NACIO - Non-obtrusive Authentication of Critical Infrastructure Operators
نویسندگان
چکیده
NACIO addresses a large security hole that exists in many critical infrastructure control centers. Because of operational constraints, operators are not authenticated to the workstations that control critical infrastructure. Anyone with physical access to the workstation has the ability to control these critical systems. NACIO provides mechanisms to detect and track critical commands and tie them to the issuing operator in a transparent manner.
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
متن کاملSome Critical Aspects of the PKIX TSP
Authentication, non-repudiation, and digital signatures, require the ability to determine if a data token existed at a certain moment in time when the creator’s credentials were valid. Time-stamps are tokens which contain a verifiable cryptographic link between a time value and a data representation. The paper presents some critical aspects of the X.509 Public Key Infrastructure Time Stamp Prot...
متن کامل