B. Czybik, Stefan Hausmann, S. Heiss, J. Jasperneite
{"title":"实时以太网通信系统中MAC算法的性能评价","authors":"B. Czybik, Stefan Hausmann, S. Heiss, J. Jasperneite","doi":"10.1109/INDIN.2013.6622965","DOIUrl":null,"url":null,"abstract":"Industrial automation systems become more and more open for vertical integration using standardized information technology from the office world and access to the field level via Internet (Internet of Things and Industry 4.0). To protect such open automation systems there is a growing demand for the availability of suitable security features. However, real-time communication protocols used in automation networks typically provide no security functionalities and automation networks are vulnerable to numerous threats. In order to protect open automation systems, at least the authenticity of transferred data should be ensured. Therefore, an analysis of algorithms suitable for authenticity protection of data transferred by real-time Ethernet communication systems is presented in this paper. This includes an analysis of these algorithms and measurement results for a typical embedded system used in industrial Ethernet devices.","PeriodicalId":6312,"journal":{"name":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","volume":"69 1","pages":"676-681"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Performance evaluation of MAC algorithms for real-time Ethernet communication systems\",\"authors\":\"B. Czybik, Stefan Hausmann, S. Heiss, J. Jasperneite\",\"doi\":\"10.1109/INDIN.2013.6622965\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Industrial automation systems become more and more open for vertical integration using standardized information technology from the office world and access to the field level via Internet (Internet of Things and Industry 4.0). To protect such open automation systems there is a growing demand for the availability of suitable security features. However, real-time communication protocols used in automation networks typically provide no security functionalities and automation networks are vulnerable to numerous threats. In order to protect open automation systems, at least the authenticity of transferred data should be ensured. Therefore, an analysis of algorithms suitable for authenticity protection of data transferred by real-time Ethernet communication systems is presented in this paper. This includes an analysis of these algorithms and measurement results for a typical embedded system used in industrial Ethernet devices.\",\"PeriodicalId\":6312,\"journal\":{\"name\":\"2013 11th IEEE International Conference on Industrial Informatics (INDIN)\",\"volume\":\"69 1\",\"pages\":\"676-681\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 11th IEEE International Conference on Industrial Informatics (INDIN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDIN.2013.6622965\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 11th IEEE International Conference on Industrial Informatics (INDIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIN.2013.6622965","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance evaluation of MAC algorithms for real-time Ethernet communication systems
Industrial automation systems become more and more open for vertical integration using standardized information technology from the office world and access to the field level via Internet (Internet of Things and Industry 4.0). To protect such open automation systems there is a growing demand for the availability of suitable security features. However, real-time communication protocols used in automation networks typically provide no security functionalities and automation networks are vulnerable to numerous threats. In order to protect open automation systems, at least the authenticity of transferred data should be ensured. Therefore, an analysis of algorithms suitable for authenticity protection of data transferred by real-time Ethernet communication systems is presented in this paper. This includes an analysis of these algorithms and measurement results for a typical embedded system used in industrial Ethernet devices.