2023
DOI: 10.3390/s23052686
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems

Abstract: Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems. These systems were built without any security considerations in mind, so the evolution towards interconnection and interoperability makes them vulnerable in the context of exposing data to the outside network. Even though new protocols are considering built-in security, the widely spread legacy standard… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 47 publications
0
10
0
1
Order By: Relevance
“…However, it is worth noting that thanks to this connectivity, support for protocols, such as MQTT, OPC-UA, Modbus TCP and PROFINET, is possible. In addition, the latter one is not so modern but also receives research efforts and is applied in the Industry 4.0 and IIoT arenas [1,8,94,95].…”
Section: Coexistence With Iot Equipmentmentioning
confidence: 99%
See 3 more Smart Citations
“…However, it is worth noting that thanks to this connectivity, support for protocols, such as MQTT, OPC-UA, Modbus TCP and PROFINET, is possible. In addition, the latter one is not so modern but also receives research efforts and is applied in the Industry 4.0 and IIoT arenas [1,8,94,95].…”
Section: Coexistence With Iot Equipmentmentioning
confidence: 99%
“…A conceptual framework for IIoT systems oriented towards smart manufacturing is proposed in [88], which includes PLCs in the network layer, highlighting the coexistence of such devices alongside other IoT technologies. In [1], cybersecurity issues are studied in a facility composed by an industrial SCADA alongside a set of Arduino-based automation units.…”
Section: Coexistence With Iot Equipmentmentioning
confidence: 99%
See 2 more Smart Citations
“…The JWT is encrypted using the blockchain public key of the expected registrant, and the blockchain ensures ownership of the JWT by mapping it to the blockchain public address of the intended owner. In another paper [ 19 ], an identity authentication mechanism based on elliptic curve cryptography was proposed for SCADA systems, using OPTIGA Trust X as the device, which provides secure storage for ECC keys. Sharma et al [ 20 ] explored device identity authentication using password-based, one-time password (OTP)-based, and certificate-based methods, analyzing the security of these three authentication approaches in the context of the Internet of Things (IoT).…”
Section: Related Workmentioning
confidence: 99%