End-to-end considerations Industrial utilization of digital identities

被引:0
|
作者
Bohara, Rohit [1 ]
Handke, Florian [2 ]
Harig, Alexander [2 ]
Isaak, Dominik [3 ]
Pelzl, Jan [4 ]
Philipp, Andreas [5 ]
Priesterjahn, Claudia [3 ]
Schwinne, Christian [4 ]
机构
[1] asvin GmbH, Eichwiesenring 1-1, D-70567 Stuttgart, Germany
[2] Campus Schwarzwald gGmbH, Freudenstadt, Germany
[3] achelos GmbH, Paderborn, Germany
[4] Hsch Hamm Lippstadt, Lippstadt, Germany
[5] PrimeKey Labs GmbH, Aachen, Germany
来源
ATP MAGAZINE | 2024年 / 09期
关键词
Industrial Security; PKI; Digital Identities; Onboarding;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The IT security requirements for machines and systems are becoming increasingly complex. As a result, the use of machine identities is becoming increasingly important. They play a decisive role in establishing IT security in industrial networks. Machine identities enable the establishment of trust between manufacturers and operators, e.g. by proving the origin of components and creating secure traceability. However, digital identities are currently still difficult to introduce and manage in industrial environments. Commissioning- combined with the initial secure integration of devices into the network (onboarding)- is a particularly critical step. In this article, we look at the importance of digital identities for components and systems, describe necessary solutions such as secure onboarding and, with our Trustpoint research project, provide an example of how secure management of digital identities can work in industry.
引用
收藏
页数:102
相关论文
共 50 条
  • [31] End-to-end utilization control in distributed real-time systems
    Lu, CY
    Wang, XR
    Koutsoukos, X
    24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 456 - 466
  • [32] Signaling Architectures for Efficient Resource Utilization in NGN End-to-End QoS
    Ladhe, Seema A.
    Devane, Satish R.
    TECHNOLOGY SYSTEMS AND MANAGEMENT, 2011, 145 : 121 - +
  • [33] The end of end-to-end security?
    Bradner, S
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [34] A Robust End-to-End Speckle Stereo Matching Network for Industrial Scenes
    Liu, Yunxuan
    Yang, Kai
    Li, Xinyu
    Bai, Zijian
    Wan, Yingying
    Xie, Liming
    IEEE ACCESS, 2024, 12 : 6777 - 6789
  • [35] End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things
    Dildar, Muhammad Shahid
    Khan, Adnan Shahid
    Abbasi, Irshad Ahmed
    Akhtar, Reema Shaheen Naseem
    Al Ruqaishi, Khalil
    Sarwar, Shakeel Ahmed Ghulam
    IEEE ACCESS, 2025, 13 : 20584 - 20598
  • [36] Accelerate the adoption of industrial AM: On the benefits of comprehensive, end-to-end simulations
    Eckhoff, Ashley
    PhotonicsViews, 2021, 18 (03) : 50 - 53
  • [37] Guest Editorial: An End-to-End Machine Learning Perspective on Industrial IoT
    Wouhaybi, Rita
    Balakrishnan, Ravikumar
    Naderializadeh, Navid
    Beirami, Ahmad
    Di Felice, Marco
    Noghabi, Shadi
    Badam, Anirudh
    Xu, Shugong
    IEEE Internet of Things Magazine, 2022, 5 (01): : 22 - 23
  • [38] End-to-end Delay Evaluation of Industrial Automation Systems based on EtherCAT
    Wu, Xuepei
    Xie, Lihua
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 70 - 77
  • [39] End-to-end linearity considerations for photon-limited detection and display systems
    Shaw, R
    MEDICAL IMAGING 2003: PHYSICS OF MEDICAL IMAGING, PTS 1 AND 2, 2003, 5030 : 414 - 421
  • [40] An Iterative and Collaborative End-to-End Methodology Applied to Digital Mental Health
    Boulos, Laura Joy
    Mendes, Alexandre
    Delmas, Alexandra
    Kaadoud, Ikram Chraibi
    FRONTIERS IN PSYCHIATRY, 2021, 12