2023 IEEE 21st International Conference on Industrial Informatics (INDIN) 2023
DOI: 10.1109/indin51400.2023.10217985
|View full text |Cite
|
Sign up to set email alerts
|

PROFINET Security: A Look on Selected Concepts for Secure Communication in the Automation Domain

Andreas Walz,
Karl-Heinz Niemann,
Julian Göppert
et al.

Abstract: We provide a brief overview of the cryptographic security extensions for PROFINET, as defined and specified by PROFIBUS & PROFINET International (PI). These come in three hierarchically defined Security Classes, called Security Class 1, 2 and 3. Security Class 1 provides basic security improvements with moderate implementation impact on PROFINET components. Security Classes 2 and 3, in contrast, introduce an integrated cryptographic protection of PROFINET communication. We first highlight and discuss the secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…The use of symmetric cryptography requires the involved endpoints to hold a shared symmetric key for message protection. To proceed, a certificatebased mutually authenticated key agreement, certificates, private keys, and trust anchors are required in the IA components [10]. In order to have certificates, private keys, and trust anchors in IA components, the secure management of these artifacts is required throughout the whole life cycle of an IA component [11].…”
Section: Introductionmentioning
confidence: 99%
“…The use of symmetric cryptography requires the involved endpoints to hold a shared symmetric key for message protection. To proceed, a certificatebased mutually authenticated key agreement, certificates, private keys, and trust anchors are required in the IA components [10]. In order to have certificates, private keys, and trust anchors in IA components, the secure management of these artifacts is required throughout the whole life cycle of an IA component [11].…”
Section: Introductionmentioning
confidence: 99%