Cryptographic Authentication-Based Mechanism For Securing Secs/Gem Communications For Industry 4.0 Manufacturing
This thesis proposes SECS/GEM Security Mechanism (SGSM) that offers authentication, integrity, and protection against cyber-attacks. The proposed mechanism is compared with the standard SECS/GEM, Secured SECS/GEM, and SECS/GEMsec mechanisms in terms of processing time, control overhead, and resilien...
| Main Author: | Laghari, Shams Ul Arfeen |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/60474/ http://eprints.usm.my/60474/1/Pages%20from%20SHAMS%20UL%20ARFEEN%20LAGHARI%20-%20TESIS.pdf |
Similar Items
Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
by: Jaisan S M, Ashish
Published: (2024)
by: Jaisan S M, Ashish
Published: (2024)
The effect of Total Productive Management practices on manufacturing performance through SECS/GEM Standard for electronic contract manufacturing companies (TOC, Abstract, chapter 1 and Reference only)
by: Krishnamoorthy Renganathan,
Published: (2015)
by: Krishnamoorthy Renganathan,
Published: (2015)
A review of cloud security based on cryptographic mechanisms
by: Abd, Sura Khalil, et al.
Published: (2014)
by: Abd, Sura Khalil, et al.
Published: (2014)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
The rare gem that is Armstrong
by: Abd Razak, Dzulkifli
Published: (2009)
by: Abd Razak, Dzulkifli
Published: (2009)
Uncovering local gems
by: Soo, Gisele, et al.
Published: (2024)
by: Soo, Gisele, et al.
Published: (2024)
Privacy in medical emergency system: cryptographic and security aspects
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Webinar Cyber security and IR 4.0 Awareness
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Impacts of Industry 4.0 on Malaysian Manufacturing Industries
by: Lee, Wan Yee, et al.
Published: (2019)
by: Lee, Wan Yee, et al.
Published: (2019)
S-PkSec: an asymmetric key based security management scheme for sensor network operation
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
A secure cryptographic algorithm against side channel attacks
by: Abu, Nur Azman, et al.
Published: (2015)
by: Abu, Nur Azman, et al.
Published: (2015)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
Simplified E-Content system (SECS)
by: Oon, Seau Foong
Published: (2014)
by: Oon, Seau Foong
Published: (2014)
Review of lean manufacturing with IR4.0 in automotive industry
by: Dara, Affydah, et al.
Published: (2021)
by: Dara, Affydah, et al.
Published: (2021)
The Sec14 superfamily and mechanisms for crosstalk between lipid metabolism and lipid signaling
by: Bankaitis, V., et al.
Published: (2010)
by: Bankaitis, V., et al.
Published: (2010)
Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
Noise modulated cryptographic generation for use in UWB wireless communication
by: Yaacob, Siti Hazwani, et al.
Published: (2011)
by: Yaacob, Siti Hazwani, et al.
Published: (2011)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
A situation assessment and prediction mechanism for network security situation awareness
by: Leau, Yu Beng
Published: (2016)
by: Leau, Yu Beng
Published: (2016)
4-(sec-butylamino)-3-nitrobenzoic acid
by: Narendra Babu, Shivanagere Nagojappa, et al.
Published: (2009)
by: Narendra Babu, Shivanagere Nagojappa, et al.
Published: (2009)
Gem and rock artifacts at Pulau Kelumpang, Perak
by: Tan , Teong Hing, et al.
Published: (1990)
by: Tan , Teong Hing, et al.
Published: (1990)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
A balanced secure cryptographic algorithm against timing and side channel attacks
by: Abu, Nur Azman, et al.
Published: (2014)
by: Abu, Nur Azman, et al.
Published: (2014)
Industry 4.0
by: Mohamad, Azhar
Published: (2018)
by: Mohamad, Azhar
Published: (2018)
Finance 4.0
by: T., Senthil Kumar
Published: (2019)
by: T., Senthil Kumar
Published: (2019)
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
The readiness to adopt green intelligent and sustainable manufacturing for agriculture in industry 4.0
by: Hammad, Muhammad Yahya, et al.
Published: (2025)
by: Hammad, Muhammad Yahya, et al.
Published: (2025)
Extent of automation and the readiness for Industry 4.0 among Malaysian furniture manufacturers
by: Ratnasingam, J., et al.
Published: (2019)
by: Ratnasingam, J., et al.
Published: (2019)
Intention to adopt industry 4.0 technologies among dairy manufacturers in Malaysia
by: Wahab, Saeedi Sayed Abdul
Published: (2019)
by: Wahab, Saeedi Sayed Abdul
Published: (2019)
Driving Factors Of Industry 4.0 Readiness Among Manufacturing Smes In Malaysia
by: Annie, Wong Pooi Hang
Published: (2022)
by: Annie, Wong Pooi Hang
Published: (2022)
Paradisrupt 4.0 : Managing supply chain 4.0 disruption systems
by: Gulam Muhammad, Nur, et al.
Published: (2021)
by: Gulam Muhammad, Nur, et al.
Published: (2021)
ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
by: Radmand, Pedram, et al.
Published: (2010)
by: Radmand, Pedram, et al.
Published: (2010)
Universiti Sydney Juara Debat GEMS WUPID09
by: Universiti Putra Malaysia, Bahagian Komunikasi Korporat
Published: (2009)
by: Universiti Putra Malaysia, Bahagian Komunikasi Korporat
Published: (2009)
THE NATION LOST ANOTHER GEM: CONDOLENCES
FROM USM
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2017)
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2017)
Provider independent cryptographic tools
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
Smart manufacturing for industry 4.0 using Radio Frequency Identification (RFID) technology
by: Hakeem, Akinlabi A. A., et al.
Published: (2020)
by: Hakeem, Akinlabi A. A., et al.
Published: (2020)
Review paper: Enhancing manufacturing flexibility implementation through industry 4.0 technology
by: Mohd Ghazali, Maarof, et al.
Published: (2022)
by: Mohd Ghazali, Maarof, et al.
Published: (2022)
Constructing the impact of industry 4.0 on SMEs performance among Malaysian manufacturing organisation
by: Bali Mahomed, Anuar Shah, et al.
Published: (2019)
by: Bali Mahomed, Anuar Shah, et al.
Published: (2019)
Similar Items
-
Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
by: Jaisan S M, Ashish
Published: (2024) -
The effect of Total Productive Management practices on manufacturing performance through SECS/GEM Standard for electronic contract manufacturing companies (TOC, Abstract, chapter 1 and Reference only)
by: Krishnamoorthy Renganathan,
Published: (2015) -
A review of cloud security based on cryptographic mechanisms
by: Abd, Sura Khalil, et al.
Published: (2014) -
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016) -
The rare gem that is Armstrong
by: Abd Razak, Dzulkifli
Published: (2009)