Abstract
Today’s industrial market is global. Manufacturing and measuring products are geographically distributed all over the world. Furthermore, the products are sophisticated and include know-how, often in the form of software. Thus the manufacturer is often the only party that can provide the maintenance services. In this paper, we focus on single intelligent and resource limited devices, which need to be remotely monitored or controlled. With the global Internet, satellite and telephone networks the access itself becomes possible. However, security is a challenge, because the remote devices’ limited resources are pitted against threats from the Internet. We discuss the assets of and threats against a globally distributed industrial information system. To protect the assets, three possible security architectures, Centralized connections, Layered architecture and Integration of centralized and layered architecture, are proposed. Of these three, the integrated architecture meets best the requirements of a globally distributed industrial information system.
Chapter PDF
References
Anderson, Ross (2001). Security Engineering. John Wiley & Sons, USA.
Caelli, William J., Dawson, Edward P., and Rea, Scott A. (1999). PKI, elliptic curve cryptography, and digital signatures. Computers & Security, 18:47–66.
Chang, Dung (2002). Security along the path through gprs towards 3g mobile telephone network data services, version 1.3. SANS Institute 2002, As part of the Information Security Reading Room, referenced 27.9.2003.
ETSI, European Telecommunications Standards Institute. GSM calls even more secure — thanks to new A5/3 algorithm, referenced 17.10.2003.
Naedele, Martin. IT security for safety-critical automation systems. ABB.
Rautpalo, Jussi (2000). GPRS security — secure remote connections over GPRS. Technical University of Helsinki, Department of Computer Science, referenced 27.9.2003.
Schwartau, Winn (2001). Network security it’s about time: An offer for a metric. Network Security, 2001:11–13.
Vaisala. National lightning detection network, referenced 24.10.2003.
Vanstone, S.A. (2003). Next generation security for wireless: elliptic curve cryptography. Computers & Security, 22:412–415.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 IFIP International Federation for Information Processing
About this paper
Cite this paper
Saloma, P., Addams-Moring, R., Virtanen, T. (2004). Security in Globally Distributed Industrial Information Systems. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds) Security and Protection in Information Processing Systems. SEC 2004. IFIP — The International Federation for Information Processing, vol 147. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8143-X_8
Download citation
DOI: https://doi.org/10.1007/1-4020-8143-X_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-8016-1
Online ISBN: 978-1-4020-8143-9
eBook Packages: Springer Book Archive