Filters








42 Hits in 1.8 sec

Secure and Efficient Tunneling of MACsec for Modern Industrial Use Cases [article]

Tim Lackorzynski, Sebastian Rehms, Tao Li, Stefan Köpsell, Hermann Härtig
2022 arXiv   pre-print
A new and highly efficient protocol, that will be vital for that purpose, is MACsec. It is a Layer 2 encryption protocol that was previously extended specifically for industrial environments.  ...  Therefore, in this work, we propose a secure and efficient Layer 3 tunneling scheme for MACsec.  ...  of Saxony/Germany and by the German Research Foundation (DFG) as part of Germany's Excellence Strategy EXC 2050/1 -Project ID 390696704 -Cluster of Excellence Centre for Tactile Internet with Humanin-the-Loop  ... 
arXiv:2205.12748v1 fatcat:pwxlskhzqjh7znjyjphza7a43q

P4-MACsec: Dynamic Topology Monitoring and Data Layer Protection with MACsec in P4-Based SDN

Frederik Hauser, Mark Schmidt, Marco Haberle, Michael Menth
2020 IEEE Access  
Automated deployment of MACsec creates secure channels, generates keying material, and configures the P4 targets for each detected link between two P4 targets.  ...  We propose P4-MACsec to protect network links between P4-based SDN switches through automated deployment of MACsec, a widespread IEEE standard for securing Layer 2 infrastructures.  ...  ACKNOWLEDGMENT The authors would like to thank Joshua Hartmann for fruitful discussions and programming contributions.  ... 
doi:10.1109/access.2020.2982859 fatcat:tw5aigaemjawjhk4ctz27jiklm

P4-MACsec: Dynamic Topology Monitoring and Data Layer Protection with MACsec in P4-SDN [article]

Frederik Hauser and Mark Schmidt and Marco Häberle and Michael Menth
2019 arXiv   pre-print
Automated deployment of MACsec creates secure channel, generates keying material, and configures the P4 switches for each detected link between two P4 switches.  ...  We propose P4-MACsec to protect network links between P4 switches through automated deployment of MACsec, a widespread IEEE standard for securing Layer 2 infrastructures.  ...  ACKNOWLEDGMENT The authors thank Joshua Harmann for fruitful discussions and programming contributions.  ... 
arXiv:1904.07088v1 fatcat:32hvr63rlraqvaxy4msgysrihe

Table of Contents

2021 IEEE Transactions on Industrial Informatics  
Wang 7589 Enabling and Optimizing MACsec for Industrial Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  7700 Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M.  ... 
doi:10.1109/tii.2021.3097924 fatcat:ctptdnq6kvdjdjaxyuukbm4gnm

Analysis and Extension of Safety Mechanisms for Standardized Control Networks in Smart Grid

Jun Wu, Zhitao Guan, Ming Zhan, Jianhua Li, Yuwei Su
2014 International Journal of Distributed Sensor Networks  
system. (2) The common industrial protocol (CIP) is an industrial protocol for industrial automation applications [9] , which is used in EtherNet/IP, DeviceNet, CompoNet, and ControlNet. (3) CC-Link is  ...  In smart grid, standardized control networks are typical safety critical components which are under the environments with strong noise and interferences.  ...  Particularly, the authors would like to thank the anonymous reviewers for their valuable comments to improve the presentation of this paper.  ... 
doi:10.1155/2014/941967 fatcat:id25emhtmfhffkdudwa5e6ib6e

A Case for Practical Configuration Management Using Hardware-based Security Tokens [article]

Tim Lackorzynski, Max Ostermann, Stefan Köpsell, Hermann Härtig
2022 arXiv   pre-print
Future industrial networks will consist of a complex mixture of new and legacy components, while new use cases and applications envisioned by Industry 4.0 will demand increased flexibility and dynamics  ...  Therefore, we propose a scheme that allows factory operators to configure security gateways in an easy and practical way that is also understandable for staff not trained in the security domain.  ...  the SAB (Development Bank of Saxony) under frameworks from both the ERDF (European Regional Development Fund) as well as the ESF (European Social Fund), by public funding of the state of Saxony/Germany and  ... 
arXiv:2205.12757v1 fatcat:p37nlo3nzfcf3b6g7uhy7movpm

STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems [article]

Md. Rashid Al Asif, Khondokar Fida Hasan, Md Zahidul Islam, Rahamatullah Khondoker
2022 arXiv   pre-print
to enable automated detection and optimization of resources.  ...  Under the concept of smart agriculture, precision agriculture is gaining popularity to enable Decision Support System (DSS)-based farming management that utilizes widespread IoT sensors and wireless connectivity  ...  INTRODUCTION The adoption and acceleration of disruptive technologies such as the Internet of Things (IoT) and cloud computing are propelling the 4th industrial revolution, changing our lives and environment  ... 
arXiv:2201.09493v2 fatcat:o3kocntdlnbmrejcc3jq2wrqoa

New Automotive E/E architecture and how TC4xx enables it – From domain-based to zone-based approach [chapter]

