Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies &Amp; Factory Automation (ETFA 2012) 2012
DOI: 10.1109/etfa.2012.6489675
|View full text |Cite
|
Sign up to set email alerts
|

Certificate management in OPC UA applications: An evaluation of different trust models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 2 publications
0
11
0
Order By: Relevance
“…Fernbach et al [29], Falk et al [33], Karthikeyan et al [41], Krishnan et al [53], and Yunakovsky et al [50] present the integration of public key infrastructures in OPC UA environments without a specific focus on the initial secure onboarding. Yunakovsky et al [50] specifically focus on PKIs in the post-quantum era.…”
Section: Approaches Presented In Research Papersmentioning
confidence: 99%
“…Fernbach et al [29], Falk et al [33], Karthikeyan et al [41], Krishnan et al [53], and Yunakovsky et al [50] present the integration of public key infrastructures in OPC UA environments without a specific focus on the initial secure onboarding. Yunakovsky et al [50] specifically focus on PKIs in the post-quantum era.…”
Section: Approaches Presented In Research Papersmentioning
confidence: 99%
“…• Identification of research gaps and recommendations on secure provisioning for OPC UA (Section VII) [17], RFC8572 [18], BRSKI [19], 6tisch [20], DPP [21] Academic Works V-A [22], [23], [24], [25], [26], [27], [28] † No reference available, since OPC 10000-21 is not yet published.…”
Section: Contributionsmentioning
confidence: 99%
“…The different possible trust models in OPC UA, based on certificates, have been discussed and evaluated by Fernbach and Kastner [22]. Furthermore, Karthikeyan and Heiss [23] studied the usage of certificates in OPC UA and the challenges thereof.…”
Section: A Academic Workmentioning
confidence: 99%
“…S Cavalieri and G Cutuli 3 aimed to deal with the performance evaluation of OPC UA, considering both security and subscription mechanisms. A Fernbach and W Kastner 4 aimed to give a discussion about how the structure of the environmental system where OPC UA applications are installed, the resources available, and a request to dependability shall affect the strategy of managing certificates, which provided a theoretical basis for the optimization of OPC UA security mechanism. O Post et al 5,6 discussed the security at device level of automation system and implemented a new authentication-only security policy profile or using OPC UA for data transfer and IPsec for authentication is proposed.…”
Section: Introductionmentioning
confidence: 99%