There are many kinds of control networks, which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automation). They are now introducing IP and face the issues of security and configuration complexity. The authors have proposed a model which intends to solve these issues while satisfying restrictions, i.e. small embedded devices, isolated networks and private naming system/name space, which are required when introducing new functionality into existing control networks. Secure bootstrap sequence and device-to-device communication using the chain of trust are the points of the model. This paper shows the practicability of the model through implementing the model experimentally.
Nobuo OKABE
Shoichi SAKANE
Kazunori MIYAZAWA
Ken'ichi KAMADA
Masahiro ISHIYAMA
Atsushi INOUE
Hiroshi ESAKI
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Nobuo OKABE, Shoichi SAKANE, Kazunori MIYAZAWA, Ken'ichi KAMADA, Masahiro ISHIYAMA, Atsushi INOUE, Hiroshi ESAKI, "Implementing a Secure Autonomous Bootstrap Mechanism for Control Networks" in IEICE TRANSACTIONS on Information,
vol. E89-D, no. 12, pp. 2822-2830, December 2006, doi: 10.1093/ietisy/e89-d.12.2822.
Abstract: There are many kinds of control networks, which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automation). They are now introducing IP and face the issues of security and configuration complexity. The authors have proposed a model which intends to solve these issues while satisfying restrictions, i.e. small embedded devices, isolated networks and private naming system/name space, which are required when introducing new functionality into existing control networks. Secure bootstrap sequence and device-to-device communication using the chain of trust are the points of the model. This paper shows the practicability of the model through implementing the model experimentally.
URL: https://global.ieice.org/en_transactions/information/10.1093/ietisy/e89-d.12.2822/_p
Copy
@ARTICLE{e89-d_12_2822,
author={Nobuo OKABE, Shoichi SAKANE, Kazunori MIYAZAWA, Ken'ichi KAMADA, Masahiro ISHIYAMA, Atsushi INOUE, Hiroshi ESAKI, },
journal={IEICE TRANSACTIONS on Information},
title={Implementing a Secure Autonomous Bootstrap Mechanism for Control Networks},
year={2006},
volume={E89-D},
number={12},
pages={2822-2830},
abstract={There are many kinds of control networks, which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automation). They are now introducing IP and face the issues of security and configuration complexity. The authors have proposed a model which intends to solve these issues while satisfying restrictions, i.e. small embedded devices, isolated networks and private naming system/name space, which are required when introducing new functionality into existing control networks. Secure bootstrap sequence and device-to-device communication using the chain of trust are the points of the model. This paper shows the practicability of the model through implementing the model experimentally.},
keywords={},
doi={10.1093/ietisy/e89-d.12.2822},
ISSN={1745-1361},
month={December},}
Copy
TY - JOUR
TI - Implementing a Secure Autonomous Bootstrap Mechanism for Control Networks
T2 - IEICE TRANSACTIONS on Information
SP - 2822
EP - 2830
AU - Nobuo OKABE
AU - Shoichi SAKANE
AU - Kazunori MIYAZAWA
AU - Ken'ichi KAMADA
AU - Masahiro ISHIYAMA
AU - Atsushi INOUE
AU - Hiroshi ESAKI
PY - 2006
DO - 10.1093/ietisy/e89-d.12.2822
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E89-D
IS - 12
JA - IEICE TRANSACTIONS on Information
Y1 - December 2006
AB - There are many kinds of control networks, which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automation). They are now introducing IP and face the issues of security and configuration complexity. The authors have proposed a model which intends to solve these issues while satisfying restrictions, i.e. small embedded devices, isolated networks and private naming system/name space, which are required when introducing new functionality into existing control networks. Secure bootstrap sequence and device-to-device communication using the chain of trust are the points of the model. This paper shows the practicability of the model through implementing the model experimentally.
ER -