Ubiquitous computing asks for ubiquitous line of defense
dc.contributor.author | Stecklina, Oliver | |
dc.contributor.author | Langendörfer, Peter | |
dc.contributor.editor | Heiß, Hans-Ulrich | |
dc.contributor.editor | Pepper, Peter | |
dc.contributor.editor | Schlingloff, Holger | |
dc.contributor.editor | Schneider, Jörg | |
dc.date.accessioned | 2018-11-27T10:00:18Z | |
dc.date.available | 2018-11-27T10:00:18Z | |
dc.date.issued | 2011 | |
dc.description.abstract | This paper gives an overview of security challenges and approaches for Cyber-Physical Systems (CPS). CPSs are systems, e.g. in industrial or medical environments, which connect physical elements to a public accessible network. By using a wireless communication or internet routes physical fences are not longer a sufficient barrier against malicious users or attackers. Classical approaches like IP-based firewall or Intrusion Detection Systems (IDS) can not be used one-to-one for this class of networks. The limited resources of sensors and actuators as well as real-time requirements ask for new approaches. Furthermore the approaches must run on the node itself due to its unattended operation. This paper discusses very recent approaches towards security in CPSs. | en |
dc.identifier.isbn | 978-88579-286-4 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/18832 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | INFORMATIK 2011 – Informatik schafft Communities | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-192 | |
dc.title | Ubiquitous computing asks for ubiquitous line of defense | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 109 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 109 | |
gi.conference.date | 4.-7. Oktober 2011 | |
gi.conference.location | Berlin | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1