欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ISA TR100 14 01 PART 1-2011 Trustworthiness in Wireless Industrial Automation Part I C Information for End Users and Regulators.pdf

    • 资源ID:789945       资源大小:574.25KB        全文页数:40页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ISA TR100 14 01 PART 1-2011 Trustworthiness in Wireless Industrial Automation Part I C Information for End Users and Regulators.pdf

    1、 TECHNICAL REPORT ISA-TR100.14.01-2011 Trustworthiness in Wireless Industrial Automation: Part I Information for End Users and Regulators Approved Date 26 May 2011 ISA-TR100.14.01-2011, Trustworthiness in Wireless Industrial Automation: Part I End Users and Regulators ISBN: 978-1-937560-14-0 Copyrig

    2、ht 2011 by ISA. Not for resale. Printed in the United States of America. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means (electronic mechanical, photocopying, recording, or otherwise), without the prior written permission of the

    3、 Publisher. ISA 67 Alexander Drive P.O. Box 12277 Research Triangle Park, North Carolina 27709 - 3 - ISA-TR100.14.01-2011, Part I Preface This preface, as well as all footnotes and annexes, is included for information purposes and is not part of ISA-TR100.14.01-2011, Part I. This document has been p

    4、repared as part of the service of ISA toward a goal of uniformity in the field of instrumentation. To be of real value, this document should not be static but should be subject to periodic review. Toward this end, the Society welcomes all comments and criticisms and asks that they be addressed to th

    5、e Secretary, Standards and Practices Board; ISA; 67 Alexander Drive; P. O. Box 12277; Research Triangle Park, NC 27709; Telephone (919) 549-8411; Fax (919) 549-8288; E-mail: standardsisa.org. The ISA Standards and Practices Department is aware of the growing need for attention to the metric system o

    6、f units in general, and the International System of Units (SI) in particular, in the preparation of instrumentation standards. The Department is further aware of the benefits to USA users of ISA standards of incorporating suitable references to the SI (and the metric system) in their business and pr

    7、ofessional dealings with other countries. Toward this end, this Department will endeavor to introduce SI-acceptable metric units in all new and revised standards, recommended practices, and technical reports to the greatest extent possible. Standard for Use of the International System of Units (SI):

    8、 The Modern Metric System, published by the American Society for Testing we clearly understand why you dont trust wireless for your Industrial Automation and Control System (IACS). There have been too many false starts and false claims in the past. The proclamations of ubiquitous sensing havent been

    9、 realized. But there is a lot happening in the broader “M2M“ world beyond industrial sensing that lays the groundwork. (See “When Everything Connects,” The Economist, April 28-May 4, 2007.) And does the jungle of wires shown in Figure 1 really seem like the best solution? There is a lot you can do n

    10、ow that makes good business sense. So what is preventing you from trusting wireless sensors for your IACS? 1. Reliability: Will the data you need be available when and where you need it? Will the maintenance of the wireless system be higher than the wired alternative? Will the additional capability

    11、you get be worth the risk and capital expenditure? You need assurance against unintended consequences as you make the transition. 2. Security: Will your data stay where it belongs? Will your IT department allow wireless in the facility? Will an intruder be able to take control of your processes? 3.

    12、Resiliency: When the system is disrupted, how long will it take to restore? Will it restore itself? Will your technicians be able to fix it? Will the system scale to fit your full implementation? Can early indications of an impending disruption be detected in time to compensate, mitigate, or pursue

    13、an alternate control strategy? ISA-TR100.14.01-2011, Part I - 8 - These three concerns form the backbone of this document and the core of trustworthiness. We will describe how and why modern wireless IACS can be at least as trustworthy as the wired systems you are used to. We will also describe some

    14、 of the ways wireless uniquely enables new capabilities that are not feasible with wires. If you think about wireless only as a one-for-one replacement for wires, you are missing the biggest reason to go wireless. Continue reading and learn how to address your concerns about using wireless sensors.

