2010 5th IEEE Conference on Industrial Electronics and Applications 2010
DOI: 10.1109/iciea.2010.5514836
|View full text |Cite
|
Sign up to set email alerts
|

Research on OPC UA security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…Based on previous work (Huang et al , 2010; Schleipen et al , 2015; Wu et al , 2015; Jung et al , 2017), we compare the security features and capabilities of a typical OPC UA architecture with our blockchain-based architecture in Table I. The added value of our blockchain-based implementation is that it allows for greater transparency and auditing of all processes for the customer, whereas access by external parties to machines and devices of a factory is typically restricted.…”
Section: Discussionmentioning
confidence: 99%
“…Based on previous work (Huang et al , 2010; Schleipen et al , 2015; Wu et al , 2015; Jung et al , 2017), we compare the security features and capabilities of a typical OPC UA architecture with our blockchain-based architecture in Table I. The added value of our blockchain-based implementation is that it allows for greater transparency and auditing of all processes for the customer, whereas access by external parties to machines and devices of a factory is typically restricted.…”
Section: Discussionmentioning
confidence: 99%
“…OPC UA incorporates approaches for security measurements [10]. The specific security risks in OPC UA including different types of attackers and the security modes are analyzed in [7].…”
Section: Related Workmentioning
confidence: 99%
“…b) Security of industrial protocols: In the area of industrial protocols, various research and studies recently have been proposing the use of the "OPC Unified Architecture" (OPC UA) protocol and discussed its advantages. First security analysis and measures for OPC UA have been discussed by [22], who also addressed security objectives at different levels. On the communication layer, secured channels are defined for confidentiality, integrity, while on the application layer, sessions take care of user authorization and authentication -parts of these security concepts were later integrated into the security model of the OPC UA specification [23].…”
Section: Related Workmentioning
confidence: 99%