{"title":"基于安全的信息物理环境保护体系结构","authors":"M. Durresi, A. Durresi","doi":"10.1109/BWCCA.2015.66","DOIUrl":null,"url":null,"abstract":"We propose a Security based Cyber-Physical Architecture for Environment Protection (SCPAEP). Protecting the environment from many threats has become a priority worldwide. The existing sensor technologies enable the continuous monitoring of various environments parameters, such as air quality, waters, and many others. In this paper we propose a general Cyber-Physical architecture, tailored for environment protection, based on cellular networks to collect such sensors' information in real time. The cell phones can interact with the cellular network and the sensor networks at the same time. This unique ability can be leveraged to provide better authentication and security. We propose an architecture for these networks along with protocols that can be used to establish security.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Security Based Cyber-Physical Architecture for Environment Protection\",\"authors\":\"M. Durresi, A. Durresi\",\"doi\":\"10.1109/BWCCA.2015.66\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose a Security based Cyber-Physical Architecture for Environment Protection (SCPAEP). Protecting the environment from many threats has become a priority worldwide. The existing sensor technologies enable the continuous monitoring of various environments parameters, such as air quality, waters, and many others. In this paper we propose a general Cyber-Physical architecture, tailored for environment protection, based on cellular networks to collect such sensors' information in real time. The cell phones can interact with the cellular network and the sensor networks at the same time. This unique ability can be leveraged to provide better authentication and security. We propose an architecture for these networks along with protocols that can be used to establish security.\",\"PeriodicalId\":193597,\"journal\":{\"name\":\"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BWCCA.2015.66\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2015.66","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Based Cyber-Physical Architecture for Environment Protection
We propose a Security based Cyber-Physical Architecture for Environment Protection (SCPAEP). Protecting the environment from many threats has become a priority worldwide. The existing sensor technologies enable the continuous monitoring of various environments parameters, such as air quality, waters, and many others. In this paper we propose a general Cyber-Physical architecture, tailored for environment protection, based on cellular networks to collect such sensors' information in real time. The cell phones can interact with the cellular network and the sensor networks at the same time. This unique ability can be leveraged to provide better authentication and security. We propose an architecture for these networks along with protocols that can be used to establish security.