Secure and Efficient Tunneling of MACsec for Modern Industrial Use Cases

05/25/2022
by   Tim Lackorzynski, et al.
0

Trends like Industry 4.0 will pose new challenges for future industrial networks. Greater interconnectedness, higher data volumes as well as new requirements for speeds as well as security will make new approaches necessary. Performanceoptimized networking techniques will be demanded to implement new use cases, like network separation and isolation, in a secure fashion. A new and highly efficient protocol, that will be vital for that purpose, is MACsec. It is a Layer 2 encryption protocol that was previously extended specifically for industrial environments. Yet, it lacks the ability to bridge local networks. Therefore, in this work, we propose a secure and efficient Layer 3 tunneling scheme for MACsec. We design and implement two approaches, that are equally secure and considerably outperform comparable state-of-the-art techniques.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/25/2022

A Case for Practical Configuration Management Using Hardware-based Security Tokens

Future industrial networks will consist of a complex mixture of new and ...
research
04/12/2018

Towards a Flexible Architecture for Industrial Networking

The digitalization of manufacturing processes is expected to lead to a g...
research
07/24/2021

Secure Links: Secure-by-Design Communications in IEC 61499 Industrial Control Applications

Increasing automation and external connectivity in industrial control sy...
research
02/07/2019

VirtuWind - An SDN- and NFV-based Architecture for Softwarized Industrial Networks

VirtuWind proposes the application of Software Defined Networking (SDN) ...
research
09/17/2020

Can ROS be used securely in industry? Red teaming ROS-Industrial

With its growing use in industry, ROS is rapidly becoming a standard in ...
research
07/17/2020

Intrusion Detection in Binary Process Data: Introducing the Hamming-distance to Matrix Profiles

The digitisation of industry provides a plethora of novel applications t...
research
12/14/2020

Verifiable Observation of Permissioned Ledgers

Permissioned ledger technologies have gained significant traction over t...

Please sign up or login with your details

Forgot password? Click here to reset