Trust your BMS: Designing a Lightweight Authentication Architecture for Industrial Networks

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

With the advent of clean energy awareness and systems that rely on extensive battery use, Battery Management Systems (BMSs) have seen an increased inclusion in modern complex systems like electric vehicles and power grids. This has presented a new set of security-related challenges. Security concerns arise when BMSs are intended to extend their communication with external systems, as their interaction can leave many backdoors open that potential attackers could exploit. Consequently, we explore and propose a security architecture solution intended for the authentication and session key establishment between BMS and other system devices. The aim of the proposed architecture is to be applicable in different industrial settings and systems, while at the same time keeping the design lightweight in nature. To achieve this, we use the implicit certificates with the ECQV schema. We show the applicability of the design through a security and performance analysis of our implemented test setup.
Originalspracheenglisch
Titel2022 IEEE International Conference on Industrial Technology (ICIT)
Seitenumfang6
ISBN (elektronisch)978-1-7281-1948-9
DOIs
PublikationsstatusVeröffentlicht - Jan. 2023
Veranstaltung23rd IEEE International Conference on Industrial Technology: IEEE IES ICIT 2022 - Shanghai, Virtuell, China
Dauer: 22 Aug. 202225 Aug. 2022
https://2022.ieee-icit.org/

Konferenz

Konferenz23rd IEEE International Conference on Industrial Technology
KurztitelIEEE IES ICIT 2022
Land/GebietChina
OrtVirtuell
Zeitraum22/08/2225/08/22
Internetadresse

ASJC Scopus subject areas

  • Elektrotechnik und Elektronik
  • Hardware und Architektur
  • Computernetzwerke und -kommunikation

Fields of Expertise

  • Information, Communication & Computing

Fingerprint

Untersuchen Sie die Forschungsthemen von „Trust your BMS: Designing a Lightweight Authentication Architecture for Industrial Networks“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren