Filters








19 Hits in 3.7 sec

Secure and Efficient Tunneling of MACsec for Modern Industrial Use Cases [article]

Tim Lackorzynski, Sebastian Rehms, Tao Li, Stefan Köpsell, Hermann Härtig
2022 arXiv   pre-print
A new and highly efficient protocol, that will be vital for that purpose, is MACsec. It is a Layer 2 encryption protocol that was previously extended specifically for industrial environments.  ...  Therefore, in this work, we propose a secure and efficient Layer 3 tunneling scheme for MACsec.  ...  of Saxony/Germany and by the German Research Foundation (DFG) as part of Germany's Excellence Strategy EXC 2050/1 -Project ID 390696704 -Cluster of Excellence Centre for Tactile Internet with Humanin-the-Loop  ... 
arXiv:2205.12748v1 fatcat:pwxlskhzqjh7znjyjphza7a43q

P4-MACsec: Dynamic Topology Monitoring and Data Layer Protection with MACsec in P4-Based SDN

Frederik Hauser, Mark Schmidt, Marco Haberle, Michael Menth
2020 IEEE Access  
Automated deployment of MACsec creates secure channels, generates keying material, and configures the P4 targets for each detected link between two P4 targets.  ...  We propose P4-MACsec to protect network links between P4-based SDN switches through automated deployment of MACsec, a widespread IEEE standard for securing Layer 2 infrastructures.  ...  ACKNOWLEDGMENT The authors would like to thank Joshua Hartmann for fruitful discussions and programming contributions.  ... 
doi:10.1109/access.2020.2982859 fatcat:tw5aigaemjawjhk4ctz27jiklm

MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane

Zeying Liu, Pengshuai Cui, Yongji Dong, Lei Xue, Yuxiang Hu
2022 Electronics  
Our aim is to provide a protocol-extensible protocol conversion and secure transmission integration mechanism, MultiSec, for heterogeneous converged networks.  ...  Experiments show that MultiSec successfully realizes multi-protocol conversion and data encryption, and the system performance is significantly improved with the help of an encryption card.  ...  In P4-MACsec [40] , the authors implement IEEE 802.1AE (MACsec) at P4 and introduce an automatic deployment mechanism to provide MACsec for links detected between P4 switches.  ... 
doi:10.3390/electronics11152389 fatcat:l27aqhddl5bxvbhi3db475jnoa

Interoperability and Security Challenges of Industry 4.0

Venesa Watson, Asmaa Tellabi, Jochen Sassmannahausen, Xinxin Lou
2017 Jahrestagung der Gesellschaft für Informatik  
Industrie 4.0 (I4.0) is the fourth industrial revolution, which will see the digital transformation of manufacturing, through the integration on Industrial Internet of Things (IIoT), Data and Services,  ...  For I4.0, these are interoperability and security, which respectively arise from the interconnection of devices from different manufacturers and/or with different communication protocols; and the interconnection  ...  in industrial automation for IT and OT integration, a basic requirement for realizing IIoT and I4.0 [TE16] .  ... 
doi:10.18420/in2017_100 dblp:conf/gi/WatsonTSL17 fatcat:m2cnswanlzdsfejcuuurii5kwq

A Survey on Data Plane Programming with P4: Fundamentals, Advances, and Applied Research [article]

Frederik Hauser, Marco Häberle, Daniel Merling, Steffen Lindner, Vladimir Gurevich, Florian Zeiger, Reinhard Frank, Michael Menth
2021 arXiv   pre-print
This offers great flexibility for network customization, be it for specialized, commercial appliances, e.g., in 5G or data center networks, or for rapid prototyping in industrial and academic research.  ...  Programming protocol-independent packet processors (P4) has emerged as the currently most widespread abstraction, programming language, and concept for data plane programming.  ...  ., for applying MACsec or IPsec on P4 data planes.  ... 
arXiv:2101.10632v3 fatcat:ci4hkca5ibdzpatgowhzqcqzvm

A Review of P4 Programmable Data Planes for Network Security

Ya Gao, Zhenling Wang, Sang-Bing Tsai
2021 Mobile Information Systems  
The schemes in each category are compared, and the core ideas and limitations are clarified. In addition, a detailed comparison is made for the research on the performance of P4 targets.  ...  Network attacks show a trend of increased attack intensity, enhanced diversity, and more concealed attack methods, which put forward higher requirements for the performance of network security equipment  ...  Jaqen designs switch-optimized, resource-efficient components for detection and mitigation.  ... 
doi:10.1155/2021/1257046 fatcat:qwbafyhmcrbvhlhalteq6dbwha

Security and Authentication Scheme for Software Defined Network

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Security and authentication scheme in SDN is being surveyed in this paper providing advances in this field to both the research community and the industry.  ...  Then start with a list of identified threats to security and SDN breaches. The article analyzes previously outlined security and authentication solutions for SDN.  ...  A basic architecture for OpenFlow consists of end hosts, a controller and switches enabled for OpenFlow.  ... 
doi:10.35940/ijitee.d1659.029420 fatcat:7zbrtmtfwfczbktzyhc4vkzc7e

