Serial Communication Protocol With Enhanced Properties-Securing Communication Layer for Smart Sensors Applications

The essential component of all the control and sensory systems is a communication layer. The MODBUS protocol used in automation and sensory industry defines a simple format of communication using the master/slave principle, although since it originated in the 1970 it has become obsolete. In this pap...

Full description

Saved in:
Bibliographic Details
Published in:IEEE sensors journal Vol. 19; no. 1; pp. 378 - 390
Main Authors: Dudak, Juraj, Gaspar, Gabriel, Sedivy, Stefan, Fabo, Peter, Pepucha, Lubomir, Tanuska, Pavol
Format: Journal Article
Language:English
Published: New York IEEE 01.01.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:1530-437X, 1558-1748
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The essential component of all the control and sensory systems is a communication layer. The MODBUS protocol used in automation and sensory industry defines a simple format of communication using the master/slave principle, although since it originated in the 1970 it has become obsolete. In this paper, is presented the uBUS protocol as an enhancement of the MODBUS protocol. uBUS protocol proposal brings advanced features for today's requirements for embedded applications. Enhancements include address extension to 4079 addresses, adding a new communication mode (group broadcast), delegating selected master features to slave, linking with other communication interfaces, and securing communications layer. The main part of this paper deals with the description of design and implementation of the uBUS communication security. An RSA algorithm that uses asymmetric encryption was used to implement communication encryption. This paper presents a way of implementing such encryption and its effectiveness on various types of microcontrollers implementing uBUS slaves. Since the communication protocol security is designed as a separate layer, it is possible to implement different types of encryption.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1530-437X
1558-1748
DOI:10.1109/JSEN.2018.2874898