Full metadata record
DC poleHodnotaJazyk
dc.contributor.authorHeigl, Michael
dc.contributor.authorSchramm, Martin
dc.contributor.authorDoerr, Laurin
dc.contributor.authorGrzemba, Andreas
dc.contributor.editorPinker, Jiří
dc.date.accessioned2019-10-08T08:17:19Z
dc.date.available2019-10-08T08:17:19Z
dc.date.issued2016
dc.identifier.citation2016 International Conference on Applied Electronics: Pilsen, 6th – 7th September 2016, Czech Republic, p.85-88.en
dc.identifier.isbn978–80–261–0601–2 (Print)
dc.identifier.isbn978–80–261–0602–9 (Online)
dc.identifier.issn1803–7232 (Print)
dc.identifier.issn1805–9597 (Online)
dc.identifier.urihttp://hdl.handle.net/11025/35194
dc.format4 s.cs
dc.format.mimetypeapplication/pdf
dc.language.isoenen
dc.publisherZápadočeská univerzita v Plznics
dc.rights© Západočeská univerzita v Plznics
dc.subjectsoftwarecs
dc.subjectprotokolycs
dc.subjectdvojité heterojunkční tranzistory s vysokou pohyblivostí elektronůcs
dc.subjectšifrovánícs
dc.subjectautentizacecs
dc.titleEmbedded plug-in devices to secure industrial network communicationsen
dc.typekonferenční příspěvekcs
dc.typeconferenceObjecten
dc.rights.accessopenAccessen
dc.type.versionpublishedVersionen
dc.description.abstract-translatedWith Ethernet as an ubiquitous technology also emerging in industrial networks, security is becoming one of the most important aspects. Whereas IT-networks together with their security features in the office domain are subject of a dynamic change, networks in the industrial environment have a long operational time and therefore are more vulnerable to unauthorized access due to outdated hard- and software components. IT-threats such as Stuxnet are targeted to these areas and in the case of a failure of, e.g., a critical infrastructure this can directly harm the public security. Hence, in this paper a concept of an embedded plug-in device is proposed that secures the authentication and integrity of communication flows between two communicating network parties. A key focus of the development is the message authentication mechanism without neglecting the safety aspect imperative for industrial networks.en
dc.subject.translatedsoftwareen
dc.subject.translatedprotocolsen
dc.subject.translatedDH-HEMTsen
dc.subject.translatedencryptionen
dc.subject.translatedauthenticationen
dc.type.statusPeer-revieweden
Vyskytuje se v kolekcích:Applied Electronics 2016
Applied Electronics 2016

Soubory připojené k záznamu:
Soubor Popis VelikostFormát 
Heigl.pdfPlný text1,34 MBAdobe PDFZobrazit/otevřít


Použijte tento identifikátor k citaci nebo jako odkaz na tento záznam: http://hdl.handle.net/11025/35194

Všechny záznamy v DSpace jsou chráněny autorskými právy, všechna práva vyhrazena.