TY  - GEN
AB  - Industrial communication protocols have historically lacked the basic security mechanisms standard in IT and Internet environments. With the increasing prevalence of cyberattacks on industrial control systems, standards bodies have begun to add security mechanisms to their protocols. The list of protocols that have added significant security mechanisms is diverse and growing, including OPC UA®, EtherNet/IP™, HART, PROFINET®, and more. This is an overwhelmingly positive accomplishment that significantly reduces the common vulnerabilities and exposures of industrial systems. However, defining the cybersecurity protections in a standard is one thing, challenges remain for the benefits to be realized in real world applications. A major challenge is the development of OT hardware capable of achieving high-performance, yet secure, communication which will adhere to that necessary deterministic I/O monitoring and control requirements of OT applications. This paper explores the current landscape of security protocols as well as advancements in OT hardware.
AD  - Rockwell Automation
AD  - Rockwell Automation
AU  - Visoky, J
AU  - Johnson, W
DA  - 2022-09-07
DO  - 10.24868/10711
DO  - doi
ID  - 10711
JF  - Conference Proceedings of iSCSS
KW  - Cybersecurity
KW  - Industrial Protocols
KW  - Security Hardware
KW  - Cryptography
L1  - https://library.imarest.org/record/10711/files/10711.pdf
L2  - https://library.imarest.org/record/10711/files/10711.pdf
L4  - https://library.imarest.org/record/10711/files/10711.pdf
LK  - https://library.imarest.org/record/10711/files/10711.pdf
N2  - Industrial communication protocols have historically lacked the basic security mechanisms standard in IT and Internet environments. With the increasing prevalence of cyberattacks on industrial control systems, standards bodies have begun to add security mechanisms to their protocols. The list of protocols that have added significant security mechanisms is diverse and growing, including OPC UA®, EtherNet/IP™, HART, PROFINET®, and more. This is an overwhelmingly positive accomplishment that significantly reduces the common vulnerabilities and exposures of industrial systems. However, defining the cybersecurity protections in a standard is one thing, challenges remain for the benefits to be realized in real world applications. A major challenge is the development of OT hardware capable of achieving high-performance, yet secure, communication which will adhere to that necessary deterministic I/O monitoring and control requirements of OT applications. This paper explores the current landscape of security protocols as well as advancements in OT hardware.
PY  - 2022-09-07
T1  - Industrial Protocol Security and Control System Performance: How Hardware Techniques Can Mitigate Performance Impacts of Cryptography
TI  - Industrial Protocol Security and Control System Performance: How Hardware Techniques Can Mitigate Performance Impacts of Cryptography
UR  - https://library.imarest.org/record/10711/files/10711.pdf
VL  - iSCSS 2022
Y1  - 2022-09-07
ER  -