期刊论文详细信息
Symmetry
Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information
Aamir Shahzad2  Malrey Lee2  Young-Keun Lee1  Suntae Kim5  Naixue Xiong4  Jae-Young Choi6  Younghwa Cho6  Young-Sik Jeong3  Laurence T. Yang3 
[1] Department of Orthopedic Surgery, Chonbuk National University Hospital, Jeonju, Jeonbuk 561-721, Korea;Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chonbuk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea; E-Mail:;Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chonbuk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea; E-Mail;School of Computer Science, Colorado Technical University, 4435 North Chestnut Street, Colorado Spring, CO 80907, USA; E-Mail:;Department of Software Engineering, Chonbuk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea; E-Mail:;College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Korea; E-Mails:
关键词: symmetric encryption;    asymmetric encryption;    hashing;    cryptography buffer;   
DOI  :  10.3390/sym7031176
来源: mdpi
PDF
【 摘 要 】

Information technology (IT) security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.

【 授权许可】

CC BY   
© 2015 by the authors; licensee MDPI, Basel, Switzerland.

【 预 览 】
附件列表
Files Size Format View
RO202003190010140ZK.pdf 939KB PDF download
  文献评价指标  
  下载次数:0次 浏览次数:3次