2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA) 2018
DOI: 10.1109/etfa.2018.8502670
|View full text |Cite
|
Sign up to set email alerts
|

PROFINET Real-Time Protection Layer: Performance Analysis of Cryptographic and Protocol Processing Overhead

Abstract: Recent times have seen an increasing demand for access to process-data from the field level through to the Internet. This vertical integration of industrial control systems into the IT infrastructure exhibits major drawbacks in the context of security. Such systems now suffer exposure to cyber security attacks well-known from the IT environment. Successful attacks on industrial control systems can lead to downtimes, malfunction of production machinery, cause financial damage and may present a hazard for human … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Various approaches to integrate cryptographic security into PROFINET have been proposed before. Some of them focus just on the cryptographic protection of cyclic realtime CRs [10], [29]. In contrast to the design of PROFINET Security (as sketched within this section), these approaches do not offer a protection of, e.g., device parametrization or other relevant CRs within a PROFINET AR (e.g., record services).…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Various approaches to integrate cryptographic security into PROFINET have been proposed before. Some of them focus just on the cryptographic protection of cyclic realtime CRs [10], [29]. In contrast to the design of PROFINET Security (as sketched within this section), these approaches do not offer a protection of, e.g., device parametrization or other relevant CRs within a PROFINET AR (e.g., record services).…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…The project [17] evaluated different MAC algorithms and their performance. In [18,19] the authors evaluate PROFINET in combination with transport layer security. The recent publications show that different approaches are possible to protect the PROFINET communication.…”
Section: Current State Of Technologymentioning
confidence: 99%