2017 4th International Conference on Control, Decision and Information Technologies (CoDIT) 2017
DOI: 10.1109/codit.2017.8102673
|View full text |Cite
|
Sign up to set email alerts
|

Method for authentication of sensors connected on Modbus TCP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…In addition, the authors of [19] analyzed potential methods for protecting Modbus/TCP, but stressed that asymmetric cryptographic methods are significantly slower than the symmetric ones, questioning the use of asymmetric cryptography in IACSs. In [20], the authors presented a BITW authentication method that does not modify Modbus/TCP but transmits the cryptographic authentication information in the TCP Options header field. It should be noted that the format and content of the TCP Options header is strictly defined by the Internet Assigned Numbers Authority (IANA) and should generally not be used for purposes other than those defined.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, the authors of [19] analyzed potential methods for protecting Modbus/TCP, but stressed that asymmetric cryptographic methods are significantly slower than the symmetric ones, questioning the use of asymmetric cryptography in IACSs. In [20], the authors presented a BITW authentication method that does not modify Modbus/TCP but transmits the cryptographic authentication information in the TCP Options header field. It should be noted that the format and content of the TCP Options header is strictly defined by the Internet Assigned Numbers Authority (IANA) and should generally not be used for purposes other than those defined.…”
Section: Related Workmentioning
confidence: 99%
“…Shang et al [11] proposed an industrial frewall design based on Modbus TCP protocol, which combined "whitelist" with frewall technology to efectively intercept illegal data streams and ensure the normal operation of industrial control systems. Pricop et al [12] proposed authentication through the hash algorithm and put the authenticated data in the option feld of TCP header. Alves et al [13] designed the intermediary agent OpenPLC.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the infrastructure is exposed to information security risks, which may be attacked by hackers at any time, causing significant economic losses. The authors of [17] proposed a mechanism for the authentication of industrial control systems. During the transmission of Modbus TCP/IP packets, the hash code of authentication is generated by intercepting the header fields of the TCP packet to confirm the identity of the device.…”
Section: The Authentication Of the Industrial Internet Of Thingsmentioning
confidence: 99%