Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na https://bibliotekanauki.pl
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 7

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
The author describes the mechanisms of safety and security profiles of industry and communication networks used within safety - related applications in technological and information levels of process control recommended according to standards IEC 61784-3,4. Nowadays the number of vendors of the safety - related communication technologies who guarantees besides the standard communication, the communication amongst the safety - related equipment according to IEC 61508 is increasing. Also the number of safety - related products is increasing, e. g. safety Fieldbus, safety PLC, safety curtains, safety laser scanners, safety buttons, safety relays and other. According to world survey the safety Fieldbus denoted the highest growth from all manufactured safety products.The main part of this paper is the description of the safety-related Fieldbus communication system, which has to guaranty Safety Integrity Level.
PL
Autor przedstawia mechanizmy bezpieczeństwa i profili zabezpieczeń sieci przemysłowych i łączności używanych w aplikacjach związanych z bezpieczeństwem na poziomach technologicznym i informacyjnym sterowania procesami, rekomendowanych zgodnie z normami IEC 61784-3,4. Obecnie wzrasta liczba firm -dostawców technologii łączności związanymi z bezpieczeństwem, które gwarantują, poza standardową łącznością, łączność pomiędzy urządzeniami związanymi z bezpieczeństwem, zgodnie z IEC 61508. Zwiększa się także liczba wyrobów związanych z bezpieczeństwem, np. zabezpieczający Fieldbus, zabezpieczający PLC, osłony bezpieczeństwa, zabezpieczające skanery laserowe, przyciski bezpieczeństwa, przekaźniki zabezpieczające i inne. Zgodnie ze światowymi badaniami, zabezpieczający Fieldbus zarejestrował największy wzrost pośród wszystkich wytwarzanych wyrobów zabezpieczających, Główną częścią referatu jest opis związanego z bezpieczeństwem systemu łączności Fieldbus, który ma na celu zagwarantowanie Poziomu Integralności Bezpieczeństwa.
2
63%
EN
Authors describe the solutions of safety industrial Ethernet with orientation to safety-related industrial control systems. Nowadays the numbers of safety solutions of industrial Ethernet are increasing (e. g. CIP Safety, ProfiSafe, Safety Interbus). Bernecker & Rainer is coming with the new solution - Open Safety, which was developed for technology Ethernet PowerLink (EPL), but open platform is compatible with the other types of industrial Ethernet too, e. g. Sercos, Ethernet/IP, Modbus, and Profinet. Mainly part of paper the safety analyses of Open Safety frame with orientation to safety codes used in two sub-frames are mentioned. Practical part is orientated to model realisation via Matlab, Simulink with the use of safety codes with possibility to demonstrate the detection capability of cyclic CRC codes dependence on characteristics of communications channel and generator polynomial selection.
EN
Authors describe the possibilities of a wireless technology used within safety-critical applications with orientation to selection the computationally safety cryptography techniques. Undetected corruption of data transmission can cause substantially considerable damages within equipments, environments or demands on human health and this is reason why systems have to be designed so that guarantee required Safety Integrity Level. For this reason the safety-related wire or wireless machines must have implemented a number of safety mechanisms located into special safety or security profiles. Nowadays, after acceptation of the new standard ISA 100.11a the barrier was broken towards the use of wireless machine-to-machine communications in standard and safety-related communication, too. ZigBee technology is very accepted standard which fulfils the requirements to the wireless industrial communication system. The main part of the paper describes the possible attacks to ZigBee communications based on cryptography mechanisms with orientation to Denial-of-Service attack. The practical part contains the results of ZigBee sensor network testing in laboratory conditions with demonstration of error-control mechanisms of MESH topology and cryptoanalytic’s attacks based on monitoring of traffic are mentioned as well.
EN
The authors of this article focus on the analysis of safety weaks of digital signature schemes used within e-Government service in condition of Slovak republic. Main part is orientated on the possibility of attacks on eID card with using RSA digital signature scheme what was in the last months very frequently medialized in Slovakia. In the practical part on the base of mathematically description is analysed possible weaks of RSA digital signature schemes especially complexity of factorization problems dependence of length of key is describe and compare with more effectiveness ECDSA scheme. On the base of studies the authors mentioned the recommendations for parameters selection of very often used digital signature schemes focus on access to safety-critical applications supported during process of digitalization of e-Government in Slovak republic.
5
Content available Key Management System in ETCS
63%
EN
Paper deals with problems of KMS (Key Management System), which is developed in mobile communications GSM-R (Global System Mobile for Railway) recommended within the European Train Control System (ETCS), through the Euroradio system. Th e main part is oriented to safety procedures description of off-line KMS system between communication entities of ETCS system. In the experimental part the results of computational safety of modifi ed DES algorithm are summarised using special brute force attack to key – birthday paradox.
EN
The paper deals with problems of an information system solution as a support for the education system within the Department of Control and Information Systems (DICS) at the University of Žilina. The primary system is designed for education subjects from the area of intelligent transport systems with Telematics. The paper summarises and describes the existing and planned subjects in the telematic systems specialization. The main part of the paper describes the specification of teachers and students requirements related to these subjects. These specifications are the basis for a practical realization of the database part of the system with features of an interactive learning system. The specified requirements for systems include e.g. a possibility to enter the figures to the database system or to allocate the questions for subjects or selected areas. The database system was designed with a using entity – relational model. To implement the systems the MySQL v 5.0.51b SW platform was used, which is compatible with the existing database in the DICS server. The paper describes a possibility of access to systems as well as problems and solutions of realized database systems security based on cryptography tools.
EN
Applications of VANET (Vehicular ad hoc Networks) networks is focused on monitoring of the safety states of vehicles or roadway by exchanging messages between vehicles and infrastructure so that the applications will be able to help a driver to handle insecure situations. They are able to warn before possible risks which can occur during the process of transportation. Essential tool for assuring of safety communications within developed applications of intelligent transportations systems are cryptography constructions on the basis of digital signature schemes. In order to assuring safety and anonymity within vehicular communications are used pseudorandom authentications methods. The authors in the paper are focused on realization of mathematical model and description of modified cryptographic constructions which are suitable for sensor networks and applications orientated to memory and performance. In these systems it is very important to use signature scheme which do not have only computational safety but must also be effective from the view of performance and must generate short digital signatures in order to communications in real time conditions.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.