The secure field bus (SecFB) protocol - Network communication security for secure industrial process control

被引:0
|
作者
Swaminathan, P. [1 ]
Padmanabhan, K. [2 ]
Ananthi, S. [3 ]
Pradeep, R. [4 ]
机构
[1] Grad Student Comp Sci & Engn, IIT Madras, Madras, Tamil Nadu, India
[2] Anna Univ, AC Coll Technol, Madras 600025, Tamil Nadu, India
[3] Univ Madras, Madras 600005, Tamil Nadu, India
[4] St Joseph Engn Coll, Mangalore, India
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes a protocol by which network security can be included in existing Fieldbus systems. The protocol makes use of the 56-bit DES cipher for data encryption. It also includes a scheme for symmetric Key exchange and automatic Key Update at specific time intervals. In addition, the protocol includes a new idea called Key Refresh. The Key Refresh is a simple scheme that can be an alternative to operating the cipher in processor intensive chaining or feedback modes. The industrial field devices are equipped with the TMS series of Digital Signal Processors to perform DES encryption/decryption. Since these processors are already present embedded in many of the state-of-art field devices, they were chosen so that the protocol would not require additional hardware. The protocol is generic and can run over any of the commercial Fieldbus networks.
引用
收藏
页码:941 / +
页数:2
相关论文
共 50 条
  • [41] 2FA Communication Protocol to Secure Metro Control Devices
    Guo, Huaqun
    Tan, Ezekiel Wei Ren
    Zhou, Luying
    Zhao, Zhigang
    Yu, Xingjie
    2019 IEEE INTELLIGENT TRANSPORTATION SYSTEMS CONFERENCE (ITSC), 2019, : 1019 - 1024
  • [42] Secure communication in microcomputer bus systems for embedded devices
    Muehlbach, Sascha
    Wallner, Sebastian
    JOURNAL OF SYSTEMS ARCHITECTURE, 2008, 54 (11) : 1065 - 1076
  • [43] Formal analysis of a secure communication channel: Secure core-email protocol
    Zhou, D
    Chin, SK
    FM'99-FORMAL METHODS, 1999, 1708 : 758 - 775
  • [44] Secure Protocol for Wireless Sensor Network
    Pandey, Vinay Kumar
    Gupta, Gaurav
    Gupta, Sorabh
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1080 - 1083
  • [45] A secure network access protocol (SNAP)
    Al Shahri, AF
    Smith, DG
    Irvine, JM
    EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, : 809 - 814
  • [46] A provably secure authenticated key agreement protocol for industrial sensor network system
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (23):
  • [47] Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network
    Wang, Min
    Zhang, Wei
    Guo, Jianxing
    Song, Xiaotian
    Long, Guilu
    ENTROPY, 2023, 25 (11)
  • [48] Security Considerations for In-Vehicle Secure Communication
    Ju, Hongil
    Jeon, BooSun
    Kim, Daewon
    Jung, Boheung
    Jung, Kyudong
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 1404 - 1406
  • [49] Unequal Security Protection for Secure Multimedia Communication
    Leung, Yiu-Wing
    Hou, Ricky Yuen-Tan
    2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2015, : 570 - 571
  • [50] Blockchain based security protocol for device to device secure communication in internet of things networks
    Chandrakar, Palak
    Bagga, Rashi
    Kumar, Yogesh
    Dwivedi, Sanjeev Kumar
    Amin, Ruhul
    SECURITY AND PRIVACY, 2023, 6 (01)