Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Applicability of LTE Public Key Infrastructure Based Device Authentication in Industrial Plants
RISE, Swedish ICT, SICS.ORCID iD: 0000-0002-0621-454X
Show others and affiliations
2015 (English)Conference paper, Published paper (Refereed)
Abstract [en]

The security in industrial automation domain using cryptography mechanisms is being discussed in both industry and academia. An efficient key management system is required to support cryptography for both symmetric key and public/private key encryption. The key management should ensure that the device is verified before distributing the initial key parameters to devices. The software/firmware used in the device comes from manufacturers, therefore the initial authenticity of the device can be easily verified with the help of manufacturers. Mobile telecommunication is an industrial segment where wireless devices are being used for a long time and the security of the wireless device management has been considered through a standard driven approach. Therefore, it is interesting to analyse the security authentication mechanisms used in mobile communication, specified in Long-Term-Evolution (LTE) standard. This paper analyses the initial device authentication using public key infrastructure in LTE standard, and discusses if, where and how the studied solutions can be tailored for device authenticity verification in industrial plant automation systems.

Place, publisher, year, edition, pages
2015, 9. p. 510-515
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:ri:diva-24471OAI: oai:DiVA.org:ri-24471DiVA, id: diva2:1043555
Conference
2015 IEEE 39th Annual Computer Software and Applications Conference (COMPSAC
Projects
PSCIPAvailable from: 2016-10-31 Created: 2016-10-31 Last updated: 2018-01-13Bibliographically approved

Open Access in DiVA

fulltext(309 kB)28 downloads
File information
File name FULLTEXT01.pdfFile size 309 kBChecksum SHA-512
15c2f71714360471c604bfe066e55194304dd783c8edb033ba2b82dcbed79a4027329eb4b9a80bba2f62bedefcb7312a610f98a04d0bb0d2825b77ddf719b412
Type fulltextMimetype application/pdf

Other links

http

Search in DiVA

By author/editor
Blom, Rolf
By organisation
SICS
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 28 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 15 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
v. 2.35.2