Abstract
Transfer of information, between both the operator and the technical object (machine, robot, network, etc.) is related to the transport of data. This process is realized through terminals and interfaces for fixed and mobile, simple and complex structures of the system (usually the networks, such as telecommunication network, IP network, etc.). The required level of security can be achieved during both development of new and modernization of existing technical objects. Exploitation of technical systems enforces use of confidentiality mechanisms such as those related to the IPSec (Internet Protocol Security), DM/VPN (Dynamic Multipoint/Virtual Private Network), VLAN (Virtual Local Area Network) or FW (Firewall). Therefore, the paper proposes a complementary model of secure data transport which can be applied in a decentralized data base containing information about the state of a technical object. The models of secure data transfer used by IPSec, VPN and VLAN have been tested in several scenarios reflecting the transfer of sensitive data in the industrial sector between the Authorized Service Stations and the Head Office of the company. Performance tests and the obtained results are resultant of repetitive output data obtained on the basis of numerous experiments.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Siergiejczyk, M., Krzykowska, K.: The analysis of implementation needs for automatic dependent surveillance in air traffic in Poland. In: Weintrit, A. (ed.) TransNav - The International Journal on Marine Navigation and Safety of Sea Transportation, pp. 241–245. CRCPress / Balkema Taylor & Francis Group, London (2013)
Piotrowski, Z., Nowosielski, L., Zagozdzinski, L., Gajewski, P.: Electromagnetic compatibility of the military handset with hidden authorization function based on MIL-STD-461D results. In: Proceedings of the Piers 2008 Cambridge. Book Series: Progress in Electromagnetics Research Symposium, pp. 116–120 (2008)
Nowosielski, L., Wnuk, M., Ziolkowski, C.: Interlaboratory Tests in Scope of Measurement of Radio Disturbance. In: European Microwave Conference, Rome, Italy, vol. 1-3, pp. 288–291 (2009)
Laskowski, D., et al.: Filtration efficiency of traffic IP, ZNS’14, Poland (2013)
Jankowski, D., Laskowski, D.: Increasing the robustness of the telephone service of the heterogeneous environment with using open source solutions. In: Dependability and Computer Systems - DepCoS-RELCOMEX 2012, pp. 37–52. WUT, Wroclaw (2012)
Bajda, A., Wrażeń, M., Laskowski, D.: Diagnostics the quality of data transfer in the management of crisis situation. Electrical Review 87(9A), 72–78 (2011)
Lubkowski, P., Laskowski, D.: The end-to-end rate adaptation application for real-time video monitoring. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) New Results in Dependability & Comput. Syst. AISC, vol. 224, pp. 295–305. Springer, Heidelberg (2013)
Chudzikiewicz, J., Zieliński, Z.: Reconfiguration of a processor cube-type network. Electrical Review (9), 139–145 (2010)
Kulesza, R., Zieliński, Z.: Diagnosis resolution of processors’ network using the comparison method. Electrical Review (9), 157–162 (2010)
RFC 2401 Security Architecture for the Internet Protocol, Obsolete by RFC 4301, RFC 2411 IP Security Document Roadmap, RFC 4301 Security Architecture for the Internet Protocol, IETF Working Group (2014), https://www.ietf.org/rfc.html
Lenarczyk, P., Piotrowski, Z.: Parallel blind digital image watermarking in spatial and frequency domains. Telecommunication Systems 54, 287–303 (2013)
Piotrowski, Z., Wojtuń, J., Kamiński, K.: Subscriber authentication using GMM and TMS320C6713DSP. Electrical Review 88, 127–130 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Laskowski, D., Łubkowski, P. (2014). Confidential Transportation of Data on the Technical State of Facilities. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30 – July 4, 2014, Brunów, Poland. Advances in Intelligent Systems and Computing, vol 286. Springer, Cham. https://doi.org/10.1007/978-3-319-07013-1_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-07013-1_30
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07012-4
Online ISBN: 978-3-319-07013-1
eBook Packages: EngineeringEngineering (R0)