[{"year":"2022","status":"public","publication":"Workshop on Factory Communication Systems (WFCS)","conference":{"name":"18th International Conference on Factory Communication Systems (WFCS)","location":"Pavia, Italy ","end_date":"2022-04-29","start_date":"2022-04-27"},"place":"Pavia, Italy","doi":"10.1109/WFCS53837.2022.9779174","abstract":[{"text":"The current static risk assessment processes and concepts do not match the increasing requirements with regard to flexibility within the industrial automation domain. The amount of manual tasks and needed efforts for risk assessments are too high in order to adequately cover the rising rate of system reconfigurations. Analysing the typical risk assessment processes from the IEC 62443 will show resource constraints with regard to time, bottlenecks, and the main cost drivers. If the most rewarding process steps can be identified and automated, the overall performance of risk assessments can be enhanced to keep up with the demanded flexibility.","lang":"eng"}],"publication_identifier":{"eisbn":["978-1-6654-1086-1 "],"isbn":["978-1-6654-1087-8"]},"publication_status":"published","citation":{"chicago":"Ehrlich, Marco, Georg Lukas, Henning Trsek, Jürgen Jasperneite, and Christian Diedrich. “Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments.” In <i>Workshop on Factory Communication Systems (WFCS)</i>. Pavia, Italy: IEEE, 2022. <a href=\"https://doi.org/10.1109/WFCS53837.2022.9779174\">https://doi.org/10.1109/WFCS53837.2022.9779174</a>.","chicago-de":"Ehrlich, Marco, Georg Lukas, Henning Trsek, Jürgen Jasperneite und Christian Diedrich. 2022. Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments. In: <i>Workshop on Factory Communication Systems (WFCS)</i>. Pavia, Italy: IEEE. doi:<a href=\"https://doi.org/10.1109/WFCS53837.2022.9779174\">10.1109/WFCS53837.2022.9779174</a>, .","van":"Ehrlich M, Lukas G, Trsek H, Jasperneite J, Diedrich C. Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments. In: Workshop on Factory Communication Systems (WFCS). Pavia, Italy: IEEE; 2022.","short":"M. Ehrlich, G. Lukas, H. Trsek, J. Jasperneite, C. Diedrich, in: Workshop on Factory Communication Systems (WFCS), IEEE, Pavia, Italy, 2022.","bjps":"<b>Ehrlich M <i>et al.</i></b> (2022) Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments. <i>Workshop on Factory Communication Systems (WFCS)</i>. Pavia, Italy: IEEE.","ufg":"<b>Ehrlich, Marco u. a.</b>: Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments, in: o. Hg.: Workshop on Factory Communication Systems (WFCS), Pavia, Italy 2022.","mla":"Ehrlich, Marco, et al. “Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments.” <i>Workshop on Factory Communication Systems (WFCS)</i>, IEEE, 2022, <a href=\"https://doi.org/10.1109/WFCS53837.2022.9779174\">https://doi.org/10.1109/WFCS53837.2022.9779174</a>.","ama":"Ehrlich M, Lukas G, Trsek H, Jasperneite J, Diedrich C. Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments. In: <i>Workshop on Factory Communication Systems (WFCS)</i>. IEEE; 2022. doi:<a href=\"https://doi.org/10.1109/WFCS53837.2022.9779174\">10.1109/WFCS53837.2022.9779174</a>","din1505-2-1":"<span style=\"font-variant:small-caps;\">Ehrlich, Marco</span> ; <span style=\"font-variant:small-caps;\">Lukas, Georg</span> ; <span style=\"font-variant:small-caps;\">Trsek, Henning</span> ; <span style=\"font-variant:small-caps;\">Jasperneite, Jürgen</span> ; <span style=\"font-variant:small-caps;\">Diedrich, Christian</span>: Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments. In: <i>Workshop on Factory Communication Systems (WFCS)</i>. Pavia, Italy : IEEE, 2022","havard":"M. Ehrlich, G. Lukas, H. Trsek, J. Jasperneite, C. Diedrich, Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments, in: Workshop on Factory Communication Systems (WFCS), IEEE, Pavia, Italy, 2022.","apa":"Ehrlich, M., Lukas, G., Trsek, H., Jasperneite, J., &#38; Diedrich, C. (2022). Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments. <i>Workshop on Factory Communication Systems (WFCS)</i>. 18th International Conference on Factory Communication Systems (WFCS), Pavia, Italy . <a href=\"https://doi.org/10.1109/WFCS53837.2022.9779174\">https://doi.org/10.1109/WFCS53837.2022.9779174</a>","ieee":"M. Ehrlich, G. Lukas, H. Trsek, J. Jasperneite, and C. Diedrich, “Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments,” presented at the 18th International Conference on Factory Communication Systems (WFCS), Pavia, Italy , 2022. doi: <a href=\"https://doi.org/10.1109/WFCS53837.2022.9779174\">10.1109/WFCS53837.2022.9779174</a>."},"title":"Investigation of Resource Constraints for the Automation of Industrial Security Risk Assessments","author":[{"last_name":"Ehrlich","id":"61562","full_name":"Ehrlich, Marco","first_name":"Marco"},{"full_name":"Lukas, Georg","first_name":"Georg","last_name":"Lukas"},{"last_name":"Trsek","orcid":"0000-0002-0133-0656","first_name":"Henning","id":"1486","full_name":"Trsek, Henning"},{"last_name":"Jasperneite","first_name":"Jürgen","full_name":"Jasperneite, Jürgen","id":"1899"},{"last_name":"Diedrich","full_name":"Diedrich, Christian","first_name":"Christian"}],"_id":"11160","language":[{"iso":"eng"}],"type":"conference","date_created":"2024-03-01T14:35:07Z","department":[{"_id":"DEP5023"}],"user_id":"83781","publisher":"IEEE","date_updated":"2024-03-05T14:43:24Z"},{"_id":"12793","keyword":["secure","factory communication","elliptic curves","ECDHKE","performance","embedded"],"title":"Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System","author":[{"first_name":"Lisa Helene","full_name":"Gebauer, Lisa Helene","id":"76524","last_name":"Gebauer"},{"last_name":"Trsek","full_name":"Trsek, Henning","id":"1486","first_name":"Henning","orcid":"0000-0002-0133-0656"},{"full_name":"Heiss, Stefan","id":"1031","first_name":"Stefan","last_name":"Heiss"}],"language":[{"iso":"eng"}],"page":"207-210","date_created":"2025-04-15T09:36:32Z","type":"conference_editor_article","user_id":"83781","publisher":"IEEE","date_updated":"2025-04-15T09:42:27Z","department":[{"_id":"DEP5023"},{"_id":"DEP5000"}],"publication":"2022 IEEE 18th International Conference on Factory Communication Systems (WFCS)","conference":{"end_date":"2022-04-29","name":"18th IEEE International Workshop on Factory Communication Systems (WFCS) - Communication in Automation","location":"Pavia, ITALY","start_date":"2022-04-27"},"place":"[Piscataway, NJ]","year":"2022","status":"public","corporate_editor":["inIT /TH-OWL","Università degli studi di Pavia "],"doi":"10.1109/wfcs53837.2022.9779189","publication_status":"published","publication_identifier":{"isbn":["978-1-6654-1087-8"],"eisbn":["978-1-6654-1086-1"]},"abstract":[{"text":"Securing factory communication to protect corporate data is an important concern in the context of the Industrial Internet of Things (IIoT). Various cryptographic protocols can be used to establish secure communication channels. One of these protocols is the Transport Layer Security 1.3 (TLS 1.3) protocol. A key component of the TLS handshake protocol is the Elliptic Curve Diffie-Hellman Key Exchange (ECDHKE), a public key cryptosystem used to exchange keys over insecure channels which can be based on a number of standardized elliptic curves. A special form of elliptic curves are Montgomery curves which are advantageous compared to more traditional Weierstrass curves due to their fast arithmetic. This is especially important when the ECDHKE is performed on embedded devices and in time-critical situations. In this work, the performance of ECDHKE implementations using standardized Montgomery curves Curve25519 and Curve448 included in the wolfSSL library are evaluated on an embedded 32-bit STM32L476RG Nucleo development board designed by STMicroelectronics. The benchmark results show that using Curve25519 with around 220ms for the key pair generation and the key