Access Controls and Identity Management [69] |
Ensure communication access to authorized entities within the CPS. |
Prevent unauthorized access and establish trusted communication channels. |
TLS and SSL [113] |
Provide encryption and authentication for end-to-end security of data in transit. |
Protect against eavesdropping and MITM attacks. |
MAC and Digital Signatures [114] |
Verify the authenticity and integrity of transmitted messages. |
Ensure that data remain unchanged and originate from a legitimate source. |
VPNs [115] |
Create encrypted tunnels between nodes. |
Enhance privacy and security. |
PKC [116] |
Ensures that data remain confidential from the point of origin to the destination. |
Minimize the risk of interception and unauthorized access. |
SSH [117] |
Encrypts communication sessions for remote access and command execution. |
Adds an extra layer of protection against unauthorized access and data tampering. |
Network Segmentation [118] |
Divides the network into segments with restricted access. |
Limits the impact of unauthorized access and reduces the attack surface. |