    15、We want your feedback, but most of all we want you to start using wireless sensors. Our purpose is to give you the tools you need to make informed decisions about whether to consider wireless in your industrial automation and control systems (IACS). We will neither tell you which wireless technology

    16、 to pursue, nor will we provide detailed trade-offs between alternative technologies. Rather, we will provide some background on the fundamental opportunities and challenges associated with wireless in the industrial environment and, we hope, enough knowledge to allow you to decide whether to push (

    17、or to support) your staff in evaluating wireless for particular applications in your organization. We are confident that wireless technology will become common in the IACS environment, but we believe prudence while we build and refine this technology is appropriate. We hope this document will contri

    18、bute to your understanding. - 9 - ISA-TR100.14.01-2011, Part I FOREWORD This document is the first of a pair of documents distinguished by the intended audiences. This document, Part I, is written primarily for the end user (owner) and regulator (includes all compliance authorities). A companion doc

    19、ument will be written primarily for manufacturers, vendors, designers, integrators, operators, and maintainers. That document, Part II, will contain more technical detail. This page intentionally left blank. - 11 - ISA-TR100.14.01-2011, Part I Table of Contents 1 Scope 13 2 Purpose . 13 3 Terms, def

    20、initions, and acronyms . 14 3.1 Terms and definitions 14 3.2 Acronyms 19 4 Introduction 20 4.1 Why is trustworthiness important? . 23 4.2 What is trustworthiness? . 23 4.3 What are the impediments to trusting wireless? 24 4.4 How will you know when you can trust wireless at the same level as wired I

    21、ACS? . 24 4.5 What can the end user do to overcome the impediments? 24 4.6 What can the regulator do to overcome the impediments? 25 4.7 Security of wireless transmissions . 25 4.8 Steps to achieving trustworthiness in wireless IACS. 26 5 Attributes of trustworthiness . 27 5.1 Reliability 28 5.2 Sec

    22、urity 29 5.3 Resiliency . 31 5.4 Designability . 32 5.5 The role of standards 34 6 Summary and review 36 6.1 The wireless advantage. 36 6.2 The pitfalls of wireless IACS 36 6.3 Trustworthiness in wireless 37 6.4 Wireless through the life cycle . 37 6.5 Next steps. 38 This page intentionally left bla

    23、nk. - 13 - ISA-TR100.14.01-2011, Part I Trustworthiness in Wireless Industrial Automation: Part I Information for End Users and Regulators 1 Scope This Part 1 Technical Report, in combination with the forthcoming Part 2, discusses trustworthiness associated with the use of wireless technology in ind

    24、ustrial automation systems. Specifically excluded are those attributes that may be in common with wired systems and are therefore covered elsewhere, or attributes that are specific to other application domains such as healthcare applications. Also excluded are those attributes associated with ancill

    25、ary issues such as health effects of RF or component materials (such as batteries). For this document, trustworthiness encompasses attributes associated with reliability, security and resiliency. 2 Purpose Trustworthiness in Wireless Industrial Automation is divided into two distinct parts. Part 1 (

    26、this document) provides introductory information for the end users and regulators; Part 2 will provide more thorough technical details associated with trustworthy wireless systems. Part 1 provides end users and regulators with information needed to understand the risks and advantages associated with

    27、 use of wireless systems. The result should be confident decisions about when and where to use them in order to realize the benefits they offer. It is also intended to provide those in a regulator role with sufficient background information to understand the implications and consequences of rules an

    28、d regulations that apply to use of wireless technology in industrial automation applications. The document contains introductory material and information intended to demonstrate to the reader that wireless is a viable solution today. The reader will find embedded in Part 1 a few technical bits of gu

    29、idance as an incentive to read Part 2. Part 1 introduces and uses technical terms to describe concepts that are common to many areas of computer technology and applications. The existence of multiple disciplines and communities which have developed their own approaches to deal with technical issues

    30、has produced a literature containing many different technical terms with considerable overlap in use and meaning. A set of terms has been adopted for Part 1 for purposes of presenting a consistent point of view. Detailed discussion of the choices of technical language and terminology is being deferr

    31、ed to Part 2. ISA-TR100.14.01-2011, Part I - 14 - 3 Terms, definitions, and acronyms 3.1 Terms and definitions 3.1.1 actuator a mechanical device for moving or controlling a mechanism or system and operated by a source of energy, usually in the form of an electric current, hydraulic fluid pressure o

    32、r pneumatic pressure, that converts that energy into some kind of motion 1 3.1.2 authentication verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system 2 3.1.3 authorization access privileges that are granted to an entity

