Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Applicability of LTE Public Key Infrastructure Based Device Authentication in Industrial Plants
ABB, Sweden; Mälardalen University, Sweden.
ABB, Sweden; Mälardalen University, Sweden.
Mälardalen University, Sweden.
RISE, Swedish ICT, SICS.ORCID iD: 0000-0002-0621-454X
Show others and affiliations
2015 (English)In: Proceedings - IEEE Computer Society's International Computer Software and Applications Conference, 2015, 9, p. 510-515, article id 7273660Conference paper, Published paper (Refereed)
Abstract [en]

The security in industrial automation domain using cryptography mechanisms is being discussed in both industry and academia. An efficient key management system is required to support cryptography for both symmetric key and public/private key encryption. The key management should ensure that the device is verified before distributing the initial key parameters to devices. The software/firmware used in the device comes from manufacturers, therefore the initial authenticity of the device can be easily verified with the help of manufacturers. Mobile telecommunication is an industrial segment where wireless devices are being used for a long time and the security of the wireless device management has been considered through a standard driven approach. Therefore, it is interesting to analyse the security authentication mechanisms used in mobile communication, specified in Long-Term-Evolution (LTE) standard. This paper analyses the initial device authentication using public key infrastructure in LTE standard, and discusses if, where and how the studied solutions can be tailored for device authenticity verification in industrial plant automation systems.

Place, publisher, year, edition, pages
2015, 9. p. 510-515, article id 7273660
Series
Proceedings - IEEE Computer Society's International Computer Software and Applications Conference, E-ISSN 0730-3157
Keywords [en]
Industrial Automation, Mobile telecommunication security, Gap Analysis, Public-Key Infrastructure
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:ri:diva-24471DOI: 10.1109/COMPSAC.2015.61Scopus ID: 2-s2.0-84962148518ISBN: 978-1-4673-6564-2 (electronic)OAI: oai:DiVA.org:ri-24471DiVA, id: diva2:1043555
Conference
39th IEEE Annual Computer Software and Applications Conference (COMPSAC 2015), July 1-5, 2015, Taichung, Taiwan
Projects
PSCIPAvailable from: 2016-10-31 Created: 2016-10-31 Last updated: 2025-09-23Bibliographically approved

Open Access in DiVA

fulltext(309 kB)659 downloads
File information
File name FULLTEXT01.pdfFile size 309 kBChecksum SHA-512
15c2f71714360471c604bfe066e55194304dd783c8edb033ba2b82dcbed79a4027329eb4b9a80bba2f62bedefcb7312a610f98a04d0bb0d2825b77ddf719b412
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopushttp

Authority records

Blom, Rolf

Search in DiVA

By author/editor
Blom, Rolf
By organisation
SICS
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 660 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 162 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf