2013 IEEE 18th Conference on Emerging Technologies &Amp; Factory Automation (ETFA) 2013
DOI: 10.1109/etfa.2013.6648104
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of an IT security layer in real-time communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…A shared understanding has emerged, that network segmentation for physical separation (so-called demilitarized zones DMZ) are not sufficient to mitigate all attack vectors. Another widespread industrial protocol besides PROFINET is Ethernet/IP, an open standard managed by ODVA 5 . In their security approach, integrity and confidentiality is addressed with the use of TLS and (D)TLS respectively while endpoint authentication can be realized with either pre-shared keys (PSK) or certificates (X.509v3) [3].…”
Section: Analyzing the Automation Systems Marketmentioning
confidence: 99%
See 1 more Smart Citation
“…A shared understanding has emerged, that network segmentation for physical separation (so-called demilitarized zones DMZ) are not sufficient to mitigate all attack vectors. Another widespread industrial protocol besides PROFINET is Ethernet/IP, an open standard managed by ODVA 5 . In their security approach, integrity and confidentiality is addressed with the use of TLS and (D)TLS respectively while endpoint authentication can be realized with either pre-shared keys (PSK) or certificates (X.509v3) [3].…”
Section: Analyzing the Automation Systems Marketmentioning
confidence: 99%
“…In fact, various automation field busses such as Ethernet/IP [3] and OPC UA TSN [4] have considered or even adopted security technology from the IT world. As part of the German research project "Sichere Produktion mit verteilten Automatisierungssystemen (SEC PRO )", the performance of security mechanisms as encryption and message authentication in real-time communication was evaluated [5], [6] as well as concepts for platform integrity, key distribution and a public key infrastructure were proposed [7], [8]. As in the SEC PRO study, PROFINET serves as representative technology in the field of real-time automation systems for our work, although the findings are valid for general real-time Ethernet based field bus technologies.…”
Section: Introductionmentioning
confidence: 99%
“…instead of adaptions on protocol level, measures as physical network segmentation as well as management processes for training and awareness-raising of employees are described. Focusing on protocol security, the performance of different components of an IT security layer for PROFINET as symmetric and asymmetric encryption and block cipher-as well as hash-based message authentication mechanisms was investigated in [3]. In a related publication, the performance of different message authentication code techniques was analyzed more detailed and compared to theoretical estimations [4].…”
Section: Introductionmentioning
confidence: 99%
“…Besides concepts for platform integrity, key distribution and a public key infrastructure [1], [2], the performance of symmetric and asymmetric cryptographic algorithms for confidentiality (encryption) as well as of hash-and block cipher based message authentication codes [3], [4] was evaluated. These results, collected in a final report [5], were rated according to a working assumption of a PROFINET systems with a configured cycle time of 1 ms.…”
Section: Introductionmentioning
confidence: 99%