Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mario Crevatin is active.

Publication


Featured researches published by Mario Crevatin.


Proceedings of the IEEE | 2005

Security for Industrial Communication Systems

Dacfey Dzung; M. Naedele; T.P. Von Hoff; Mario Crevatin

Modern industrial communication networks are increasingly based on open protocols and platforms that are also used in the office IT and Internet environment. This reuse facilitates development and deployment of highly connected systems, but also makes the communication system vulnerable to electronic attacks. This paper gives an overview of IT security issues in industrial automation systems which are based on open communication systems. First, security objectives, electronic attack methods, and the available countermeasures for general IT systems are described. General security objectives and best practices are listed. Particularly for the TCP/IP protocol suite, a wide range of cryptography-based secure communication protocols is available. The paper describes their principles and scope of application. Next, we focus on industrial communication systems, which have a number of security-relevant characteristics distinct from the office IT systems. Confidentiality of transmitted data may not be required; however, data and user authentication, as well as access control are crucial for the mission critical and safety critical operation of the automation system. As a result, modern industrial automation systems, if they include security measures at all, emphasize various forms of access control. The paper describes the status of relevant specifications and implementations for a number of standardized automation protocols. Finally, we illustrate the application of security concepts and tools by brief case studies describing security issues in the configuration and operation of substations, plants, or for remote access.


emerging technologies and factory automation | 2003

HTTP digest authentication in embedded automation systems

T.P. von Hoff; Mario Crevatin

In automation systems, embedded web servers are often used for human machine interface (HMI) functionalities. Using the TCP/IP stack as communication protocol suite opens new opportunities to access the embedded web server. Therefore, an embedded web-server based HMI is very suitable for remote services as configuring, monitoring and control. However, a remote access requires security procedures. A security protocol that is able to deal with the limited resources of an embedded web server is HTTP (hypertext transfer protocol) digest access authentication (DAA). It provides a secure challenge/response mechanism for user authentication. Apart from this, its definition has foreseen other features which are not implemented in currently available servers, but could be very valuable to extend the application range of DAA. This paper outlines the general functionality of digest authentication defined by its RFC and investigates the most widely distributed implementations on server and browser side. The results of functionality and interoperability tests are presented.


Archive | 2001

Method and computer program for producing a regulator or controller

Mario Crevatin


Archive | 2006

Valve positioner, has electro-pneumatic valves controlled by electronics, and transducer provided for converting compressed air mass flow into electrical energy for supplying electronics with electrical energy

Mario Crevatin; Alexander Fach; Detlef Pape


Archive | 2003

Configuration system for network appliances, and a method for reconfiguration of appliances

Bernhard Deck; Mario Crevatin; Catherine Körbächer; Hans-Peter Züger; Paul Rudolf


Archive | 2003

Installation of a protecftive function in a protective device for an electrical power distribution network

Bernhard Deck; Mario Crevatin; Catherine Körbächer; Hans-Peter Züger; Paul Rudolf


Archive | 2003

Method for remotely controlling and/or regulating a system

Florian Straub; Thomas von Hoff; Mario Crevatin; Hans-Peter Züger; Bernhard Deck


Archive | 2000

Method and computer program for generating a regulation or control system

Mario Crevatin


Archive | 2002

Methods for remote controlling of a system

Florian Straub; Hoff Thomas Von; Mario Crevatin; Hans Peter Züger


The Industrial Information Technology Handbook | 2005

HTTP Digest Authentication - Theory and Practice.

Thomas von Hoff; Mario Crevatin

Collaboration


Dive into the Mario Crevatin's collaboration.

Researchain Logo
Decentralizing Knowledge