Cargando…
A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, a...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4934247/ https://www.ncbi.nlm.nih.gov/pubmed/27314351 http://dx.doi.org/10.3390/s16060821 |
_version_ | 1782441304078155776 |
---|---|
author | Shahzad, Aamir Landry, René Lee, Malrey Xiong, Naixue Lee, Jongho Lee, Changhoon |
author_facet | Shahzad, Aamir Landry, René Lee, Malrey Xiong, Naixue Lee, Jongho Lee, Changhoon |
author_sort | Shahzad, Aamir |
collection | PubMed |
description | Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. |
format | Online Article Text |
id | pubmed-4934247 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-49342472016-07-06 A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols Shahzad, Aamir Landry, René Lee, Malrey Xiong, Naixue Lee, Jongho Lee, Changhoon Sensors (Basel) Article Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. MDPI 2016-06-14 /pmc/articles/PMC4934247/ /pubmed/27314351 http://dx.doi.org/10.3390/s16060821 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Shahzad, Aamir Landry, René Lee, Malrey Xiong, Naixue Lee, Jongho Lee, Changhoon A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols |
title | A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols |
title_full | A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols |
title_fullStr | A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols |
title_full_unstemmed | A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols |
title_short | A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols |
title_sort | new cellular architecture for information retrieval from sensor networks through embedded service and security protocols |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4934247/ https://www.ncbi.nlm.nih.gov/pubmed/27314351 http://dx.doi.org/10.3390/s16060821 |
work_keys_str_mv | AT shahzadaamir anewcellulararchitectureforinformationretrievalfromsensornetworksthroughembeddedserviceandsecurityprotocols AT landryrene anewcellulararchitectureforinformationretrievalfromsensornetworksthroughembeddedserviceandsecurityprotocols AT leemalrey anewcellulararchitectureforinformationretrievalfromsensornetworksthroughembeddedserviceandsecurityprotocols AT xiongnaixue anewcellulararchitectureforinformationretrievalfromsensornetworksthroughembeddedserviceandsecurityprotocols AT leejongho anewcellulararchitectureforinformationretrievalfromsensornetworksthroughembeddedserviceandsecurityprotocols AT leechanghoon anewcellulararchitectureforinformationretrievalfromsensornetworksthroughembeddedserviceandsecurityprotocols AT shahzadaamir newcellulararchitectureforinformationretrievalfromsensornetworksthroughembeddedserviceandsecurityprotocols AT landryrene newcellulararchitectureforinformationretrievalfromsensornetworksthroughembeddedserviceandsecurityprotocols AT leemalrey newcellulararchitectureforinformationretrievalfromsensornetworksthroughembeddedserviceandsecurityprotocols AT xiongnaixue newcellulararchitectureforinformationretrievalfromsensornetworksthroughembeddedserviceandsecurityprotocols AT leejongho newcellulararchitectureforinformationretrievalfromsensornetworksthroughembeddedserviceandsecurityprotocols AT leechanghoon newcellulararchitectureforinformationretrievalfromsensornetworksthroughembeddedserviceandsecurityprotocols |