Security analysis of VPN configurations in industrial control environments

4Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Virtual private networks (VPNs) are widely recommended to protect otherwise insecure industrial control protocols. VPNs provide confidentiality, integrity and availability, and are often considered to be secure. However, implementation vulnerabilities and protocol flaws expose VPN weaknesses in many deployments. This paper uses a probabilistic model to evaluate and quantify the security of VPN configurations. Simulations of the VPN model are conducted to investigate the trade-offs and parameter dependence in various VPN configurations. The experimental results provide recommendations for securing VPN deployments in industrial control environments.

Cite

CITATION STYLE

APA

Rahimi, S., & Zargham, M. (2011). Security analysis of VPN configurations in industrial control environments. In IFIP Advances in Information and Communication Technology (Vol. 367, pp. 73–88). Springer New York LLC. https://doi.org/10.1007/978-3-642-24864-1_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free