TY - GEN N2 - Industrial communication protocols have historically lacked the basic security mechanisms standard in IT and Internet environments. With the increasing prevalence of cyberattacks on industrial control systems, standards bodies have begun to add security mechanisms to their protocols. The list of protocols that have added significant security mechanisms is diverse and growing, including OPC UA®, EtherNet/IP™, HART, PROFINET®, and more. This is an overwhelmingly positive accomplishment that significantly reduces the common vulnerabilities and exposures of industrial systems. However, defining the cybersecurity protections in a standard is one thing, challenges remain for the benefits to be realized in real world applications. A major challenge is the development of OT hardware capable of achieving high-performance, yet secure, communication which will adhere to that necessary deterministic I/O monitoring and control requirements of OT applications. This paper explores the current landscape of security protocols as well as advancements in OT hardware. DO - 10.24868/10711 DO - doi AB - Industrial communication protocols have historically lacked the basic security mechanisms standard in IT and Internet environments. With the increasing prevalence of cyberattacks on industrial control systems, standards bodies have begun to add security mechanisms to their protocols. The list of protocols that have added significant security mechanisms is diverse and growing, including OPC UA®, EtherNet/IP™, HART, PROFINET®, and more. This is an overwhelmingly positive accomplishment that significantly reduces the common vulnerabilities and exposures of industrial systems. However, defining the cybersecurity protections in a standard is one thing, challenges remain for the benefits to be realized in real world applications. A major challenge is the development of OT hardware capable of achieving high-performance, yet secure, communication which will adhere to that necessary deterministic I/O monitoring and control requirements of OT applications. This paper explores the current landscape of security protocols as well as advancements in OT hardware. AD - Rockwell Automation AD - Rockwell Automation T1 - Industrial Protocol Security and Control System Performance: How Hardware Techniques Can Mitigate Performance Impacts of Cryptography DA - 2022-09-07 AU - Visoky, J AU - Johnson, W L1 - https://library.imarest.org/record/10711/files/10711.pdf JF - Conference Proceedings of iSCSS VL - iSCSS 2022 PY - 2022-09-07 ID - 10711 L4 - https://library.imarest.org/record/10711/files/10711.pdf KW - Cybersecurity KW - Industrial Protocols KW - Security Hardware KW - Cryptography TI - Industrial Protocol Security and Control System Performance: How Hardware Techniques Can Mitigate Performance Impacts of Cryptography Y1 - 2022-09-07 L2 - https://library.imarest.org/record/10711/files/10711.pdf LK - https://www.imarest.org/events/category/categories/imarest-event/international-ship-control-systems-symposium-2022 LK - https://library.imarest.org/record/10711/files/10711.pdf UR - https://www.imarest.org/events/category/categories/imarest-event/international-ship-control-systems-symposium-2022 UR - https://library.imarest.org/record/10711/files/10711.pdf ER -