Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective

09/03/2018
by   Stefan Marksteiner, et al.
0

Smart Services using Industrial Internet of Things (IIoT) applications are on the rise, but still more often than not, traditional industrial protocols are used to interconnect the entities of the resulting systems. These protocols are mostly not intended for functioning in such a highly interconnected environment and, therefore, often lack even the most fundamental security measures. To address this issue, this paper reasons on the security of a communications protocol, intended for Machine to machine (M2M) communications, namely the Open Platform Communications Unified Architecture (OPC UA) and exemplifies, on a smart energy system, its capability to serve as a secure communications architecture by either itself or in conjunction with traditional protocols.

READ FULL TEXT
research
06/01/2022

Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things

The ongoing trend to move industrial appliances from previously isolated...
research
10/17/2019

PropFuzz – An IT-Security Fuzzing Framework for Proprietary ICS Protocols

Programmable Logic Controllers are used for smart homes, in production p...
research
08/30/2019

IoT based Smart Access Controlled Secure Smart City Architecture Using Blockchain

Standard security protocols like SSL, TLS, IPSec etc. have high memory a...
research
01/18/2019

Smart-Lock Security Re-engineered using Cryptography and Steganography

After the rise of E-commerce, social media and messenger bots, rapid dev...
research
01/22/2018

An Overview of Wireless IoT Protocol Security in the Smart Home Domain

While the application of IoT in smart technologies becomes more and more...
research
12/02/2019

Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning

Machine learning algorithms have been shown to be suitable for securing ...
research
10/27/2022

Trust-Awareness to Secure Swarm Intelligence from Data Injection Attack

Enabled by the emerging industrial agent (IA) technology, swarm intellig...

Please sign up or login with your details

Forgot password? Click here to reset