Benefits of end-to-end IP for cyber and physical security

被引:0
|
作者
Seewald, M. G. [1 ]
机构
[1] Cisco Syst, D-85399 Hallbergmoos, Germany
关键词
Communication networks; communication system security; critical infrastructure; cyber security; IP networks; power system security; SCADA systems; security; security architecture; smart grid;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Security is a critical success criterion for implementation and operation of Smart Grids at any scale. In this paper I describe the status and specifics of Smart Grids where data communication and automation networks are integrated with the power grid. Increased connectivity in order to achieve higher flexibility, visibility and better control presents many benefits. On the other hand, increased connectivity comes with a couple of challenges, especially in security. Based on this situation, I introduce a concept of using the Internet Protocol (IP) as a foundation for end-to-end security as well as for the development of a framework for comprehensive security architecture in order to safeguard this critical infrastructure.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
    Dahlmanns, Markus
    Pennekamp, Jan
    Fink, Ina Berenice
    Schoolmann, Bernd
    Wehrle, Klaus
    Henze, Martin
    [J]. SAT-CPS'21: PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2021, : 78 - 87
  • [2] Tailoring End-to-End IP Security Protocols to the Internet of Things
    Hummen, Rene
    Wirtz, Hanno
    Ziegeldorf, Jan Henrik
    Hiller, Jens
    Wehrle, Klaus
    [J]. 2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [3] On end-to-end security for Bluetooth/WAP & TCP/IP networks
    Sengodan, S
    Smith, D
    Abou-Rizk, M
    [J]. 2000 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2000, : 399 - 403
  • [4] An efficient end-to-end security mechanism for IP multimedia subsystem
    Chen, Chi-Yuan
    Wu, Tin-Yu
    Huang, Yueh-Min
    Chao, Han-Chieh
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4259 - 4268
  • [5] The end of end-to-end security?
    Bradner, S
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [6] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    [J]. 2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [7] Standards-based End-to-End IP Security for the Internet of Things
    Hummen, Rene
    Wehrle, Klaus
    [J]. 2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [8] Estimating End-to-End Latencies in Automotive Cyber-physical Systems
    Friese, Max J.
    Nowotka, Dirk
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2020, (316): : 134 - 148
  • [9] Providing true end-to-end security in converged voice over IP infrastructures
    Palmieri, Francesco
    Fiore, Ugo
    [J]. COMPUTERS & SECURITY, 2009, 28 (06) : 433 - 449
  • [10] End-to-End Security for the IoT
    Dooley, James
    [J]. INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606