Implementing a performant security control for Industrial Ethernet

被引:0
作者
Giehl, Alexander [1 ]
Plaga, Sven [1 ]
机构
[1] Fraunhofer AISEC, Garching, Germany
来源
2018 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INFORMATION SECURITY (ICSPIS) | 2018年
关键词
Smart Manufacturing; Security; Industrie; 4.0; Powerlink; Message Authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is an increased concern in smart manufacturing, however, is often met with concerns from operational technology (OT) operators. Performance is paramount in OT communication and, thus, a higher risk is currently deemed acceptable. However, the probability for cyber attacks is rising as recent, successful attacks on factory communication demonstrate. In this work, we present a performant security protocol extension for usage in OT networks. It enables message authentication and data integrity while keeping the protocol overhead within real-time constraints. The protocol extension protects against attacks targeting communication of cyberphysical systems in a smart manufacturing environment. The availability of OT operations facing these attack vectors is, thus, guaranteed.
引用
收藏
页码:49 / 52
页数:4
相关论文
共 18 条
[1]  
Akerberg J., 2009, 2009 IEEE C EM TECHN, P1
[2]  
[Anonymous], 2018, CRYPT MECH REC KEY L
[3]  
[Anonymous], 2017, DESTECH T COMPUT SCI, DOI DOI 10.12783/DTCSE/CNSCE2017/8885
[4]  
[Anonymous], 2010, ENT CONTR SYST INT 1
[5]  
Baumgartner J., 2010, 12 REAL TIM LIN WORK
[6]  
Danielis P., 2014, IEEE Emerging Technology and Factory Automation, P1, DOI [10.1109/ETFA.2014.7005074, DOI 10.1109/ETFA.2014.7005074]
[7]  
Decotignie J.-D., 2009, IEEE IND ELECT MAGAZ, V3
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]  
Eckert C., 2013, IT SICHERHEIT KONZEP
[10]  
Henning K., 2013, Acatech - National Academy of Science and Engineering, DOI DOI 10.1080/00207543.2017.1308576