End-to-end considerations Industrial utilization of digital identities

被引:0
|
作者
Bohara, Rohit [1 ]
Handke, Florian [2 ]
Harig, Alexander [2 ]
Isaak, Dominik [3 ]
Pelzl, Jan [4 ]
Philipp, Andreas [5 ]
Priesterjahn, Claudia [3 ]
Schwinne, Christian [4 ]
机构
[1] asvin GmbH, Eichwiesenring 1-1, D-70567 Stuttgart, Germany
[2] Campus Schwarzwald gGmbH, Freudenstadt, Germany
[3] achelos GmbH, Paderborn, Germany
[4] Hsch Hamm Lippstadt, Lippstadt, Germany
[5] PrimeKey Labs GmbH, Aachen, Germany
来源
ATP MAGAZINE | 2024年 / 09期
关键词
Industrial Security; PKI; Digital Identities; Onboarding;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The IT security requirements for machines and systems are becoming increasingly complex. As a result, the use of machine identities is becoming increasingly important. They play a decisive role in establishing IT security in industrial networks. Machine identities enable the establishment of trust between manufacturers and operators, e.g. by proving the origin of components and creating secure traceability. However, digital identities are currently still difficult to introduce and manage in industrial environments. Commissioning- combined with the initial secure integration of devices into the network (onboarding)- is a particularly critical step. In this article, we look at the importance of digital identities for components and systems, describe necessary solutions such as secure onboarding and, with our Trustpoint research project, provide an example of how secure management of digital identities can work in industry.
引用
收藏
页数:102
相关论文
共 50 条
  • [41] HRNet: an end-to-end deep learning framework for digital holographic reconstruction
    Ren, Zhenbo
    Xu, Zhimin
    Lam, Edmund Y.
    ADVANCED PHOTONICS, 2019, 1 (01):
  • [42] An End-to-End Digital Postprocessing Linearization Method for Optical Sampling Link
    Ding, Min
    Chen, Xiaoen
    Jin, Zhengtao
    Chen, Jianping
    Wu, Guiling
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2023, 41 (24) : 7370 - 7378
  • [43] Practical considerations on end-to-end cellular/PWLAN architecture in support of bilateral roaming
    Leu, JS
    Lai, RF
    Lin, HI
    Shih, WK
    2005 IEEE Wireless Communications and Networking Conference, Vols 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1702 - 1707
  • [44] End-to-End Digital Technologies: The Range of Possibilities of Modern Mass Media
    Oleshko, Vladimir F.
    Oleshko, Evgeniy V.
    THEORETICAL AND PRACTICAL ISSUES OF JOURNALISM, 2022, 11 (03): : 564 - 585
  • [45] Design and implementation of an end-to-end operation system for digital television applications
    Zhang, Rui
    Yu, Dequan
    Yu, Songyu
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2006, 52 (03) : 825 - 829
  • [46] End-to-end service
    Nave, B
    COMMUNICATIONS NEWS, 1998, 35 (06): : 64 - 65
  • [47] Enabling end-to-end digital carbon emission tracing with shielded NFTs
    Babel M.
    Gramlich V.
    Körner M.-F.
    Sedlmeir J.
    Strüker J.
    Zwede T.
    Energy Informatics, 2022, 5 (Suppl 1)
  • [48] ADO: An open digital end-to-end tank based aquaculture platform
    Suciu, Ioana
    Boquet, Guillem
    Tuset-Peiro, Pere
    Vilajosana, Xavier
    HARDWAREX, 2022, 11
  • [49] End-to-end authorization
    Howell, J
    Kotz, D
    USENIX ASSOCIATION PROCEEDINGS OF THE FOURTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2000, : 151 - 164
  • [50] END-TO-END ANASTOMOSIS
    MARIK, JJ
    ZANUTTA, EU
    INTERNATIONAL JOURNAL OF FERTILITY, 1983, 28 (01) : 29 - 30