A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure and Efficient Tunneling of MACsec for Modern Industrial Use Cases
[article]
2022
arXiv
pre-print
A new and highly efficient protocol, that will be vital for that purpose, is MACsec. It is a Layer 2 encryption protocol that was previously extended specifically for industrial environments. ...
Therefore, in this work, we propose a secure and efficient Layer 3 tunneling scheme for MACsec. ...
of Saxony/Germany and by the German Research Foundation (DFG) as part of Germany's Excellence Strategy EXC 2050/1 -Project ID 390696704 -Cluster of Excellence Centre for Tactile Internet with Humanin-the-Loop ...
arXiv:2205.12748v1
fatcat:pwxlskhzqjh7znjyjphza7a43q
P4-MACsec: Dynamic Topology Monitoring and Data Layer Protection with MACsec in P4-Based SDN
2020
IEEE Access
Automated deployment of MACsec creates secure channels, generates keying material, and configures the P4 targets for each detected link between two P4 targets. ...
We propose P4-MACsec to protect network links between P4-based SDN switches through automated deployment of MACsec, a widespread IEEE standard for securing Layer 2 infrastructures. ...
ACKNOWLEDGMENT The authors would like to thank Joshua Hartmann for fruitful discussions and programming contributions. ...
doi:10.1109/access.2020.2982859
fatcat:tw5aigaemjawjhk4ctz27jiklm
P4-MACsec: Dynamic Topology Monitoring and Data Layer Protection with MACsec in P4-SDN
[article]
2019
arXiv
pre-print
Automated deployment of MACsec creates secure channel, generates keying material, and configures the P4 switches for each detected link between two P4 switches. ...
We propose P4-MACsec to protect network links between P4 switches through automated deployment of MACsec, a widespread IEEE standard for securing Layer 2 infrastructures. ...
ACKNOWLEDGMENT The authors thank Joshua Harmann for fruitful discussions and programming contributions. ...
arXiv:1904.07088v1
fatcat:32hvr63rlraqvaxy4msgysrihe
Table of Contents
2021
IEEE Transactions on Industrial Informatics
Wang 7589 Enabling and Optimizing MACsec for Industrial Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
7700 Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M. ...
doi:10.1109/tii.2021.3097924
fatcat:ctptdnq6kvdjdjaxyuukbm4gnm
Analysis and Extension of Safety Mechanisms for Standardized Control Networks in Smart Grid
2014
International Journal of Distributed Sensor Networks
system. (2) The common industrial protocol (CIP) is an industrial protocol for industrial automation applications [9] , which is used in EtherNet/IP, DeviceNet, CompoNet, and ControlNet. (3) CC-Link is ...
In smart grid, standardized control networks are typical safety critical components which are under the environments with strong noise and interferences. ...
Particularly, the authors would like to thank the anonymous reviewers for their valuable comments to improve the presentation of this paper. ...
doi:10.1155/2014/941967
fatcat:id25emhtmfhffkdudwa5e6ib6e
A Case for Practical Configuration Management Using Hardware-based Security Tokens
[article]
2022
arXiv
pre-print
Future industrial networks will consist of a complex mixture of new and legacy components, while new use cases and applications envisioned by Industry 4.0 will demand increased flexibility and dynamics ...
Therefore, we propose a scheme that allows factory operators to configure security gateways in an easy and practical way that is also understandable for staff not trained in the security domain. ...
the SAB (Development Bank of Saxony) under frameworks from both the ERDF (European Regional Development Fund) as well as the ESF (European Social Fund), by public funding of the state of Saxony/Germany and ...
arXiv:2205.12757v1
fatcat:p37nlo3nzfcf3b6g7uhy7movpm
STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems
[article]
2022
arXiv
pre-print
to enable automated detection and optimization of resources. ...
Under the concept of smart agriculture, precision agriculture is gaining popularity to enable Decision Support System (DSS)-based farming management that utilizes widespread IoT sensors and wireless connectivity ...
INTRODUCTION The adoption and acceleration of disruptive technologies such as the Internet of Things (IoT) and cloud computing are propelling the 4th industrial revolution, changing our lives and environment ...
arXiv:2201.09493v2
fatcat:o3kocntdlnbmrejcc3jq2wrqoa
New Automotive E/E architecture and how TC4xx enables it – From domain-based to zone-based approach
[chapter]
2021
ELIV 2021
The automotive industry is facing daunting challenges such as connected cars, expansion of new functionalities like ADAS or infotainment, electrification and stricter requirements in terms of safety, security ...
To tackle these new challenges, more optimized, software- ...
environments. ...
doi:10.51202/9783181023846-429
fatcat:6iymqtkoczdhtnt3rrufwfewl4
Incremental processing of polymer materials using the INDUSTRY 4.0 network structure
2021
Polimery
The selected network control systems for 3D printers processing polymer materials were analyzed in terms of software and hardware identification used in industrial conditions, science and education. ...
The article presents the possibility of incremental processing of polymeric materials using the network structure of INDUSTRY 4.0. ...
This set enables visual preview of the process using cameras and program preview using Octoprint software [11] . ...
doi:10.14314/polimery.2021.7.5
fatcat:i5pszgexgvdhtcwkq27547mih4
2021 Index IEEE Transactions on Industrial Informatics Vol. 17
2021
IEEE Transactions on Industrial Informatics
Departments and other items may also be covered if they have been judged to have archival value. The Author Index contains the primary entry for each item, listed under the first author's name. ...
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination. ...
., +, TII Jan. 2021 606-616 Enabling and Optimizing MACsec for Industrial Environments. ...
doi:10.1109/tii.2021.3138206
fatcat:ulsazxgmpfdmlivigjqgyl7zre
Hierarchical, virtualised and distributed intelligence 5G architecture for low-latency and secure applications
2016
Transactions on Emerging Telecommunications Technologies
Industry 4.0. ...
CHARISMA aims to tackle low-latency and endto-end security for converged fixed/wireless 5G networks in order to meet the complex demands of emerging business paradigms, such as Smart Cities, eHealth, and ...
This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 671704. ...
doi:10.1002/ett.3072
fatcat:btyou2dtkvbixaavjxdop5tixu
Hierarchical, Virtualized, And Distributed Intelligence 5G Architecture For Low-Latency And Secure Applications
2016
Zenodo
and Industry 4.0. ...
We also investigate the business perspective of the proposed 5G solution and the changes that can be foreseen for the telecom ecosystem. ...
This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 671704. ...
doi:10.5281/zenodo.1196818
fatcat:3d7nx2riwfgvtlnuhye47xrcou
MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane
2022
Electronics
Our aim is to provide a protocol-extensible protocol conversion and secure transmission integration mechanism, MultiSec, for heterogeneous converged networks. ...
Experiments show that MultiSec successfully realizes multi-protocol conversion and data encryption, and the system performance is significantly improved with the help of an encryption card. ...
In P4-MACsec [40] , the authors implement IEEE 802.1AE (MACsec) at P4 and introduce an automatic deployment mechanism to provide MACsec for links detected between P4 switches. ...
doi:10.3390/electronics11152389
fatcat:l27aqhddl5bxvbhi3db475jnoa
Interoperability and Security Challenges of Industry 4.0
2017
Jahrestagung der Gesellschaft für Informatik
Industrie 4.0 (I4.0) is the fourth industrial revolution, which will see the digital transformation of manufacturing, through the integration on Industrial Internet of Things (IIoT), Data and Services, ...
For I4.0, these are interoperability and security, which respectively arise from the interconnection of devices from different manufacturers and/or with different communication protocols; and the interconnection ...
in industrial automation for IT and OT integration, a basic requirement for realizing IIoT and I4.0 [TE16] . ...
doi:10.18420/in2017_100
dblp:conf/gi/WatsonTSL17
fatcat:m2cnswanlzdsfejcuuurii5kwq
A Comparison of Four Series of CISCO Network Processors
2016
Advanced Computational Intelligence An International Journal (ACII)
Routers perform the most useful and difficult processing operations. ...
updating with the lowest cost, and supporting standard protocols of network. ...
Supporting industry standard protocol and connector for VoIP and video like session initiation protocol (SIP) and H.323 are also put in it. ...
doi:10.5121/acii.2016.3402
fatcat:ay7fgjn36jeljl2vrufo54nxqu
« Previous
Showing results 1 — 15 out of 42 results