Vestavěné systémy pro řízení v reálném čase.

Loading...
Thumbnail Image

Downloads

1

Date issued

Authors

Czekaj, Petr

Journal Title

Journal ISSN

Volume Title

Publisher

Vysoká škola báňská - Technická univerzita Ostrava

Location

ÚK/Sklad diplomových prací

Signature

201400470

Abstract

Demands on security, privacy and private data are increasing. New procedures and techniques, how to get to the private data, are coming up rapidly on the other hand. This refers to control systems as well, especially to those, which enable the use of modern communication technologies such as wireless networks or the internet. This work deals with securing of the data transfers in control systems, whose participants are communicating over the internet and public networks. The goal of this work is the design of the methodology for an analysis and evaluation of control systems security and proposing the solutions in order to fulfill required security levels. The reason for this topic was no available methodology or even standardized rules in control systems regarding security and very bad working practices. Next goal is the practical application of the designed methodology, analyzing the security of Guardian control system. The goal of this system is the monitoring of the life functions of the handicapped patients. Main task is the gathering of the data from patients and transfer of the data for further processing and remote visualizations not only in private networks but anywhere on the internet. Part of this work is also the modeling and the testing of Guardian’s critical data transfers, in order to identify the influence of the secured communication on the speed and the reliability of the data transfers. Tests for different devices, communication protocols, security levels and transfer mediums have been performed. PKI technologies were chosen as an instrument for fulfilling security requirements. They provide wide spectrum of services and components such as public and private keys, digital certificates, encryption and other, which all together enable to ensure, that the transferred data will not be monitored and misused by a third party, even when public communication channels are used for the communication. PKI technologies provide the authentication of participants of the communication, integrity of transferred data, non-repundation of the transferred data or its confidentiality.

Description

Import 21/10/2013

Subject(s)

PKI, embedded devices, control systems, authentication, secured communication, digital signature, certificate, private key, public key, cryptography, risk analysis, internet, Wi-Fi, LAN, TCP/IP, OpenSSL, Guardian

Citation