Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Applicability of LTE Public Key Infrastructure Based Device Authentication in Industrial Plants
ABB, Sweden; Mälardalen University, Sweden.
ABB, Sweden; Mälardalen University, Sweden.
Mälardalen University, Sweden.
RISE., Swedish ICT, SICS.ORCID-id: 0000-0002-0621-454X
Visa övriga samt affilieringar
2015 (Engelska)Ingår i: Proceedings - IEEE Computer Society's International Computer Software and Applications Conference, 2015, 9, s. 510-515, artikel-id 7273660Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

The security in industrial automation domain using cryptography mechanisms is being discussed in both industry and academia. An efficient key management system is required to support cryptography for both symmetric key and public/private key encryption. The key management should ensure that the device is verified before distributing the initial key parameters to devices. The software/firmware used in the device comes from manufacturers, therefore the initial authenticity of the device can be easily verified with the help of manufacturers. Mobile telecommunication is an industrial segment where wireless devices are being used for a long time and the security of the wireless device management has been considered through a standard driven approach. Therefore, it is interesting to analyse the security authentication mechanisms used in mobile communication, specified in Long-Term-Evolution (LTE) standard. This paper analyses the initial device authentication using public key infrastructure in LTE standard, and discusses if, where and how the studied solutions can be tailored for device authenticity verification in industrial plant automation systems.

Ort, förlag, år, upplaga, sidor
2015, 9. s. 510-515, artikel-id 7273660
Serie
Proceedings - IEEE Computer Society's International Computer Software and Applications Conference, E-ISSN 0730-3157
Nyckelord [en]
Industrial Automation, Mobile telecommunication security, Gap Analysis, Public-Key Infrastructure
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
URN: urn:nbn:se:ri:diva-24471DOI: 10.1109/COMPSAC.2015.61Scopus ID: 2-s2.0-84962148518ISBN: 978-1-4673-6564-2 (digital)OAI: oai:DiVA.org:ri-24471DiVA, id: diva2:1043555
Konferens
39th IEEE Annual Computer Software and Applications Conference (COMPSAC 2015), July 1-5, 2015, Taichung, Taiwan
Projekt
PSCIPTillgänglig från: 2016-10-31 Skapad: 2016-10-31 Senast uppdaterad: 2025-09-23Bibliografiskt granskad

Open Access i DiVA

fulltext(309 kB)662 nedladdningar
Filinformation
Filnamn FULLTEXT01.pdfFilstorlek 309 kBChecksumma SHA-512
15c2f71714360471c604bfe066e55194304dd783c8edb033ba2b82dcbed79a4027329eb4b9a80bba2f62bedefcb7312a610f98a04d0bb0d2825b77ddf719b412
Typ fulltextMimetyp application/pdf

Övriga länkar

Förlagets fulltextScopushttp

Person

Blom, Rolf

Sök vidare i DiVA

Av författaren/redaktören
Blom, Rolf
Av organisationen
SICS
Data- och informationsvetenskap

Sök vidare utanför DiVA

GoogleGoogle Scholar
Totalt: 663 nedladdningar
Antalet nedladdningar är summan av nedladdningar för alla fulltexter. Det kan inkludera t.ex tidigare versioner som nu inte längre är tillgängliga.

doi
isbn
urn-nbn

Altmetricpoäng

doi
isbn
urn-nbn
Totalt: 164 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf