{"title":"Key set management in networked building automation systems using multiple key servers","authors":"W. Granzer, C. Reinisch, W. Kastner","doi":"10.1109/WFCS.2008.4638716","DOIUrl":null,"url":null,"abstract":"With the integration of security critical applications into traditional building automation systems, a comprehensive security concept is mandatory. Most important, transmitted data have to be secured using cryptographic techniques. However, even if the used cryptographic algorithms are perfectly secure, the overall security highly depends on the non-disclosure of the used shared secrets. Therefore, this paper targets the management of these shared secrets and the necessary infrastructure used to manage them. Finally, to eliminate a single point of failure in this infrastructure, a redundancy concept featuring multiple key servers is presented.","PeriodicalId":352963,"journal":{"name":"2008 IEEE International Workshop on Factory Communication Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Workshop on Factory Communication Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WFCS.2008.4638716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
With the integration of security critical applications into traditional building automation systems, a comprehensive security concept is mandatory. Most important, transmitted data have to be secured using cryptographic techniques. However, even if the used cryptographic algorithms are perfectly secure, the overall security highly depends on the non-disclosure of the used shared secrets. Therefore, this paper targets the management of these shared secrets and the necessary infrastructure used to manage them. Finally, to eliminate a single point of failure in this infrastructure, a redundancy concept featuring multiple key servers is presented.