2009 IEEE Conference on Emerging Technologies &Amp; Factory Automation 2009
DOI: 10.1109/etfa.2009.5347205
|View full text |Cite
|
Sign up to set email alerts
|

Introducing security modules in PROFINET IO

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…Doing it in this way, the cryptographic keys are assigned in the same way, using the same engineering tool, as IP-addresses for PROFINET IO field devices. Security Modules uses the same concept [5], and this enables a simple key distribution mechanism for PROFINET IO and WirelessHART. Figure 9 illustrates the on-demand key distribution process.…”
Section: E On-demand Configuration Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Doing it in this way, the cryptographic keys are assigned in the same way, using the same engineering tool, as IP-addresses for PROFINET IO field devices. Security Modules uses the same concept [5], and this enables a simple key distribution mechanism for PROFINET IO and WirelessHART. Figure 9 illustrates the on-demand key distribution process.…”
Section: E On-demand Configuration Datamentioning
confidence: 99%
“…In [5],Åkerberg and Björkman presented the first and important concept of Security Modules as a method of retrofitting network security in PROFINET IO. This paper uses the same approach of distributing cryptographic keys from the DCS to the WirelessHART network.…”
Section: Introductionmentioning
confidence: 99%
“…Doing it in this way, the cryptographic keys are assigned in the same way, using the same engineering tool, as IPaddresses for Profinet IO field devices without any changes in the Profinet IO standard. security modules use the same concept [41], and this enables a simple key distribution mechanism for Profinet IO and WirelessHART. Distribution of security-relevant data should in general be transmitted with additional protection compared to for example IP-addresses.…”
Section: B On-demand Configuration Datamentioning
confidence: 99%
“…In order to retrofit security in Profinet IO we introduce a concept called security modules [41]. In this work, we have chosen the aforementioned technologies, but other technologies can also be used, since our proposed framework is technology independent.…”
Section: Seamless Integration Of Safe and Secure Wired/ Wireless Commmentioning
confidence: 99%
See 1 more Smart Citation