2018 IEEE Power &Amp; Energy Society General Meeting (PESGM) 2018
DOI: 10.1109/pesgm.2018.8586042
|View full text |Cite
|
Sign up to set email alerts
|

Inter-Technology Bridging Gateway: A Low Cost Legacy Adaptation Approach to Secure Industrial Systems

Abstract: A major hindrance in industry modernization is the interoperability issues between existing legacy and new systems. Legacy systems normally have security vulnerabilities and are cost prohibitive to upgrade/replace. Thus, a feasible solution is needed to equip legacy systems with secure emerging technologies. This paper presents a low-cost ARM processor based Inter-Technology Bridging Gateway (ITBG). Its modular design makes it easily customizable for any industrial application. As a use case, this paper presen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 17 publications
(25 reference statements)
0
8
0
Order By: Relevance
“…Over the last few years, several cybersecurity incidents have been reported on critical industrial operations such as Stuxnet and the Ukraine blackout [4], [5]. The presence of legacy systems is normally considered as the root cause for such security incidents [6]. Similarly, legacy devices in power systems have weak or no security as identified in [3], [7].…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Over the last few years, several cybersecurity incidents have been reported on critical industrial operations such as Stuxnet and the Ukraine blackout [4], [5]. The presence of legacy systems is normally considered as the root cause for such security incidents [6]. Similarly, legacy devices in power systems have weak or no security as identified in [3], [7].…”
Section: A Related Workmentioning
confidence: 99%
“…Its adoption is hindered due to interoperability issues with the existing legacy IEEE C37.118 compliant devices. Due to cost and deployment complexity involved, it is usually not a feasible option to replace legacy phasor devices [6].…”
Section: Use Case: Distributed Power Generationmentioning
confidence: 99%
“…Several cyber-security incidents have been reported in the last few years on critical national infrastructures such as the Ukraine blackout and Stuxnet [3], [4]. The root cause for most cyber-security incidents is the presence of legacy equipment with weak security [1], [5], [6].…”
Section: A Related Workmentioning
confidence: 99%
“…To bridge the technological gap between latest and legacy devices, authors in [8] proposed a protocol translation gateway. The gateway is attached to the industrial end-point that converts the legacy protocol into a secure modern protocol.…”
Section: A Related Workmentioning
confidence: 99%
“…In general, the current research trend focuses on the development of secure protocols for new devices [7] and protocol translation proxies [8], [9] for legacy devices to address the communication security issues. These existing solutions normally use a single encryption key for each session or utilize the same key for all group members in the group key management framework [8]. This can put the entire system security at stake if an encryption key is compromised.…”
Section: B Paper Motivation and Contributionsmentioning
confidence: 99%