    33、, conveying an official sanction to perform a function or activity 3 3.1.4 availability the ratio of time a system or component is functional to the total time it is required or expected to function. It can be expressed as a direct proportion, a percentage, or in terms of average downtime per a time

    34、 period (week, month, year). Availability is a key attribute supporting the notion of dependability. 4 3.1.5 confidentiality preserving authorized restrictions on information access and disclosure 2 3.1.6 data integrity guarding against improper modification or destruction (of data), and includes en

    35、suring information non-repudiation and authenticity 5 3.1.7 dependability likelihood that the service will be available when and where it is needed 6 NOTE Many standards working groups have debated use of this term. Among IEC working groups the term “reliability” is preferred instead. Reliability is

    36、 independent of use and has an extrinsic character in contrast to dependability which has an intrinsic character. 3.1.8 designability the characteristic of a component, system or subsystem expressing how effectively it can be deployed, scaled as needed during operation, then finally decommissioned a

    37、t its end of life 3 3.1.9 digital signature result of a cryptographic transformation of data that, when properly implemented, provides the services of source authentication; data integrity; - 15 - ISA-TR100.14.01-2011, Part I signer non-repudiation when the cryptographic transformation uses asymmetr

    38、ic-key cryptography 3 NOTE In a general information security context, an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchan

    39、ged 7 3.1.10 direct-sequence spread spectrum (DSSS) a spread-spectrum method of transmitting signals in which the data signal at the sending station is combined with a higher data rate bit sequence, or chipping code, that divides the user data according to a spreading ratio. The chipping code is a r

    40、edundant coding technique that allows the original data to be recovered if damaged during transmission. 8 3.1.11 encryption a process which is applied to data and alters it to make it more difficult to read and/or interpret without knowing how to decode it 8 NOTE In cryptography, encryption is the p

    41、rocess of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. 9 3.1.12 end user the person or organization for whom a hardware or software product is designed (

    42、used to distinguish from developers, installers, and maintainers) 10 3.1.13 frequency-hopping spread spectrum (FHSS) a spread-spectrum method of transmitting signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver 11

    43、3.1.14 hybrid spread spectrum a combination of frequency-hopping spread spectrum and direct-sequence spread spectrum 12 3.1.15 latency delay from when data is created at a data source device to when it is available to be consumed at the destination device 3 NOTE The designated points may be a) physi

    44、cal devices, or b) layer boundaries within multi-layer software (e.g., from sending transport to receiving transport functionality, or from sending application to sending modem. 3.1.16 life cycle phases a logical sequence of activities in project management or product development to accomplish a set

    45、 of goals or objectives. The number of phases in a sequence depends on the system or activity but contains elements of planning, deployment, operation and maintenance, and disposition. 13 3.1.17 maintainability a characteristic expressed as the probability that an item can be retained in or restored

    46、 to a specified condition within a given period of time 14 ISA-TR100.14.01-2011, Part I - 16 - 3.1.18 mesh topology network configuration in which redundant physically-diverse routing paths are available between each pair of network nodes 3 3.1.19 public-key encryption a cryptographic system requiri

    47、ng two separate keys, one to lock or encrypt the unencrypted data, and one to unlock or decrypt the encrypted data 15 NOTE Neither key will do both functions. One of these keys is published (or public) and the other is kept private. If the lock/encryption key is the one published then the system ena

    48、bles private communication from the public to the unlocking keys owner. If the unlock/decryption key is the one published then the system serves as a signature verifier of documents locked by the owner of the private key. 15 3.1.20 recoverability ability to respond to disruption expressed as the rat

    49、io of time interval between failures (a measure of reliability) and the interval of time from the moment of failure to restoration of operations (a measure of maintainability) 8 3.1.21 regulator official, agency or organization that controls a particular activity and makes certain that regulations are complied with 16 3.1.22 reliability probability that a system performs all required functions under stated conditions for a specified period of time 17 3.1.23 resiliency ability of a system to accommodate significant changes in


    注意事项

    本文(ISA TR100 14 01 PART 1-2011 Trustworthiness in Wireless Industrial Automation Part I C Information for End Users and Regulators.pdf)为本站会员(syndromehi216)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开