On a more practical note
There are some really odd things done for things like remote monitoring of distributed assets, with for example special SIM cards and adapters generating legacy protocols at each end of link that is pretending to be wired 20mA loop or CanBus or something but is not really wired, in a way that may or may not be very secure.
In such a system one needs to include consideration of compromise of the physical assets - how much damage could someone do if they stole a monitoring unit from a remote location and then sometime later mis-used it to re-join the network as a subversive and either snooped or inserted false data.?
Mike.
On a more practical note
There are some really odd things done for things like remote monitoring of distributed assets, with for example special SIM cards and adapters generating legacy protocols at each end of link that is pretending to be wired 20mA loop or CanBus or something but is not really wired, in a way that may or may not be very secure.
In such a system one needs to include consideration of compromise of the physical assets - how much damage could someone do if they stole a monitoring unit from a remote location and then sometime later mis-used it to re-join the network as a subversive and either snooped or inserted false data.?
Mike.
We're about to take you to the IET registration website. Don't worry though, you'll be sent straight back to the community after completing the registration.
Continue to the IET registration site