Show simple item record

dc.contributor.authorSchindler, Josef
dc.contributor.authorKirdan, Erkin
dc.contributor.authorWaedt, Karl
dc.contributor.editor
dc.date.accessioned2021-12-14T10:57:09Z
dc.date.available2021-12-14T10:57:09Z
dc.date.issued2021
dc.identifier.isbn978-3-88579-708-1
dc.identifier.issn1617-5468
dc.identifier.urihttp://dl.gi.de/handle/20.500.12116/37661
dc.description.abstractDirect-To-Consumer (D2C) marketing recently gains popularity in society by bypassing unnecessary mediators and thus avoiding cost. In Information and Communication Technology (ICT) terms, it is comparable with Machine-To-Machine (M2M) communication overcoming additional mediators, i.e. remote servers. In this paper, we research M2M communication for battery boosted charging station. Therefore, we consider a setup comprising an OPC Unified Architecture (OPC UA) Client and OPC UA Server. The server represents the smart charging station, where the client can reserve time slots for charging sessions. In this paper, we answer how to facilitate this using the different services provided by OPC UA. Additionally, we apply an OPC UA Metasploit module on two differently - according to the function manuals - configured OPC UA Servers. Afterwards, we validate the results.en
dc.language.isoen
dc.publisherGesellschaft für Informatik, Bonn
dc.relation.ispartofINFORMATIK 2021
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-314
dc.subjectMachine-To-Machine
dc.subjectOPC Unified Architecture
dc.subjectcybersecurity
dc.subjectpenetration testing
dc.subjectcharging station
dc.titleSecure OPC UA Server configuration for smart charging stationsen
mci.reference.pages1753-1757
mci.conference.sessiontitleStandardization Workshop on Industrial Automation and Control Systems (6thIACSWS’21)
mci.conference.locationBerlin
mci.conference.date27. September - 1. Oktober 2021
dc.identifier.doi10.18420/informatik2021-152


Files in this item

Thumbnail

Show simple item record