K. Heurtefeux, M. Kumar, M. Cassol
2021 ELIV 2021  
The automotive industry is facing daunting challenges such as connected cars, expansion of new functionalities like ADAS or infotainment, electrification and stricter requirements in terms of safety, security  ...  To tackle these new challenges, more optimized, software-  ...  environments.  ... 
doi:10.51202/9783181023846-429 fatcat:6iymqtkoczdhtnt3rrufwfewl4

Incremental processing of polymer materials using the INDUSTRY 4.0 network structure

Andrzej Paszkiewicz, Grzegorz Budzik, Joanna Woźniak, Marek Bolanowski, Mateusz Przytuła, Mateusz Kiełbicki, Przemysław Poliński, Łukasz Kochmański
2021 Polimery  
The selected network control systems for 3D printers processing polymer materials were analyzed in terms of software and hardware identification used in industrial conditions, science and education.  ...  The article presents the possibility of incremental processing of polymeric materials using the network structure of INDUSTRY 4.0.  ...  This set enables visual preview of the process using cameras and program preview using Octoprint software [11] .  ... 
doi:10.14314/polimery.2021.7.5 fatcat:i5pszgexgvdhtcwkq27547mih4

2021 Index IEEE Transactions on Industrial Informatics Vol. 17

2021 IEEE Transactions on Industrial Informatics  
Departments and other items may also be covered if they have been judged to have archival value. The Author Index contains the primary entry for each item, listed under the first author's name.  ...  The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  ., +, TII Jan. 2021 606-616 Enabling and Optimizing MACsec for Industrial Environments.  ... 
doi:10.1109/tii.2021.3138206 fatcat:ulsazxgmpfdmlivigjqgyl7zre

Hierarchical, virtualised and distributed intelligence 5G architecture for low-latency and secure applications

M.S. Siddiqui, A. Legarrea, E. Escalona, M.C. Parker, G. Koczian, S.D. Walker, G. Lyberopoulos, E. Theodoropoulou, K. Filis, A. Foglar, M. Ulbricht, Y. Liu (+11 others)
2016 Transactions on Emerging Telecommunications Technologies  
Industry 4.0.  ...  CHARISMA aims to tackle low-latency and endto-end security for converged fixed/wireless 5G networks in order to meet the complex demands of emerging business paradigms, such as Smart Cities, eHealth, and  ...  This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 671704.  ... 
doi:10.1002/ett.3072 fatcat:btyou2dtkvbixaavjxdop5tixu

Hierarchical, Virtualized, And Distributed Intelligence 5G Architecture For Low-Latency And Secure Applications

M.S. Siddiqui, A. Legarrea, E. Escalona, M.C. Parker, G. Koczian, S.D. Walker, G. Lyberopoulos, E. Theodoropoulou, K. Filis, A. Foglar, M. Ulbricht, Y. Liu (+11 others)
2016 Zenodo  
and Industry 4.0.  ...  We also investigate the business perspective of the proposed 5G solution and the changes that can be foreseen for the telecom ecosystem.  ...  This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 671704.  ... 
doi:10.5281/zenodo.1196818 fatcat:3d7nx2riwfgvtlnuhye47xrcou

MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane

Zeying Liu, Pengshuai Cui, Yongji Dong, Lei Xue, Yuxiang Hu
2022 Electronics  
Our aim is to provide a protocol-extensible protocol conversion and secure transmission integration mechanism, MultiSec, for heterogeneous converged networks.  ...  Experiments show that MultiSec successfully realizes multi-protocol conversion and data encryption, and the system performance is significantly improved with the help of an encryption card.  ...  In P4-MACsec [40] , the authors implement IEEE 802.1AE (MACsec) at P4 and introduce an automatic deployment mechanism to provide MACsec for links detected between P4 switches.  ... 
doi:10.3390/electronics11152389 fatcat:l27aqhddl5bxvbhi3db475jnoa

Interoperability and Security Challenges of Industry 4.0

Venesa Watson, Asmaa Tellabi, Jochen Sassmannahausen, Xinxin Lou
2017 Jahrestagung der Gesellschaft für Informatik  
Industrie 4.0 (I4.0) is the fourth industrial revolution, which will see the digital transformation of manufacturing, through the integration on Industrial Internet of Things (IIoT), Data and Services,  ...  For I4.0, these are interoperability and security, which respectively arise from the interconnection of devices from different manufacturers and/or with different communication protocols; and the interconnection  ...  in industrial automation for IT and OT integration, a basic requirement for realizing IIoT and I4.0 [TE16] .  ... 
doi:10.18420/in2017_100 dblp:conf/gi/WatsonTSL17 fatcat:m2cnswanlzdsfejcuuurii5kwq

A Comparison of Four Series of CISCO Network Processors

Sadaf Abaei Senejani, Hossein Karimi, Javad Rahnama
2016 Advanced Computational Intelligence An International Journal (ACII)  
Routers perform the most useful and difficult processing operations.  ...  updating with the lowest cost, and supporting standard protocols of network.  ...  Supporting industry standard protocol and connector for VoIP and video like session initiation protocol (SIP) and H.323 are also put in it.  ... 
doi:10.5121/acii.2016.3402 fatcat:ay7fgjn36jeljl2vrufo54nxqu
« Previous Showing results 1 — 15 out of 42 results