Proceeding of the 11th World Congress on Intelligent Control and Automation 2014
DOI: 10.1109/wcica.2014.7053743
|View full text |Cite
|
Sign up to set email alerts
|

Research on the security mechanism for interconnection between PROFIBUS and Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…VeCure integrates trust group structures, innovative message authentication techniques, and offline computation capabilities, effectively reducing latency and deployment costs associated with online message processing, all while remaining compatible with existing in-vehicle system architectures. Furthermore, reference [18] advocates for a connection approach revolving around PROFIBUS and the internet, conducting an exhaustive analysis of network security issues and proposing a comprehensive security model tailored to PROFIBUS industrial networks. In a complementary vein, reference [19] conducts a comprehensive assessment of the overall attack surface of IOLW in typical environments, evaluating the efficacy of various security measures and exploring relevant attack preconditions.…”
Section: Related Workmentioning
confidence: 99%
“…VeCure integrates trust group structures, innovative message authentication techniques, and offline computation capabilities, effectively reducing latency and deployment costs associated with online message processing, all while remaining compatible with existing in-vehicle system architectures. Furthermore, reference [18] advocates for a connection approach revolving around PROFIBUS and the internet, conducting an exhaustive analysis of network security issues and proposing a comprehensive security model tailored to PROFIBUS industrial networks. In a complementary vein, reference [19] conducts a comprehensive assessment of the overall attack surface of IOLW in typical environments, evaluating the efficacy of various security measures and exploring relevant attack preconditions.…”
Section: Related Workmentioning
confidence: 99%