Auflistung nach Autor:in "Kirdan, Erkin"
1 - 2 von 2
Treffer pro Seite
Sortieroptionen
- TextdokumentFeature-based Comparison of Open Source OPC-UA Implementations(INFORMATIK 2020, 2021) Mühlbauer, Nikolas; Kirdan, Erkin; Pahl, Marc-Oliver; Waedt, KarlOPC UA is an industry-standard architecture for automation, process controlling and monitoring. It is a detailed and complex machine-to-machine communication protocol which makes it challenging to implement. The complexity of the protocol leads to heterogeneity among implementations. Today, there are several open-source implementations without a compliance certificate accredited by the OPC Foundation. Certified implementations undergo various tests to fulfil interoperability. Every implementation fits different use-cases and requirements as each of them comes with its own features. In this paper, we make a feature-based comparison of the most common open-source OPC UA implementations. We investigate their support for the essential features and functionalities. Furthermore, we evaluate their interoperability. Overall, our study shows that open-source implementations have good coverage of features and functionalities, especially open62541 and UA-.NETStandard. Furthermore, our tests show that they do not have any significant interoperability issue.
- TextdokumentSecure OPC UA Server configuration for smart charging stations(INFORMATIK 2021, 2021) Schindler, Josef; Kirdan, Erkin; Waedt, KarlDirect-To-Consumer (D2C) marketing recently gains popularity in society by bypassing unnecessary mediators and thus avoiding cost. In Information and Communication Technology (ICT) terms, it is comparable with Machine-To-Machine (M2M) communication overcoming additional mediators, i.e. remote servers. In this paper, we research M2M communication for battery boosted charging station. Therefore, we consider a setup comprising an OPC Unified Architecture (OPC UA) Client and OPC UA Server. The server represents the smart charging station, where the client can reserve time slots for charging sessions. In this paper, we answer how to facilitate this using the different services provided by OPC UA. Additionally, we apply an OPC UA Metasploit module on two differently - according to the function manuals - configured OPC UA Servers. Afterwards, we validate the results.