The secure field bus (SecFB) protocol - Network communication security for secure industrial process control

被引:0
|
作者
Swaminathan, P. [1 ]
Padmanabhan, K. [2 ]
Ananthi, S. [3 ]
Pradeep, R. [4 ]
机构
[1] Grad Student Comp Sci & Engn, IIT Madras, Madras, Tamil Nadu, India
[2] Anna Univ, AC Coll Technol, Madras 600025, Tamil Nadu, India
[3] Univ Madras, Madras 600005, Tamil Nadu, India
[4] St Joseph Engn Coll, Mangalore, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes a protocol by which network security can be included in existing Fieldbus systems. The protocol makes use of the 56-bit DES cipher for data encryption. It also includes a scheme for symmetric Key exchange and automatic Key Update at specific time intervals. In addition, the protocol includes a new idea called Key Refresh. The Key Refresh is a simple scheme that can be an alternative to operating the cipher in processor intensive chaining or feedback modes. The industrial field devices are equipped with the TMS series of Digital Signal Processors to perform DES encryption/decryption. Since these processors are already present embedded in many of the state-of-art field devices, they were chosen so that the protocol would not require additional hardware. The protocol is generic and can run over any of the commercial Fieldbus networks.
引用
收藏
页码:941 / +
页数:2
相关论文
共 50 条
  • [21] Protocol independent lightweight secure communication
    Guvensan, M. Amac
    Yavuz, A. Gokhan
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 211 - +
  • [22] Secure Communication with Network Coding
    Cao, Zhanghua
    Tang, Yuansheng
    Luo, Jinquan
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT C, 2012, 24 : 1943 - 1950
  • [23] A Secure Short Message Communication Protocol
    Chao-Wen Chang~(1
    International Journal of Automation & Computing, 2008, (02) : 202 - 207
  • [24] SECURE COMMUNICATION IN A PRIVATE NETWORK
    Patil, Sandhya D.
    Thakare, Nita M.
    Phiroj, Sheikh
    2015 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY, INFORMATION AND COMMUNICATION (ICCPEIC), 2015, : 414 - 417
  • [25] A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
    Fauziyah
    Wang, Zhaoshun
    Tabassum, Mujahid
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 4417 - 4452
  • [26] A Secure Ambulance Communication Protocol for VANET
    Chen, Chin-Ling
    Chang, Ing-Chau
    Chang, Chun-Hsin
    Wang, Yuan-Fen
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 73 (03) : 1187 - 1213
  • [27] A Secure Ambulance Communication Protocol for VANET
    Chin-Ling Chen
    Ing-Chau Chang
    Chun-Hsin Chang
    Yuan-Fen Wang
    Wireless Personal Communications, 2013, 73 : 1187 - 1213
  • [28] Communication Control: Secure Control of OT Communication
    Kruschitz, Erwin
    ATP MAGAZINE, 2022, (05): : 27 - 29
  • [29] A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm
    Ahmad, Abusukhon
    Hawashin, Bilal
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (12) : 64 - 70
  • [30] A Study on IT Security Control by Comparison of Secure Software Development Process
    Rijayanti, Rita
    Hendayun, Mokhamad
    Suharto, Toto
    Hwang, Mintae
    INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 551 - 560