18
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

          Related collections

          Most cited references61

          • Record: found
          • Abstract: not found
          • Article: not found

          Wireless sensor network survey

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement

                Bookmark

                Author and article information

                Contributors
                Role: Academic Editor
                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                14 June 2016
                June 2016
                : 16
                : 6
                : 821
                Affiliations
                [1 ]École de Technologie Supérieure, 1100 Notre-Dame Street West, Montreal, QC H3C 1K3, Canada; mail2aamirshahzad@ 123456gmail.com (A.S.); renejr.landry@ 123456etsmtl.ca (R.J.L.)
                [2 ]Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chonbuk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea
                [3 ]Shanghai Key Lab of Modern Optical System, and Engineering Research Center of Optical Instrument and System, Ministry of Education, University of Shanghai for Science and Technology, No. 516 Jun Gong Road, Shanghai 200093, China
                [4 ]Department of Business and Computer Science, Southwestern Oklahoma State University, Oklahoma, OK 73096, USA
                [5 ]Department of Fire Service Administration, WonKwang University, Iksan 570-749, Korea
                [6 ]Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Seoul 01811, Korea; cryptography1@ 123456gmail.com
                Author notes
                [* ]Correspondence: xiongnaixue@ 123456gmail.com (N.X.); mrlee@ 123456chonbuk.ac.kr (M.L.); yijho@ 123456wku.ac.kr (J.L.); Tel.: +1-580-774-3751 (N.X.); +82-10-3611-8004 (M.L.); +82-63-270-3993 (J.L.)
                Article
                sensors-16-00821
                10.3390/s16060821
                4934247
                27314351
                586fce04-5c0f-4904-8969-c5cbb6f0ec31
                © 2016 by the authors; licensee MDPI, Basel, Switzerland.

                This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 09 April 2016
                : 27 May 2016
                Categories
                Article

                Biomedical engineering
                cellular protocols and networks,intelligent sensor networks,supervisory control and data acquisition system,security issues,embedded protocol security,information analysis and visualization,human machine interface,transmission flows

                Comments

                Comment on this article