Explore chapters and articles related to this topic
Communication Infrastructure for Smart Microgrids
Published in Sasi K. Kottayil, Smart Microgrids, 2020
WAN: Wide area network connections are to be created in the SCADA system for a power generation plant to provide interconnection between the devices of the SCADA network and the devices of a remote-control center, network operation center, substations or energy markets. Technically, this might not be a direct device-to-device connection, but interconnection of LANs at both places enabling an indirect connection so as to facilitate data exchange between the devices. This is achieved by access routers connected to a switch or hub on the LAN serving as a gateway to the WAN and forward the network traffic. As the applications over WAN are data exchanges, throughput and packet delivery ratio are the important performance metrics and both should be high. Delay must not be high and overhead must be low. WAN traffic usually travels via the Internet over public network or private network. Use of public networks is simpler and less costly, but has less security. Private networks use dedicated lines and therefore offer better security. Security can be improved in public networks by using virtual private networks (VPN) which create virtual “tunnels” through which data is communicated between two locations. Protecting access to the system by using passwords, authentication techniques and firewalls in switches and routers that connect to external networks are some mandatory requirements to ensure cyber security in this communication system.
12 Private Networks Secure and Transport
Published in Wes Simpson, Video Over IP, 2013
Modern private networks are much more sophisticated, with highspeed connections more widely deployed, to support a variety of internal communications functions. Most private networks support applications such as e-mail, file sharing, and corporate web intranets. Other services, such as voice over IP and instant messaging, are growing in popularity. As network speeds increase in order to support these applications, it also becomes feasible to transport video signals on private networks.
Fog Computing and Its Security Challenges
Published in Amitoj Singh, Vinay Kukreja, Taghi Javdani Gandomani, Machine Learning for Edge Computing, 2023
Kamali Gupta, Deepali Gupta, Vinay Kukreja, Vipul Kaushik
Based on the study conducted here, this chapter presents the following observations and future recommendations in the area of fog security: Data encryption is used to ensure data confidentiality, so its potential mechanisms can be used at different stages for securing data. For example, the Advanced Encryption Standard (AES) algorithm can be applied for data at rest, and the Secure Socket Layer (SSL) protocol can be used for data in transit. Integrity checks are to be mandated prior to and after the communications. Similarly, it is important to distinguish between the sensitive data and archival data such as public streaming videos. When encryption techniques are applied to such archived data, it may hamper the overall system performance due to constrained resources. So, strategies could be made in this direction in future work.The frequently used data being stored in cache is prone to cache attacks, such as exposing cryptographic keys that might leak sensitive information. Therefore, strategies need to be devised involving hardware and software modifications that can prevent cache interference attacks.A network is formed by connection of small devices. The data generated by one device may be small, but in a network with a number of communicating devices, the data becomes massive in quantity, creating difficulties in detecting anomalous activities as filtering each data packet can instigate more resource consumption. Anti-viruses, IDS, and firewalls can be used for efficacious network monitoring. In future research work, communications taking place at multiple levels can be monitored using rule matching patterns in artificial neural networks. Virtual private networks can also be established to isolate networks from external attacks.The existing malware attacks, such as spyware, trojans, viruses, and worms may spread unwanted infections on sensitive data in the network. This highlights the need to implement an efficient cross-storage, light-weight detection service that can defend against these threats without compromising system performance.The fog paradigm has been widely implemented using wireless sensors and IoT devices. Techniques need to be developed that can provide solutions to packet sniffing and similar challenges. The mobility in these devices further complicates the implementation of security in communication as attackers get unprecedented freedom to intercept sensitive data. Therefore, more advanced Wi-Fi security algorithms, such as Wi-Fi protected access, wireless protocols such as 802.11a and 802.11g, and IDS for guarding in 5G heterogeneous mobile networks should be implemented for future correspondence.
Mining Metaverse – a future collaborative tool for best practice mining
Published in Mining Technology, 2023
As an example, an issue with early virtual reality systems integration and the use of collaborative communications platforms presented in Figure 3(b) was that most mine site in the early 2000s had very limited network and internet communications bandwidth. Such issues are still present today however, many mines now have access to remote private networks and satellite communications that provides access to the internet and hence access to the Mining Metaverse itself. Many commercial providers have appeared in recent years for example Vocus (2022), who report that a gold mine was looking to improve network coverage and connectivity speeds across its remotely located site in Western Australia. The solution was a private network with internet connectivity via ‘fibre plus partner-supplied microwave links’. The outcome was reliable internet and increased entertainment options Vocus (2022) for the site. A sketch of a private remote network is shown in Figure 6.
An Optimal Reinforced Deep Belief Network for Detection of Malicious Network Traffic
Published in IETE Journal of Research, 2023
The classification process is performed after the data points clustering to categorize the network traffic data. In the network traffic analysis (NTA) approach, the data are classified in a particular period of time only. The detailed study of data shared through the internet is termed NTA. By examining various data points, the NTA categorizes the data points into different separate classes. The real data inspection of payloads is named the deep packet inspection. The traffic data are classified as real and non-real-time travel data with the payload of the NTA classification model. The data about destination and source address and transmitted packet are determined through a deep packet inspection classification model. With internet protocol (IP), the data are transmitted through a private network. Also, NTA is the study of the payload of IP packets and there are three major parts to each packet. The header information related to the TCP header and IP are comprised in the first and second parts, the data considered as the payload is in the third part. In the payloads, the packet comprises application layer information like filers, text, or images, and the header part authorizes the information about the destination and the source address of the data points. The way to send data to the desired part is notified by sending information to the switches and routers. The data flow among the two hosts is controlled using a TCP header and the DPI analyses the traffic among these hosts in order to observe all the traffic data.
A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic
Published in Connection Science, 2021
Shaik Shakeel Ahamad, Al-Sakib Khan Pathan
Communication Manager (CM): Information about CCH services, standards of communications, and interfaces used for different devices is kept in it. Three data interoperability methodologies are HL7 (Health Level Seven) (https://www.hl7.org/), DICOM (Digital Imaging and Communications in Medicine) (https://www.dicomstandard.org/), and IHE (Integrated the Healthcare Enterprise) (Bhatia & Ibrahim, 2020). HL7 and DICOM are the standards applied for data transmission among CCH, hospitals and CHA. For encrypted communication, IPSec VPN (Internet Protocol Security Virtual Private Network) is placed at the forefront of medical gateways. To engage in HTTPS (Hypertext Transfer Protocol Secure) communication, SSL (Secure Sockets Layer) protocol is applied for servers at the medical gateways (for web servers).