منابع مشابه
Hardware Security for Device Authentication in the Smart Grid
Secure communication between devices is a key aspect of smart grid security. In the future smart home environment, various smart devices, appliances and energy management systems will communicate with each other via the home network. In order to achieve mutual authentication, each device will have a private cryptographic key which must be protected against theft or misuse. Current mechanisms fo...
متن کاملCyber security challenges in Smart Cities: Safety, security and privacy
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, ...
متن کاملSmart - Device - to - Smart - Device Communications
Device-to-device (D2D) communications have been identified by the Third Generation Partnership Project (3GPP) as a potential candidate technology to offload heavily used cellular communication systems. Even though D2D communications has been around in industry and research for the last two decades, the 3GPP decision to include this concept in the cellular context is groundbreaking. There are se...
متن کاملSmart Device Profiling for Smart SCADA
SCADA (Supervisory Control and Data Acquisition) systems are computer systems used for monitoring and controlling industrial processes such as power plants and power grid systems, water, gas and oil distribution systems, production systems for food, cars and other products. We propose a new approach for regulating and detecting malicious behaviour of network devices in SCADA systems. Our approa...
متن کاملConfronting systemic challenges in interoperable medical device safety, security & usability
Safety and security are negative goals. Safety, security and usability (SSU) are system properties. They cannot be isolated to a component or some layer of the system. All three are prerequisites for system effectiveness. Ensuring SSU of an integrated system requires a holistic view; a myopic view will mislead. Consider the following illustration of a cybersecurity breach among high profile ind...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2019
ISSN: 2321-9653
DOI: 10.22214/ijraset.2019.12121