PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Small prototype acquisition system with secure remote data access

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The paper describes Small Data Acquisition System, named PACQ, which can be used for collecting data from user-programmable I/O modules and sharing data through a web browser. All connections and data transfers between the client and the server are secure. Due to the resource restrictions only symmetric cryptography and challenge-response protocol could be used, but the solution should be resistant to most of common attacks.
Rocznik
Strony
87--100
Opis fizyczny
Bibliogr. 12 poz., rys.
Twórcy
autor
  • Department of Computer and Control Engineering, Rzeszów University of Technology, W. Pola 2, 35-959 Rzeszów, Poland
autor
  • Department of Computer and Control Engineering, Rzeszów University of Technology, W. Pola 2, 35-959 Rzeszów, Poland
Bibliografia
  • [1] Rzońca, D., Sadolewski, J., Stec, A., Świder, Z., Trybus, B., Trybus, L.: Mini-DCS System Programming in IEC 61131-3 Structured Text. Journal of Automation, Mobile Robotics & Intelligent Systems 2(3) (2008): 48.
  • [2] EVBnet02 User’s Manual; http://www.propox.com/download/docs/EVBnet02 en.pdf
  • [3] Nut/OS Software Manual; http://www.ethernut.de/pdf/enswm28e.pdf
  • [4] Rzońca D., Stec A., Trybus B.: Data Acquisition Server for Mini Distributed Control System, in: A. Kwiecie´n, P. Gaj, P. Stera (Eds.): Computer Networks 2011, Communications in Computer and Information Science 160 (2011): 398.
  • [5] AT91SAM7S-EK Evaluation Board User Guide; http://www.atmel.com/dyn/resources/prod documents/doc6112.pdf
  • [6] IEC 61131-3 Standard: Programmable Controllers. Part 3. Programming Languages, IEC 2003.
  • [7] Barry, R.: Using the FreeRTOS Real Time Kernel – A Practical Guide.
  • [8] Turan M. S., Barker E., Burr W., Chen L. : Recommendation for Password-Based Key Derivation Part 1: Storage Applications. National Institute of Standards and Technology Special Publication 800-132 (2010). http://csrc.nist.gov/publications/nistpubs/800-132/nist-sp800-132.pdf
  • [9] Kutyłowski M., Strothmann W.: Kryptografia. Teoria i praktyka zabezpieczania systemów komputerowych. Oficyna Wydawnicza Read Me, Warszawa (1999) (in Polish).
  • [10] Advanced Encryption Standard (AES). Federal Information Processing Standards Publications 197, National Institute of Standards and Technology (2001). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  • [11] Secure Hash Standard (SHS). Federal Information Processing Standards Publications 180-3, National Institute of Standards and Technology (2008). http://csrc.nist.gov/publications/fips/fips180-3/fips180-3 final.pdf
  • [12] The Keyed-Hash Message Authentication Code (HMAC). Federal Information Processing Standards Publications 198-1, National Institute of Standards and Technology (2008). http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1 final.pdf
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-298ce341-41c2-4be8-996d-4c07b79683d0
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.