Secured SECS/GEM: A Security Mechanism for M2M Communication in Industry 4.0 Ecosystem
نویسندگان
چکیده
The manufacturing industry has been revolutionized by Industry 4.0, vastly improving the process, increasing production quality and capacity. Machine-to-Machine (M2M) communication protocols were developed to strengthen bind this ecosystem allowing machines communicate with each other. SECS/GEM protocol is at heart of industry, thriving as a control system for years. It equipment used equipment-host data communications. However, it not without drawbacks, despite being widely adopted leading industries. does offer any type security features was designed work in closed network. Such shortcomings will allow attackers steal secrets such processes looking recipes, perform reconnaissance prior sabotage attempts, can have severe implications on entire industry. This paper proposes mechanism secure messages AES-GCM encryption evaluate performance standard protocol. results from our evaluations showed that proposed achieves confidentiality authenticity negligible overhead 0.8 milliseconds 0.37 when sending receiving message, respectively, compared
منابع مشابه
Low delay and secure M2M communication mechanism for eHealthcare
Currently, the eHealthcare information management is the most critical and hot research topic. Especially with the involvement of new and promising telecommunication technologies like Machine to Machine (M2M) Communication. In M2M communication the devices interact and exchange information with each other in an autonomous manner to accomplish the required tasks. Mostly machine communicate to an...
متن کاملValue chain scenarios for M2M ecosystem
Recently attention has been directed to Machine to Machine (M2M) wireless communications by a number of stakeholders which include device manufacturers, applications developers and mobile network operators across the globe. As voice revenues for most mobile operators enter a decline due to the new data oriented networks and services being availed into the market, there is growing need to adopt ...
متن کاملSecurity Mechanism for Group Communication in Cloud
Cloud computing provides an economical and efficient solution for sharing group resource among the cloud users. Sharing data in a multi-owner manner while preserving data and identity privacy from an un-trusted cloud is still a challenging issue, due to the frequent change of the members. Mona is a secure Multi-Owner data sharing scheme which leverages the group signature and dynamic broadcast ...
متن کاملDetermining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry
Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...
متن کاملSecured Communication for Missile Navigation
In order to improve the security of the Military kinds of network this work is proposed. Here the position of missile navigates as per the user’s requirement. The user sends the co-ordinates through pc based server on the base station. For security purpose encryption is done with RC4algorithm implementation. The system that uses Human Computer Interaction and Visualization technology provides s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2021
ISSN: ['2158-107X', '2156-5570']
DOI: https://doi.org/10.14569/ijacsa.2021.0120828