
Please use this identifier to cite or link to this item:
https://repositori.mypolycc.edu.my/jspui/handle/123456789/9785Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Hima Bindu Lekkala | - |
| dc.contributor.author | Vishnu Vardhan Bandari | - |
| dc.date.accessioned | 2026-04-24T07:09:44Z | - |
| dc.date.available | 2026-04-24T07:09:44Z | - |
| dc.date.issued | 2024-01 | - |
| dc.identifier.issn | 2940-6442 | - |
| dc.identifier.other | DOI: https://doi.org/10.17605/OSF.IO/2BZD8 | - |
| dc.identifier.uri | https://repositori.mypolycc.edu.my/jspui/handle/123456789/9785 | - |
| dc.description.abstract | It is challenging to secure communication of systems like these, which span home automation, industrial, and automotive applications, and include a multitude of protocols, limited resources, and sometimes high demands in real-time. It is possible to use the idea of a detached MAC to guarantee the genuineness and security of data transfers between nodes in a network. This is especially helpful for older, less modern parts of the network that are still actively communicating with one another. The article explains the technology's workings via the lens of an evaluation simulation model. In it, the likelihood of discovering an attack is laid out to the message authenticating overhead. Confidentiality, integrity, and authenticity are three of the most important security concerns of data transferred in IACSS when subjected to deception attacks. System stability and performance may be severely compromised by deception attacks. To safeguard IACSS against these threats, this study presents a secure transmission method that combines the DES algorithm, the MD5 algorithm, and a timestamp technique. Data sent between the controller and the plant may be securely encrypted and decrypted using DES. To ensure that the data is valid and intact, the MD5 algorithm and a timestamp are used. All control factors are considered by the model, which uses random data flow for measurements. Even with a little communication overhead, the statistical analysis shows that a high assault detection rate is achievable. To prove that the suggested methods work, we conducted tests where we controlled the velocity of a DC motor via the Internet. | ms_IN |
| dc.language.iso | en | ms_IN |
| dc.publisher | IAEME Publication | ms_IN |
| dc.relation.ispartofseries | International Journal of Manufacturing, Materials, and Mechanical Engineering (IJMMME);Volume 2, Issue 1 | - |
| dc.subject | Message Authentication Codes (MAC) | ms_IN |
| dc.subject | Secure data transmission | ms_IN |
| dc.subject | Industrial automation and control systems | ms_IN |
| dc.subject | DES | ms_IN |
| dc.subject | MD5 | ms_IN |
| dc.title | SECURE DATA TRANSMISSION AND MESSAGE AUTHENTICATION CODES FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS | ms_IN |
| dc.type | Article | ms_IN |
| Appears in Collections: | JABATAN KEJURUTERAAN MEKANIKAL | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| SECURE DATA TRANSMISSION AND MESSAGE AUTHENTICATION CODES.pdf | 598.76 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
