2016 International Conference on Applied Electronics (AE) 2016
DOI: 10.1109/ae.2016.7577247
|View full text |Cite
|
Sign up to set email alerts
|

Embedded plug-in devices to secure industrial network communications

Abstract: With Ethernet as an ubiquitous technology also emerging in industrial networks, security is becoming one of the most important aspects. Whereas IT-networks together with their security features in the office domain are subject of a dynamic change, networks in the industrial environment have a long operational time and therefore are more vulnerable to unauthorized access due to outdated hard-and software components. ITthreats such as Stuxnet are targeted to these areas and in the case of a failure of, e.g., a c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Embedded plug-in devices inserted in the network provide authenticity and integrity for transmitted traffic. The technology has been introduced in [4] and was further developed in [5]. A simple network scenario is shown in figure 1 in which two end devices (A and B) are communicating with each other.…”
Section: System Behaviourmentioning
confidence: 99%
See 1 more Smart Citation
“…Embedded plug-in devices inserted in the network provide authenticity and integrity for transmitted traffic. The technology has been introduced in [4] and was further developed in [5]. A simple network scenario is shown in figure 1 in which two end devices (A and B) are communicating with each other.…”
Section: System Behaviourmentioning
confidence: 99%
“…This prevents failures through the MAC generation and does not delay the traffic. In [4] an embedded plug-in device is described which secures the data transmission through this mechanism without influencing the data flow using uncoupled MACs.…”
Section: Introductionmentioning
confidence: 99%