2018 14th IEEE International Workshop on Factory Communication Systems (WFCS) 2018
DOI: 10.1109/wfcs.2018.8402338
|View full text |Cite
|
Sign up to set email alerts
|

Challenges and prospects of communication security in real-time ethernet automation systems

Abstract: Real-Time Ethernet has become the major communication technology for modern automation and industrial control systems. On the one hand, this trend increases the need for an automation-friendly security solution, as such networks can no longer be considered sufficiently isolated. On the other hand, it shows that, despite diverging requirements, the domain of Operational Technology (OT) can derive advantage from highvolume technology of the Information Technology (IT) domain. Based on these two sides of the same… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Bidirectional communications using the client/server model may use TLS between application slices deployed onto multiple devices. However, secure multicast communication is challenging in ICS when using Datagram TLS or IPSECbased virtual private networks [9]. Other challenges of applying TLS may include performance tradeoffs, channel multiplexing, constrained components, time synchronization.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Bidirectional communications using the client/server model may use TLS between application slices deployed onto multiple devices. However, secure multicast communication is challenging in ICS when using Datagram TLS or IPSECbased virtual private networks [9]. Other challenges of applying TLS may include performance tradeoffs, channel multiplexing, constrained components, time synchronization.…”
Section: Related Workmentioning
confidence: 99%
“…Selective protection of "data of interest" helps in better system performance while ensuring adequate security. In such cases, a blanket approach like TLS may induce latency overheads [9].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This is not only very time consuming but also may not be of highest priority since in most use cases the transmitted data may not be confidential. b) Implementation Principles: Almost all existing security solutions are designed and implemented for the use in standard office IT environment and therefore quite certainly not suitable for the usage in operation technology (OT) networks without adaption [10]. Nevertheless, solutions to protect PROFINET communication should build upon wellestablished and widespread standards.…”
Section: B Requirements Specificationmentioning
confidence: 99%
“…A body of work on optimizing PROFINET IRT for fast cycle times [6] states typical system boundaries of such applications: 8 to 256 Bytes payload and 250 µs cycle time with a 50:50 real-time to non-real-time traffic duty cycle. The challenges on finding suitable solutions for protecting PROFINET and general real-time Ethernet automation systems as well as corresponding requirements were investigated in [7], In Section II we elaborate the performance overhead produced by additional protocol fields for protecting PROFINET real-time traffic as well as a brief theoretical background on proposed cryptographic building blocks. Section III describes the ongoing work of the prototypal implementation of a security switch.…”
Section: Introductionmentioning
confidence: 99%