Search results for "SECURITY PROTOCOL"

showing 6 items of 6 documents

Cyber Security for Wireless Semantic (SCADA/DCS) Systems

2016

International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …

Engineeringcomputer.internet_protocolSOAP0211 other engineering and technologies[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Supervisory controlSecure communicationSCADAWireless Application ProtocolSemantic Wireless (SCADA/DCS)Wireless Security ProtocolProtocol (object-oriented programming)Semantic Cyber Security[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]021110 strategic defence & security studiesbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS021001 nanoscience & nanotechnology(ZIGBEE/SOAP/SECURITY) ProtocolControl and Systems EngineeringKey (cryptography)0210 nano-technologyDistributed control systembusinessSmart Energetic PlatformcomputerComputer network
researchProduct

Pacienta drošība operācijas laikā

2016

Bakalaura darba tēma – Pacienta drošība operācijas laikā. Tēmas aktualitāti nosaka pasaules mērogā aktualizētie jautājumi par pacientu drošības nodrošināšanu operācijas laikā, mazinot kaitējumu pacienta veselībai. Darba mērķis: noskaidrot pacientu drošības mērķus operācijas laika traumatoloģijas profila stacionārā. Mērķa sasniegšanai tika izvirzīti vairāki uzdevumi. Izvirzītais pētniecības jautājums: Kā tiek ievēroti pacientu drošības aspekti operācijas laikā traumatoloģijas profila stacionārā. Darbā izmantota kvalitatīvā pētniecības metode – intervija. Medicīnas profesionāļi kā primāro pacienta drošības aspektu atzīmē pacienta identifikāciju, kam seko paredzētās operācijas, vietas un puses…

Pacienta drošībaPatient safetysurgical security protocolĶirurģiskās drošības protokolsMedicīna
researchProduct

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

SECURE SOLUTION FOR MODERN SEMANTIC SCADA

2013

International audience; NOUS TRAVAILLONS SUR LA SECURITE DES SYSTEMES SCADA (SUPERVI-SORY CONTROL AND DATA AQUISITION) MODERNE EXPLOITANT DES EQUI-PEMENTS MODRNE AVEC DE L’INTELLIGENCE EMBARQUE COMME LES RTU (REMOTE TERMINAL UNIT), LES CAPTEURSINTELLIGENTS, LES ACTIONNEURS INTELLIGENTS, LES EQUIPEMENTS DE L’INSTRUMENTATION GAZIERE MODERNE COMME LES COMPTEURS NUME-RIQUE, LES CORECTEURS ELECTONIQUE, LES POMPES DOSEUSES AVEC CARTE ELECTRONIQUE, LES CHROMATOGRAPHES...ECT. AVEC LES AVANCES TECHNLOGIQUES DE L’INFORMATIQUE EMBARQUE COMME LES SERVICES WEB ET LES APPLICATION CONCU SELON LES ARCHITECTURES MODERNE (SOA- SERVICE ORIENTED ARCHITECTURE), LES ONTOLOGIES ET LE WEB SEMANTIQUE, LES BASES DE …

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI][ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI](IT-SCADA) PLATFORMSCADASECURITY PROTOCOL
researchProduct

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct