TY - JOUR
T1 - A new cellular architecture for information retrieval from sensor networks through embedded service and security protocols
AU - Shahzad, Aamir
AU - Landry, René
AU - Lee, Malrey
AU - Xiong, Naixue
AU - Lee, Jongho
AU - Lee, Changhoon
N1 - Publisher Copyright:
© 2016 by the authors; licensee MDPI, Basel, Switzerland.
PY - 2016/6/14
Y1 - 2016/6/14
N2 - Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.
AB - Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.
KW - Cellular protocols and networks
KW - Embedded protocol security
KW - Human machine interface
KW - Information analysis and visualization
KW - Intelligent sensor networks
KW - Security issues
KW - Supervisory control and data acquisition system
KW - Transmission flows
UR - http://www.scopus.com/inward/record.url?scp=84974806813&partnerID=8YFLogxK
U2 - 10.3390/s16060821
DO - 10.3390/s16060821
M3 - Article
AN - SCOPUS:84974806813
SN - 1424-8220
VL - 16
JO - Sensors
JF - Sensors
IS - 6
M1 - 821
ER -