A Survey of the Main Security Issues and Solutions for the SDN Architecture

Maria B. Jimenez, David Fernandez, Jorge Eduardo Rivadeneira, Luis Bellido, Andres Cardenas
2021 IEEE Access  
These design principles pave the way for a more flexible, fast, and dynamic software-controlled network.  ...  Although for several years, some studies have already focused on identifying the weaknesses of the SDN layer structure, the nature of the attacks, and possible solutions for this paradigm, the literature  ...  be a point of reflection for both academia and industry.  ... 
doi:10.1109/access.2021.3109564 fatcat:3htjngdhvvac3gkofhjlutxg2a

From 5G to 6G Technology: Meets Energy, Internet-of-Things and Machine Learning: A Survey

Mohammed Najah Mahdi, Abdul Rahim Ahmad, Qais Saif Qassim, Hayder Natiq, Mohammed Ahmed Subhi, Moamin Mahmoud
2021 Applied Sciences  
The main contribution of this work is to provide a more comprehensive perspective, challenges, requirements, and context for potential work in the 6G communication standard.  ...  Due to the rapid development of the fifth-generation (5G) applications, and increased demand for even faster communication networks, we expected to witness the birth of a new 6G technology within the next  ...  The requirement for integrated industrial management is a crucial component of innovation processes in the Fourth Industrial Revolution (Industrie 4.0).  ... 
doi:10.3390/app11178117 fatcat:4vtzn5cae5eqtnzobtvzysi6mm

A Brief Review on Internet of Things, Industry 4.0 and Cybersecurity

Roman Rudenko, Ivan Miguel Pires, Paula Oliveira, João Barroso, Arsénio Reis
2022 Electronics  
The advance of industrialization regarding the optimization of production to obtain greater productivity and consequently generate more profits has led to the emergence of Industry 4.0, which aims to create  ...  These devices are data sources that provide abundant information on manufacturing processes in an industrial environment.  ...  As for the exclusion criteria, duplicate articles were removed whose titles followed a different theme from the intended one, and abstract content which was not related.  ... 
doi:10.3390/electronics11111742 fatcat:rsnuf76gtfbpvejavve5vp2zly

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends [article]

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 arXiv   pre-print
This open-design paradigm is paving the way for an unprecedented wave of innovation and experimentation by reducing the time of designing, testing, and adopting new protocols; enabling a customized, top-down  ...  Recently, data plane programmability has attracted significant attention from both the research community and the industry, permitting operators and programmers in general to run customized packet processing  ...  FastReact, a system that enables caching for industrial control networks.  ... 
arXiv:2102.00643v2 fatcat:izxi645kozdc5ibfsqp2y2foau

Ultra-Low Latency (ULL) Networks: The IEEE TSN and IETF DetNet Standards and Related 5G ULL Research

Ahmed Nasrallah, Akhilesh S. Thyagaturu, Ziyad Alharbi, Cuixiang Wang, Xing Shao, Martin Reisslein, Hesham ElBakoury
2019 IEEE Communications Surveys and Tutorials  
This survey can thus serve as a basis for the development of standards enhancements and future ULL research studies that address the identified pitfalls and limitations.  ...  The IEEE 802.1 Time Sensitive Networking (TSN) standard and related research studies have sought to provide link layer support for ULL networking, while the emerging IETF Deterministic Networking (DetNet  ...  for TSN: TSN networks are typically implemented in closed environments, such as automotive and industrial environments.  ... 
doi:10.1109/comst.2018.2869350 fatcat:kvymef5mbvfarfw3jnct5uj5ma

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 IEEE Access  
This open-design paradigm is paving the way for an unprecedented wave of innovation and experimentation by reducing the time of designing, testing, and adopting new protocols; enabling a customized, top-down  ...  Recently, data plane programmability has attracted significant attention from both the research community and the industry, permitting operators and programmers in general to run customized packet processing  ...  ACKNOWLEDGEMENT This material is based upon work supported by the National Science Foundation under grant numbers 1925484 and 1829698, funded by the Office of Advanced Cyberinfrastructure (OAC).  ... 
doi:10.1109/access.2021.3086704 fatcat:2jgbxj2cbfbp7fawkxwrztbbia

Hardware-Accelerated Platforms and Infrastructures for Network Functions: A Survey of Enabling Technologies and Research Studies

Prateek Shantharama, Akhilesh S. Thyagaturu, Martin Reisslein
2020 IEEE Access  
performance as compared to NFs running on virtualized and abstracted environments [99] .  ...  are typically developed by industry or commercially oriented organizations.  ... 
doi:10.1109/access.2020.3008250 fatcat:kv4znpypqbatfk2m3lpzvzb2nu

On Securing Underwater Acoustic Networks: A Survey

Shengming Jiang
2018 IEEE Communications Surveys and Tutorials  
Underwater acoustic networks (UWANs) are often deployed in unattended and untransparent or even hostile environments and face many security threats, while many applications based on UWANs require secure  ...  The research of UWAN security is still in an early stage, and the paper discusses several important issues necessarily for further studies at the end.  ...  For example, some applications (e.g., military, coastguard and homeland security) want to keep the UWANs undetected, while some others (e.g., scientific and industrial operations) mainly want to secure  ... 
doi:10.1109/comst.2018.2864127 fatcat:7b5wufjqmvcnje7pcmxrdf6ehi
« Previous Showing results 1 — 15 out of 19 results