Analysis of the security of VPN configurations in industrial control environments

9Citations
Citations of this article
44Readers
Mendeley users who have this article in their library.

Abstract

Virtual private networks (VPNs) are a popular approach for protecting otherwise insecure industrial control protocols. VPNs provide confidentiality, integrity and availability, and are often considered to be secure. However, implementation vulnerabilities and protocol flaws expose VPN weaknesses in many industrial deployments. This paper employs a probabilistic model to evaluate and quantify the security of VPN configurations. Simulations of the VPN model are conducted to investigate the trade-offs and parameter dependence in various VPN configurations. The experimental results provide recommendations for securing VPN deployments in industrial control environments. © 2012 Elsevier B.V.

Cite

CITATION STYLE

APA

Rahimi, S., & Zargham, M. (2012). Analysis of the security of VPN configurations in industrial control environments. International Journal of Critical Infrastructure Protection, 5(1), 3–13. https://doi.org/10.1016/j.ijcip.2012.01.001

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free