[go: up one dir, main page]

Schoeneman, 2010 - Google Patents

APPLICATIONS OF NEXT GENERATION REMOTE MONITORING SYSTEM TECHNOLOGIES (NGRMS).

Schoeneman, 2010

View PDF
Document ID
9053704403062467219
Author
Schoeneman B
Publication year

External Links

Snippet

This paper discusses application scenarios for Next Generation Remote Monitoring System (NGRMS) technologies and how data resulting from these applications may be utilized. These technologies are primarily designed for two application regimes: Treaty Verification …
Continue reading at www.osti.gov (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Hou et al. A survey on internet of things security from data perspectives
Giraldo et al. Security and privacy in cyber-physical systems: A survey of surveys
Kannan et al. Secure communication in IoT-enabled embedded systems for military applications using encryption
US9246691B2 (en) System, method and apparata for secure communications using an electrical grid network
CN109302405A (en) Blockchain network architecture and detection method for industrial data detection based on edge computing
US8683203B1 (en) Subsystem authenticity and integrity verification (SAIV)
CN101855653A (en) Lock administration system
CN108306896B (en) A substation status monitoring system and method with data protection function
US9832027B2 (en) Tamper detection systems and methods for industrial and metering devices not requiring a battery
US20230012696A1 (en) True secure airgap
Hadjioannou et al. Security in smart grids and smart spaces for smooth IoT deployment in 5G
Jain et al. Internet of things: Architecture, security goals, and challenges—A survey
Saber et al. Smart city security issues: the main attacks and countermeasures
US11811956B2 (en) Blockchain-based supervision system of hazardous chemical production
Kloibhofer et al. LoRaWAN with HSM as a security improvement for agriculture applications
Sarker et al. When Everyday Devices Become Weapons: A Closer Look at the Pager and Walkie-talkie Attacks
US20240275578A1 (en) Secure communication among known users
Nunoo‐Mensah et al. Tamper‐aware authentication framework for wireless sensor networks
Johansson Tamper Protection for Cryptographic Hardware: A survey and analysis of state-of-the-art tamper protection for communication devices handling cryptographic keys
Schoeneman APPLICATIONS OF NEXT GENERATION REMOTE MONITORING SYSTEM TECHNOLOGIES (NGRMS).
US20120331290A1 (en) Method and Apparatus for Establishing Trusted Communication With External Real-Time Clock
Rodríguez et al. Security assessment of the Spanish contactless identity card
CN112507355B (en) Personal health data storage system based on block chain
Coble et al. Secure software attestation for military telesurgical robot systems
Siddharth et al. IoT based lightweight cryptographic schemes in smart healthcare