agreement respectively is approximately 75% faster than using Curve448 with around 900ms for each of the algorithms, which can be attributed to their differing security levels. These results suggest that the algorithms might not be fast enough for time critical situations.","lang":"eng"}],"citation":{"short":"L.H. Gebauer, H. Trsek, S. Heiss, Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System, IEEE, [Piscataway, NJ], 2022.","din1505-2-1":"<span style=\"font-variant:small-caps;\">Gebauer, Lisa Helene</span> ; <span style=\"font-variant:small-caps;\">Trsek, Henning</span> ; <span style=\"font-variant:small-caps;\">Heiss, Stefan</span> ; <span style=\"font-variant:small-caps;\">inIT /TH-OWL</span> ; <span style=\"font-variant:small-caps;\">Università degli studi di Pavia </span> (Hrsg.): <i>Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System</i>. [Piscataway, NJ] : IEEE, 2022","van":"Gebauer LH, Trsek H, Heiss S. Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System. inIT /TH-OWL, Università degli studi di Pavia , editors. 2022 IEEE 18th International Conference on Factory Communication Systems (WFCS). [Piscataway, NJ]: IEEE; 2022.","ieee":"L. H. Gebauer, H. Trsek, and S. Heiss, <i>Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System</i>. [Piscataway, NJ]: IEEE, 2022, pp. 207–210. doi: <a href=\"https://doi.org/10.1109/wfcs53837.2022.9779189\">10.1109/wfcs53837.2022.9779189</a>.","apa":"Gebauer, L. H., Trsek, H., &#38; Heiss, S. (2022). Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System. In inIT /TH-OWL &#38; Università degli studi di Pavia  (Eds.), <i>2022 IEEE 18th International Conference on Factory Communication Systems (WFCS)</i> (pp. 207–210). IEEE. <a href=\"https://doi.org/10.1109/wfcs53837.2022.9779189\">https://doi.org/10.1109/wfcs53837.2022.9779189</a>","havard":"L.H. Gebauer, H. Trsek, S. Heiss, Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System, IEEE, [Piscataway, NJ], 2022.","chicago-de":"Gebauer, Lisa Helene, Henning Trsek und Stefan Heiss. 2022. <i>Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System</i>. Hg. von inIT /TH-OWL und Università degli studi di Pavia . <i>2022 IEEE 18th International Conference on Factory Communication Systems (WFCS)</i>. [Piscataway, NJ]: IEEE. doi:<a href=\"https://doi.org/10.1109/wfcs53837.2022.9779189\">10.1109/wfcs53837.2022.9779189</a>, .","mla":"Gebauer, Lisa Helene, et al. “Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System.” <i>2022 IEEE 18th International Conference on Factory Communication Systems (WFCS)</i>, edited by inIT /TH-OWL and Università degli studi di Pavia , IEEE, 2022, pp. 207–10, <a href=\"https://doi.org/10.1109/wfcs53837.2022.9779189\">https://doi.org/10.1109/wfcs53837.2022.9779189</a>.","ufg":"<b>Gebauer, Lisa Helene/Trsek, Henning/Heiss, Stefan</b>: Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System, hg. von inIT /TH-OWL, Università degli studi di Pavia , [Piscataway, NJ] 2022.","ama":"Gebauer LH, Trsek H, Heiss S. <i>Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System</i>. (inIT /TH-OWL, Università degli studi di Pavia , eds.). IEEE; 2022:207-210. doi:<a href=\"https://doi.org/10.1109/wfcs53837.2022.9779189\">10.1109/wfcs53837.2022.9779189</a>","bjps":"<b>Gebauer LH, Trsek H and Heiss S</b> (2022) <i>Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System</i>, inIT /TH-OWL and Università degli studi di Pavia  (eds). [Piscataway, NJ]: IEEE.","chicago":"Gebauer, Lisa Helene, Henning Trsek, and Stefan Heiss. <i>Secure Communication in Factories - Benchmarking Elliptic Curve Diffie-Hellman Key Exchange Implementations on an Embedded System</i>. Edited by inIT /TH-OWL and Università degli studi di Pavia . <i>2022 IEEE 18th International Conference on Factory Communication Systems (WFCS)</i>. [Piscataway, NJ]: IEEE, 2022. <a href=\"https://doi.org/10.1109/wfcs53837.2022.9779189\">https://doi.org/10.1109/wfcs53837.2022.9779189</a>."}}]
