1. bookVolume 37 (2016): Issue 1 (July 2016)
Journal Details
License
Format
Journal
eISSN
2083-4608
First Published
26 Feb 2008
Publication timeframe
4 times per year
Languages
English
access type Open Access

Selected Aspects of the Security of the Process Data Transmission in the Distributed Control System

Published Online: 27 Jul 2016
Volume & Issue: Volume 37 (2016) - Issue 1 (July 2016)
Page range: 231 - 252
Journal Details
License
Format
Journal
eISSN
2083-4608
First Published
26 Feb 2008
Publication timeframe
4 times per year
Languages
English
Abstract

Communication between the process stations of the distributed control system is carried out. By the supervision and therapeutic systems of the stations communication process diagnosis is performed. Supervision and therapeutic systems are responsible for the security of transmitted data. The security is considered in this article mainly in the aspect of resistance to external destructive factors on the data transmission process. It is assumed that the transmission security can be provided by mechanisms protecting the integrity of the transmitted data. Correctness of the data is controlled by using one-way hash function calculated on the basis of the transmitted value variable and also is attached to the transmitted data. This allows to maintain the integrity of the transmitted process data. A solutions using one-way hash function to protection of the transmission before changing message contents (caused by eg. intruder interference) are proposed in the article.

Keywords

[1] Anderson Ross J.: Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition, Willey, Hoboken 2008.Search in Google Scholar

[2] Bednarek M.: Wizualizacja procesów. Laboratorium, Oficyna Wydawnicza Politechniki Rzeszowskiej, Rzeszów 2004.Search in Google Scholar

[3] Bednarek M., Dąbrowski T.: Koncepcja zabezpieczenia transmisji danych w mobilnym systemie diagnostycznym, Journal of KONBiN, z.2(26)/2013, s. 61-70.10.2478/jok-2013-0082Search in Google Scholar

[4] Bednarek M., Dąbrowski T., Wiśnios M.: Koncepcja zabezpieczenia transmisji pomiędzy stacjami diagnostycznymi, Pomiary Automatyka Kontrola, Wydawnictwo PAK, nr 9/2014, 749-752.Search in Google Scholar

[5] Dąbrowski T.: Diagnozowanie systemów antropotechnicznych w ujęciu potencjałowo-efektowym, Rozpr. hab., Wyd. Wojskowej Akademii Technicznej, Warszawa 2001.Search in Google Scholar

[6] Dokumentacja techniczna AC800F. Engineering Manual. IEC 61131-3 Programming.Search in Google Scholar

[7] Dokumentacja elektroniczna Control Builder F. Freelance Getting Started, 2010.Search in Google Scholar

[8] Ferguson N., Schneier B., Kohno T.: Cryptography Engineering: Design Principles and Practical Applications, Willey, 2010.Search in Google Scholar

[9] Gilbert Henri, Handschuh Helena: Security Analysis of SHA-256 and Sisters, Selected Areas in Cryptography, Springer 2003, s. 175-193.10.1007/978-3-540-24654-1_13Search in Google Scholar

[10] Liderman K.: Bezpieczeństwo informacyjne. Wydawnictwo PWN, Warszawa 2012.Search in Google Scholar

[11] IEC 61131-3:2013. Programmable controllers - Part 3: Programming languages.Search in Google Scholar

[12] Stallings W.: Kryptografia i bezpieczeństwo sieci komputerowych. Matematyka szyfrów i techniki kryptologii, Helion, 2011.Search in Google Scholar

[13] Stamp M.: Information security, J. Wiley & Sons, Hoboken, 2006.Search in Google Scholar

[14] Stinson R. Douglas: Kryptografia. W teorii i praktyce, WNT, Warszawa 2005.Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo