ZyXEL Communications PLA-470 V2 - V3.0.5 Instalační příručka Strana 80

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 349
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 79
CHAPTER 4
Security
Security has been the main problem for Wi-Fi networks. In the case of PLC, this is
not so much of a concern as it is difficult to have access to the physical medium. In
Wi-Fi, as the transmission medium used is radio, anyone in the network coverage
area can intercept its traffic or even reconfigure the network at will. Although the
PLC electrical wiring is also a medium shared by the various network devices, it is
much more difficult to have access to it and it involves major dangers due to the
presence of the 110-220 V/50-60 Hz signal.
However, since the electrical network has a universal extension, the wiring
propagates the PLC signal outside the limits of the private electrical network in a
conducted or radiated way, which implies the implementation of suitable software
security levels.
Current PLC networks can be secured in the same manner as high bit rate wired
fixed networks. Any threat can be eliminated by adding authentication servers or
secured tunnels, for example.
Security is a major issue for the deployment of local area networks in compa-
nies, where the development of IP telephony applications is sustained. In such a
background, it is essential to have reliable security mechanisms to avoid any unau-
thorized listening to communications.
Overview of Network Security Issues
As with any other network, PLC can be subjected to various types of attacks either
to interfere with PLC operation or to intercept the transmitted information. How-
ever, the advantage of PLC networks comes from the medium they use the electri-
cal wiring, which makes them particularly resistant to attacks since they are not
easily accessible. To avoid any information disclosure, the network traffic must be
encrypted in such a way that anyone not belonging to a PLC logical network cannot
recover and decipher it.
In addition to eavesdropping, the main attacks to which a network can be sub-
jected are those that aim at preventing its operation until it collapses or at having
access to it and reconfiguring it as wished.
The only counterattacks in response to these types of attacks are cryptography,
which prevents intruders from having access to data exchanged over the network;
authentication, which allows the identification and authorization of anybody wishing
61
Zobrazit stránku 79
1 2 ... 75 76 77 78 79 80 81 82 83 84 85 ... 348 349

Komentáře k této Příručce

Žádné komentáře