Abstract
To meet the requirements of modern production, industrial communication increasingly shifts from wired fieldbus to wireless 5G communication. Besides tremendous benefits, this shift introduces severe novel risks, ranging from limited reliability over new security vulnerabilities to a lack of accountability. To address these risks, we present approaches to (i) prevent attacks through authentication and redundant communication, (ii) detect anomalies and jamming, and (iii) respond to detected attacks through device exclusion and accountability measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ahmad, I., et al.: 5G security: analysis of threats and solutions. In: CSCN (2017)
Aoudi, W., Iturbe, M., Almgren, M.: Truth will out: departure-based process-level detection of stealthy attacks on control systems. In: ACM CCS (2018)
Bodenhausen, J., et al.: Securing wireless communication in critical infrastructure: challenges and opportunities. In: MobiQuitous (2023)
Caro, J.B., et al.: Empirical study on 5G NR cochannel coexistence. vol. 11 (2022)
Choi, H., et al.: Detecting attacks against robotic vehicles: a control invariant approach. In: ACM CCS (2018)
Dahlmanns, M., et al.: Missed opportunities: measuring the untapped TLS support in the industrial internet of things. In: ACM ASIA CCS (2022)
IEEE: IEEE standard for local and metropolitan area networks-media access control (MAC) security. In: IEEE Std 802.1AE-2018 (2018)
Kehl, P., et al.: Comparison of 5G enabled control loops for production. In: IEEE PIMRC (2020)
König, N., Kehl, P.: 5G-industry campus Europe (2022)
Santesson, S., et al.: X.509 internet public key infrastructure online certificate status protocol - OCSP. In: RFC 6960, June 2013
Serror, M., et al.: Challenges and opportunities in securing the industrial internet of things. IEEE Trans. Ind. Inf. 17(5), 2985–2996 (2021)
Watson, V., Ruland, C., Waedt, K.: MAC-layer security for time-sensitive switched ethernet networks. In: GI INFORMATIK (2020)
Wen, M., et al.: Private 5G networks: concepts, architectures, and research landscape, vol. 16 (2022)
Wolsing, K., et al.: IPAL: breaking up silos of protocol-dependent and domain-specific industrial intrusion detection systems. In: RAID (2022)
Acknowledgments
This work has been funded by the German Federal Office for Information Security (BSI) under project funding reference numbers 01MO23016A, 01MO23016B, 01MO23016C, 01MO23016D, and 01MO23016G (5G-Sierra). The authors are responsible for the content of this publication.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Henze, M. et al. (2024). Towards Secure 5G Infrastructures for Production Systems. In: Andreoni, M. (eds) Applied Cryptography and Network Security Workshops. ACNS 2024. Lecture Notes in Computer Science, vol 14587. Springer, Cham. https://doi.org/10.1007/978-3-031-61489-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-031-61489-7_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-61488-0
Online ISBN: 978-3-031-61489-7
eBook Packages: Computer ScienceComputer Science (R0)