Serial Communication Protocol With Enhanced Properties-Securing Communication Layer for Smart Sensors Applications

The essential component of all the control and sensory systems is a communication layer. The MODBUS protocol used in automation and sensory industry defines a simple format of communication using the master/slave principle, although since it originated in the 1970 it has become obsolete. In this pap...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE sensors journal Ročník 19; číslo 1; s. 378 - 390
Hlavní autoři: Dudak, Juraj, Gaspar, Gabriel, Sedivy, Stefan, Fabo, Peter, Pepucha, Lubomir, Tanuska, Pavol
Médium: Journal Article
Jazyk:angličtina
Vydáno: New York IEEE 01.01.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Témata:
ISSN:1530-437X, 1558-1748
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:The essential component of all the control and sensory systems is a communication layer. The MODBUS protocol used in automation and sensory industry defines a simple format of communication using the master/slave principle, although since it originated in the 1970 it has become obsolete. In this paper, is presented the uBUS protocol as an enhancement of the MODBUS protocol. uBUS protocol proposal brings advanced features for today's requirements for embedded applications. Enhancements include address extension to 4079 addresses, adding a new communication mode (group broadcast), delegating selected master features to slave, linking with other communication interfaces, and securing communications layer. The main part of this paper deals with the description of design and implementation of the uBUS communication security. An RSA algorithm that uses asymmetric encryption was used to implement communication encryption. This paper presents a way of implementing such encryption and its effectiveness on various types of microcontrollers implementing uBUS slaves. Since the communication protocol security is designed as a separate layer, it is possible to implement different types of encryption.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1530-437X
1558-1748
DOI:10.1109/JSEN.2018.2874898