Schoeneman, 2010 - Google Patents
APPLICATIONS OF NEXT GENERATION REMOTE MONITORING SYSTEM TECHNOLOGIES (NGRMS).Schoeneman, 2010
View PDF- Document ID
- 9053704403062467219
- Author
- Schoeneman B
- Publication year
External Links
Snippet
This paper discusses application scenarios for Next Generation Remote Monitoring System (NGRMS) technologies and how data resulting from these applications may be utilized. These technologies are primarily designed for two application regimes: Treaty Verification …
- 238000004891 communication 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hou et al. | A survey on internet of things security from data perspectives | |
Giraldo et al. | Security and privacy in cyber-physical systems: A survey of surveys | |
Kannan et al. | Secure communication in IoT-enabled embedded systems for military applications using encryption | |
US9246691B2 (en) | System, method and apparata for secure communications using an electrical grid network | |
CN109302405A (en) | Blockchain network architecture and detection method for industrial data detection based on edge computing | |
US8683203B1 (en) | Subsystem authenticity and integrity verification (SAIV) | |
CN101855653A (en) | Lock administration system | |
CN108306896B (en) | A substation status monitoring system and method with data protection function | |
US9832027B2 (en) | Tamper detection systems and methods for industrial and metering devices not requiring a battery | |
US20230012696A1 (en) | True secure airgap | |
Hadjioannou et al. | Security in smart grids and smart spaces for smooth IoT deployment in 5G | |
Jain et al. | Internet of things: Architecture, security goals, and challenges—A survey | |
Saber et al. | Smart city security issues: the main attacks and countermeasures | |
US11811956B2 (en) | Blockchain-based supervision system of hazardous chemical production | |
Kloibhofer et al. | LoRaWAN with HSM as a security improvement for agriculture applications | |
Sarker et al. | When Everyday Devices Become Weapons: A Closer Look at the Pager and Walkie-talkie Attacks | |
US20240275578A1 (en) | Secure communication among known users | |
Nunoo‐Mensah et al. | Tamper‐aware authentication framework for wireless sensor networks | |
Johansson | Tamper Protection for Cryptographic Hardware: A survey and analysis of state-of-the-art tamper protection for communication devices handling cryptographic keys | |
Schoeneman | APPLICATIONS OF NEXT GENERATION REMOTE MONITORING SYSTEM TECHNOLOGIES (NGRMS). | |
US20120331290A1 (en) | Method and Apparatus for Establishing Trusted Communication With External Real-Time Clock | |
Rodríguez et al. | Security assessment of the Spanish contactless identity card | |
CN112507355B (en) | Personal health data storage system based on block chain | |
Coble et al. | Secure software attestation for military telesurgical robot systems | |
Siddharth et al. | IoT based lightweight cryptographic schemes in smart healthcare |