Schoeneman, 2010 - Google Patents
APPLICATIONS OF NEXT GENERATION REMOTE MONITORING SYSTEM TECHNOLOGIES (NGRMS).Schoeneman, 2010
View PDF- Document ID
- 9053704403062467219
- Author
- Schoeneman B
- Publication year
External Links
Snippet
This paper discusses application scenarios for Next Generation Remote Monitoring System (NGRMS) technologies and how data resulting from these applications may be utilized. These technologies are primarily designed for two application regimes: Treaty Verification …
- 238000004891 communication 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hou et al. | A survey on internet of things security from data perspectives | |
| Kannan et al. | Secure communication in IoT-enabled embedded systems for military applications using encryption | |
| US9246691B2 (en) | System, method and apparata for secure communications using an electrical grid network | |
| CN109302405A (en) | Blockchain network architecture and detection method for industrial data detection based on edge computing | |
| US8683203B1 (en) | Subsystem authenticity and integrity verification (SAIV) | |
| CN101855653A (en) | Lock administration system | |
| CN108306896B (en) | A substation status monitoring system and method with data protection function | |
| US20120070002A1 (en) | Protecting information in an untethered asset | |
| US9832027B2 (en) | Tamper detection systems and methods for industrial and metering devices not requiring a battery | |
| Jain et al. | Internet of things: Architecture, security goals, and challenges—A survey | |
| Saber et al. | Smart city security issues: the main attacks and countermeasures | |
| Hadjioannou et al. | Security in smart grids and smart spaces for smooth IoT deployment in 5G | |
| US12445264B2 (en) | Secure communication among known users | |
| US20230125955A1 (en) | Blockchain-based supervision system of hazardous chemical production | |
| Sarker et al. | When Everyday Devices Become Weapons: A Closer Look at the Pager and Walkie-talkie Attacks | |
| US20120331290A1 (en) | Method and Apparatus for Establishing Trusted Communication With External Real-Time Clock | |
| US20230012696A1 (en) | True secure airgap | |
| Schoeneman | APPLICATIONS OF NEXT GENERATION REMOTE MONITORING SYSTEM TECHNOLOGIES (NGRMS). | |
| Nunoo‐Mensah et al. | Tamper‐aware authentication framework for wireless sensor networks | |
| Johansson | Tamper Protection for Cryptographic Hardware: A survey and analysis of state-of-the-art tamper protection for communication devices handling cryptographic keys | |
| Rodríguez et al. | Security assessment of the Spanish contactless identity card | |
| CN217486505U (en) | Credible terminal device based on Internet of things + block chain | |
| Coble et al. | Secure software attestation for military telesurgical robot systems | |
| CN112507355B (en) | Personal health data storage system based on block chain | |
| Garg et al. | Security Issues and Challenges for Cyber-Physical Systems |