication groups using secure multicast.…”
Section: Security Abstraction Layermentioning
confidence: 99%