ENGLISH
La vitrine de diffusion des publications et contributions des chercheurs de l'ÉTS
RECHERCHER

A new cellular architecture for information retrieval from sensor networks through embedded service and security protocols

Téléchargements

Téléchargements par mois depuis la dernière année

Plus de statistiques...

Shahzad, Aamir, Landry, René, Lee, Malrey, Xiong, Naixue, Lee, Jongho et Lee, Changhoon. 2016. « A new cellular architecture for information retrieval from sensor networks through embedded service and security protocols ». Sensors, vol. 16, nº 6.
Compte des citations dans Scopus : 9.

[thumbnail of Landry R 2016 13088.pdf]
Prévisualisation
PDF
Landry R 2016 13088.pdf - Version publiée
Licence d'utilisation : Creative Commons CC BY.

Télécharger (4MB) | Prévisualisation

Résumé

Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

Type de document: Article publié dans une revue, révisé par les pairs
Informations complémentaires: Identifiant de l'article: art821
Professeur:
Professeur
Landry, René Jr
Affiliation: Génie électrique
Date de dépôt: 07 juill. 2016 21:24
Dernière modification: 16 oct. 2020 18:41
URI: https://espace2.etsmtl.ca/id/eprint/13088

Actions (Authentification requise)

Dernière vérification avant le dépôt Dernière vérification avant le dépôt