Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems.
Alessandro ErbaAnne MüllerNils Ole TippenhauerPublished in: CPSIOTSEC@CCS (2022)
Keyphrases
- security analysis
- control system
- mutual authentication
- authentication protocol
- security model
- security properties
- security requirements
- public key
- high security
- secure electronic
- smart card
- user authentication
- key exchange
- encryption scheme
- authentication scheme
- critical infrastructure
- real time
- information security