Performance evaluation of an IT security layer in real-time communication
Current trends like Cloud Computing dissolve the known structure of the automation pyramid and lead towards a higher level of connectivity between different networks. Classical security methods like separation do not necessarily yield the needed level of protection. This paper describes the evaluati...
Saved in:
Published in | Proceedings (IEEE International Conference on Emerging Technologies and Factory Automation) pp. 1 - 4 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.09.2013
|
Subjects | |
Online Access | Get full text |
ISSN | 1946-0740 |
DOI | 10.1109/ETFA.2013.6648104 |
Cover
Summary: | Current trends like Cloud Computing dissolve the known structure of the automation pyramid and lead towards a higher level of connectivity between different networks. Classical security methods like separation do not necessarily yield the needed level of protection. This paper describes the evaluation of a new security layer to protect the PROFINET communication by cryptographic means under real-time conditions to support current existing IT security measures. |
---|---|
ISSN: | 1946-0740 |
DOI: | 10.1109/ETFA.2013.6648104 |