Tellabi et al., 2018 - Google Patents
Overview of Authentication and Access Controls for I&C systemsTellabi et al., 2018
- Document ID
- 1966978357742063072
- Author
- Tellabi A
- Sassmanhausen J
- Bajramovic E
- Ruland K
- Publication year
- Publication venue
- 2018 IEEE 16th International Conference on Industrial Informatics (INDIN)
External Links
Snippet
The integration of digital equipment and diverse automation platforms in modern power plants, including Nuclear Power Plants is due to the gradually increasing use of digital technologies. This development has raised new vulnerabilities that may endanger the …
- 238000000034 method 0 abstract description 31
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Coates et al. | A trust system architecture for SCADA network security | |
Scarfone et al. | Guide to enterprise password management (draft) | |
CN103310161A (en) | Protection method and system for database system | |
CN109564603A (en) | The system and method for the network configuration setting of multiplexer for safely changing in industrial control system | |
CN106603488A (en) | Safety system based on power grid statistical data searching method | |
Conrad et al. | Eleventh hour CISSP: study guide | |
CN102667792A (en) | Method and device for accessing files of a secure fileserver | |
EP3902225A1 (en) | Systems and methods for secure over-the-air updates for cyber-physical systems | |
Tellabi et al. | Overview of Authentication and Access Controls for I&C systems | |
Martinelli et al. | Improving security in industry 4.0 by extending OPC-UA with usage control | |
Muzzi et al. | Using Botnets to provide security for safety critical embedded systems-a case study focused on UAVs | |
Fischer et al. | IT security for functional resilience in energy systems: effect-centric IT security | |
Mir et al. | Zero trust user access and identity security in smart grid based scada systems | |
Sadavarte et al. | Data security and integrity in cloud computing: Threats and Solutions | |
US12039316B2 (en) | Systems and methods for secure maintenance device for cyber-physical systems | |
Lee | Considerations for cyber security implementation in autonomous vehicle systems | |
Dong et al. | Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture | |
Rocha | Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing | |
Guo et al. | Simulation Implementation and Verification of a Security Framework for ICS Based on SPD | |
Chen et al. | A trusted biometric system | |
Dhondge | Lifecycle IoT Security for Engineers | |
Tellabi et al. | Safety, cybersecurity and interoperability aspects in modern nuclear power plants | |
Conte de Leon et al. | Cybersecurity | |
Leszczyna et al. | Security requirements and controls for incident information sharing in the polish power system | |
RU2571372C1 (en) | System for protecting information containing state secrets from unauthorised access |