2019 IEEE 17th International Conference on Industrial Informatics (INDIN) 2019
DOI: 10.1109/indin41052.2019.8972209
|View full text |Cite
|
Sign up to set email alerts
|

IT security extensions for PROFINET

Abstract: The impact of vertical and horizontal integration in the context of Industry 4.0 requires new concepts for the security of industrial Ethernet protocols. The defense in depth concept, basing on the combination of several measures, especially separation and segmentation, needs to be complimented by integrated protection measures for industrial real-time protocols. To cover this challenge, existing protocols need to be equipped with additional functionality to ensure the integrity and availability of the network… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Security Class 2 and 3 extensions target cases where an (active or passive) attacker may inject, manipulate, or read messages on the network [20]. Currently, these types of attacks are countered by a zone concept, which strictly limits the access to network zones.…”
Section: B Discussion and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Security Class 2 and 3 extensions target cases where an (active or passive) attacker may inject, manipulate, or read messages on the network [20]. Currently, these types of attacks are countered by a zone concept, which strictly limits the access to network zones.…”
Section: B Discussion and Related Workmentioning
confidence: 99%
“…The security extensions improve this situation by providing state-of-the-art cryptographic protection for PROFINET messages. However, PROFINET Security is just one building block, and further measures (outside the scope of the PROFINET specification) are necessary for holistic security [15].…”
Section: B Discussion and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Such a process field bus, which is meant for interfacing decentralized peripherals, where can drastically reduce the wiring costs. However, one of the serious concerns in the Profibus is the authentication issues among the master and slave nodes in the network [365]. Moreover, they are also susceptible to DoS threats, which need isolation from the other devices in the network.…”
Section: ) Profibusmentioning
confidence: 99%
“…A useful performance comparison of eleven TLS cyphers suites is provided by [14]. Of the hard real time protocols in existence, [15] take issue with the security of EtherCAT and for PROFINET we observe a substantial time-gap between the initial voicing of concerns [16] and results from the relevant specification committees [17].…”
Section: B Relevant Workmentioning
confidence: 99%