Distributed device networks with security constraints

被引:37
作者
Xu, Yuefei [1 ]
Song, Ronggong
Korba, Larry
Wang, Lihui
Shen, Weiming
Lang, Sherman
机构
[1] Natl Res Council Canada, Inst Informat Technol, Ottawa, ON K1A 0R6, Canada
[2] Natl Res Council Canada, Integrated Mfg Technol Inst, Ottawa, ON, Canada
关键词
distributed device network; distributed device control; industrial control systems; collaborative control; network security; computer supported cooperative work;
D O I
10.1109/TII.2005.843826
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's globalized business world, outsourcing, joint ventures, mobile and cross-border collaborations have led to work environments distributed across multiple organizational and geographical boundaries. The new requirements of portability, configurability and interoperability of distributed device networks put forward new challenges and security risks to the system's design and implementation. There are critical demands on highly secured collaborative control environments and security enhancing mechanisms for distributed device control, configuration, monitoring, and interoperation. This paper addresses the collaborative control issues of distributed device networks under open and dynamic environments. The security challenges of authenticity, integrity, confidentiality, and execution safety are considered as primary design constraints. By adopting policy-based network security technologies and XML processing technologies, two new modules of Secure Device Control Gateway and Security Agent are introduced into regular distributed device control networks to provide security and safety enhancing mechanisms. The core architectures, applied mechanisms, and implementation considerations are presented in detail in this paper.
引用
收藏
页码:217 / 225
页数:9
相关论文
共 13 条
[1]  
Brennan RW, 2002, INTEGR COMPUT-AID E, V9, P263
[2]  
CHRISTENSEN J, 2003, FBDK THE FUNCTION BL
[3]  
*E MAN NETW INC, 2003, CNC INT
[4]  
*ESM INC, 2000, JBED RTOS PACK US MA
[5]  
*IEC, 2002, TC65WG6 IEC
[6]  
*IEC, 2000, TC65WG6 IEC
[7]  
*MMS ONL, 2003, SCANN HOR HIT SEIK I
[8]  
*REAL TIM JAV EXP, 2000, REAL TIM SPEC JAV
[9]  
Schneier Bruce, 1996, APPL CRYPTOGRAPHY
[10]   MetaMorph II: an agent-based architecture for distributed intelligent design and manufacturing [J].
Shen, WM ;
Maturana, F ;
Norrie, DH .
JOURNAL OF INTELLIGENT MANUFACTURING, 2000, 11 (03) :237-251