Skip to main content

Confidential Transportation of Data on the Technical State of Facilities

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 286))

Abstract

Transfer of information, between both the operator and the technical object (machine, robot, network, etc.) is related to the transport of data. This process is realized through terminals and interfaces for fixed and mobile, simple and complex structures of the system (usually the networks, such as telecommunication network, IP network, etc.). The required level of security can be achieved during both development of new and modernization of existing technical objects. Exploitation of technical systems enforces use of confidentiality mechanisms such as those related to the IPSec (Internet Protocol Security), DM/VPN (Dynamic Multipoint/Virtual Private Network), VLAN (Virtual Local Area Network) or FW (Firewall). Therefore, the paper proposes a complementary model of secure data transport which can be applied in a decentralized data base containing information about the state of a technical object. The models of secure data transfer used by IPSec, VPN and VLAN have been tested in several scenarios reflecting the transfer of sensitive data in the industrial sector between the Authorized Service Stations and the Head Office of the company. Performance tests and the obtained results are resultant of repetitive output data obtained on the basis of numerous experiments.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Siergiejczyk, M., Krzykowska, K.: The analysis of implementation needs for automatic dependent surveillance in air traffic in Poland. In: Weintrit, A. (ed.) TransNav - The International Journal on Marine Navigation and Safety of Sea Transportation, pp. 241–245. CRCPress / Balkema Taylor & Francis Group, London (2013)

    Chapter  Google Scholar 

  2. Piotrowski, Z., Nowosielski, L., Zagozdzinski, L., Gajewski, P.: Electromagnetic compatibility of the military handset with hidden authorization function based on MIL-STD-461D results. In: Proceedings of the Piers 2008 Cambridge. Book Series: Progress in Electromagnetics Research Symposium, pp. 116–120 (2008)

    Google Scholar 

  3. Nowosielski, L., Wnuk, M., Ziolkowski, C.: Interlaboratory Tests in Scope of Measurement of Radio Disturbance. In: European Microwave Conference, Rome, Italy, vol. 1-3, pp. 288–291 (2009)

    Google Scholar 

  4. Laskowski, D., et al.: Filtration efficiency of traffic IP, ZNS’14, Poland (2013)

    Google Scholar 

  5. Jankowski, D., Laskowski, D.: Increasing the robustness of the telephone service of the heterogeneous environment with using open source solutions. In: Dependability and Computer Systems - DepCoS-RELCOMEX 2012, pp. 37–52. WUT, Wroclaw (2012)

    Google Scholar 

  6. Bajda, A., Wrażeń, M., Laskowski, D.: Diagnostics the quality of data transfer in the management of crisis situation. Electrical Review 87(9A), 72–78 (2011)

    Google Scholar 

  7. Lubkowski, P., Laskowski, D.: The end-to-end rate adaptation application for real-time video monitoring. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) New Results in Dependability & Comput. Syst. AISC, vol. 224, pp. 295–305. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  8. Chudzikiewicz, J., Zieliński, Z.: Reconfiguration of a processor cube-type network. Electrical Review (9), 139–145 (2010)

    Google Scholar 

  9. Kulesza, R., Zieliński, Z.: Diagnosis resolution of processors’ network using the comparison method. Electrical Review (9), 157–162 (2010)

    Google Scholar 

  10. RFC 2401 Security Architecture for the Internet Protocol, Obsolete by RFC 4301, RFC 2411 IP Security Document Roadmap, RFC 4301 Security Architecture for the Internet Protocol, IETF Working Group (2014), https://www.ietf.org/rfc.html

  11. Lenarczyk, P., Piotrowski, Z.: Parallel blind digital image watermarking in spatial and frequency domains. Telecommunication Systems 54, 287–303 (2013)

    Article  Google Scholar 

  12. Piotrowski, Z., Wojtuń, J., Kamiński, K.: Subscriber authentication using GMM and TMS320C6713DSP. Electrical Review 88, 127–130 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dariusz Laskowski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Laskowski, D., Łubkowski, P. (2014). Confidential Transportation of Data on the Technical State of Facilities. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30 – July 4, 2014, Brunów, Poland. Advances in Intelligent Systems and Computing, vol 286. Springer, Cham. https://doi.org/10.1007/978-3-319-07013-1_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07013-1_30

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07012-4

  • Online ISBN: 978-3-319-07013-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics