TY - GEN AB - Industrial communication protocols have historically lacked the basic security mechanisms standard in IT and Internet environments. With the increasing prevalence of cyberattacks on industrial control systems, standards bodies have begun to add security mechanisms to their protocols. The list of protocols that have added significant security mechanisms is diverse and growing, including OPC UA®, EtherNet/IP™, HART, PROFINET®, and more. This is an overwhelmingly positive accomplishment that significantly reduces the common vulnerabilities and exposures of industrial systems. However, defining the cybersecurity protections in a standard is one thing, challenges remain for the benefits to be realized in real world applications. A major challenge is the development of OT hardware capable of achieving high-performance, yet secure, communication which will adhere to that necessary deterministic I/O monitoring and control requirements of OT applications. This paper explores the current landscape of security protocols as well as advancements in OT hardware. AD - Rockwell Automation AD - Rockwell Automation AU - Visoky, J AU - Johnson, W DA - 2022-09-07 DO - 10.24868/10711 DO - doi ID - 10711 JF - Conference Proceedings of iSCSS KW - Cybersecurity KW - Industrial Protocols KW - Security Hardware KW - Cryptography L1 - https://library.imarest.org/record/10711/files/10711.pdf L2 - https://library.imarest.org/record/10711/files/10711.pdf L4 - https://library.imarest.org/record/10711/files/10711.pdf LK - https://library.imarest.org/record/10711/files/10711.pdf N2 - Industrial communication protocols have historically lacked the basic security mechanisms standard in IT and Internet environments. With the increasing prevalence of cyberattacks on industrial control systems, standards bodies have begun to add security mechanisms to their protocols. The list of protocols that have added significant security mechanisms is diverse and growing, including OPC UA®, EtherNet/IP™, HART, PROFINET®, and more. This is an overwhelmingly positive accomplishment that significantly reduces the common vulnerabilities and exposures of industrial systems. However, defining the cybersecurity protections in a standard is one thing, challenges remain for the benefits to be realized in real world applications. A major challenge is the development of OT hardware capable of achieving high-performance, yet secure, communication which will adhere to that necessary deterministic I/O monitoring and control requirements of OT applications. This paper explores the current landscape of security protocols as well as advancements in OT hardware. PY - 2022-09-07 T1 - Industrial Protocol Security and Control System Performance: How Hardware Techniques Can Mitigate Performance Impacts of Cryptography TI - Industrial Protocol Security and Control System Performance: How Hardware Techniques Can Mitigate Performance Impacts of Cryptography UR - https://library.imarest.org/record/10711/files/10711.pdf VL - iSCSS 2022 Y1 - 2022-09-07 ER -