{"id":"https://openalex.org/W3092135551","doi":"https://doi.org/10.1109/etfa46521.2020.9211904","title":"Portable Trust Anchor for OPC UA Using Auto-Configuration","display_name":"Portable Trust Anchor for OPC UA Using Auto-Configuration","publication_year":2020,"publication_date":"2020-09-01","ids":{"openalex":"https://openalex.org/W3092135551","doi":"https://doi.org/10.1109/etfa46521.2020.9211904","mag":"3092135551"},"language":"en","primary_location":{"id":"doi:10.1109/etfa46521.2020.9211904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa46521.2020.9211904","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102015256","display_name":"David Meier","orcid":"https://orcid.org/0000-0003-0660-8087"},"institutions":[{"id":"https://openalex.org/I4210111500","display_name":"Fraunhofer Institute of Optronics, System Technologies and Image Exploitation","ror":"https://ror.org/01zx97922","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210111500","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"David Meier","raw_affiliation_strings":["Fraunhofer Institute of Optronics, System Technologies, and Image Exploitation IOSB, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute of Optronics, System Technologies, and Image Exploitation IOSB, Karlsruhe, Germany","institution_ids":["https://openalex.org/I4210111500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012993790","display_name":"Florian Patzer","orcid":"https://orcid.org/0000-0001-6620-9753"},"institutions":[{"id":"https://openalex.org/I4210111500","display_name":"Fraunhofer Institute of Optronics, System Technologies and Image Exploitation","ror":"https://ror.org/01zx97922","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210111500","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Florian Patzer","raw_affiliation_strings":["Fraunhofer Institute of Optronics, System Technologies, and Image Exploitation IOSB, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute of Optronics, System Technologies, and Image Exploitation IOSB, Karlsruhe, Germany","institution_ids":["https://openalex.org/I4210111500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086024487","display_name":"Matthias Drexler","orcid":null},"institutions":[{"id":"https://openalex.org/I4210111500","display_name":"Fraunhofer Institute of Optronics, System Technologies and Image Exploitation","ror":"https://ror.org/01zx97922","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210111500","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Matthias Drexler","raw_affiliation_strings":["Fraunhofer Institute of Optronics, System Technologies, and Image Exploitation IOSB, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute of Optronics, System Technologies, and Image Exploitation IOSB, Karlsruhe, Germany","institution_ids":["https://openalex.org/I4210111500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073930300","display_name":"J\u00fcrgen Beyerer","orcid":"https://orcid.org/0000-0003-3556-7181"},"institutions":[{"id":"https://openalex.org/I4210111500","display_name":"Fraunhofer Institute of Optronics, System Technologies and Image Exploitation","ror":"https://ror.org/01zx97922","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210111500","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jurgen Beyerer","raw_affiliation_strings":["Fraunhofer Institute of Optronics, System Technologies, and Image Exploitation IOSB, Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute of Optronics, System Technologies, and Image Exploitation IOSB, Karlsruhe, Germany","institution_ids":["https://openalex.org/I4210111500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102015256"],"corresponding_institution_ids":["https://openalex.org/I4210111500"],"apc_list":null,"apc_paid":null,"fwci":0.7709,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.74772567,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"270","last_page":"277"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7135454416275024},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.7101320624351501},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.692366361618042},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.6420222520828247},{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.6196349263191223},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.5627604126930237},{"id":"https://openalex.org/keywords/ethernet","display_name":"Ethernet","score":0.5463004112243652},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.49268490076065063},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4765641987323761},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4727645516395569},{"id":"https://openalex.org/keywords/data-exchange","display_name":"Data exchange","score":0.42648160457611084},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39726778864860535},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2696295380592346},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.19445878267288208},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.16698545217514038},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1622842252254486},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12007346749305725},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.0919354259967804}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7135454416275024},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.7101320624351501},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.692366361618042},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.6420222520828247},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.6196349263191223},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.5627604126930237},{"id":"https://openalex.org/C172173386","wikidata":"https://www.wikidata.org/wiki/Q79984","display_name":"Ethernet","level":2,"score":0.5463004112243652},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.49268490076065063},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4765641987323761},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4727645516395569},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.42648160457611084},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39726778864860535},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2696295380592346},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.19445878267288208},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.16698545217514038},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1622842252254486},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12007346749305725},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.0919354259967804},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/etfa46521.2020.9211904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa46521.2020.9211904","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},{"id":"pmh:oai:fraunhofer.de:N-605757","is_oa":false,"landing_page_url":"http://publica.fraunhofer.de/documents/N-605757.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400801","display_name":"Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer IOSB","raw_type":"Conference Paper"},{"id":"pmh:oai:publica.fraunhofer.de:publica/409045","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/409045","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1520102093","https://openalex.org/W1538605380","https://openalex.org/W2004322200","https://openalex.org/W2004845716","https://openalex.org/W2029693536","https://openalex.org/W2075095478","https://openalex.org/W2078556493","https://openalex.org/W2116876232","https://openalex.org/W2139977214","https://openalex.org/W2147032224","https://openalex.org/W2160813024","https://openalex.org/W2477890295","https://openalex.org/W2505170992","https://openalex.org/W2540991247","https://openalex.org/W2742674979","https://openalex.org/W2783090732","https://openalex.org/W2804966948","https://openalex.org/W2899259124","https://openalex.org/W2904964577","https://openalex.org/W2952952559","https://openalex.org/W2977822355","https://openalex.org/W3012094546","https://openalex.org/W4232950056","https://openalex.org/W4298051233","https://openalex.org/W6632179835","https://openalex.org/W6907513956"],"related_works":["https://openalex.org/W2545277503","https://openalex.org/W2096905199","https://openalex.org/W2369694906","https://openalex.org/W2355057033","https://openalex.org/W2181703223","https://openalex.org/W1574475986","https://openalex.org/W2587062340","https://openalex.org/W2106097339","https://openalex.org/W1977911310","https://openalex.org/W2956214096"],"abstract_inverted_index":{"With":[0],"increasing":[1],"connectivity":[2],"between":[3,37,132,150],"industrial":[4,38],"devices":[5,17,39],"their":[6,96],"attack":[7],"surface":[8],"grows.":[9],"Consequently,":[10],"secure":[11,69,122],"setups":[12],"have":[13],"to":[14,18,77,124,145,153,166],"allow":[15],"these":[16],"distinguish":[19],"trustworthy":[20,106],"and":[21,30,40,107,135,171],"untrustworthy":[22],"communication":[23,131],"partners.":[24],"One":[25],"of":[26,62,110],"the":[27,43,52,99,114,126,130,136,142,148,151],"most":[28],"significant":[29],"wide-spread":[31],"protocols":[32],"for":[33,65,129],"Ethernet-based":[34],"data":[35],"exchange":[36],"controls":[41],"is":[42,75],"Open":[44],"Platform":[45],"Communications":[46],"Unified":[47],"Architecture":[48],"(OPC":[49],"UA).":[50],"Although":[51],"OPC":[53,72,115,178],"UA":[54,73,116,179],"standard":[55],"includes":[56],"certificate-based":[57],"security":[58],"measures,":[59],"it":[60,173],"lacks":[61],"applicable":[63],"solutions":[64],"bootstrapping":[66],"trust.":[67],"For":[68],"communication,":[70],"each":[71],"application":[74,80,134],"supposed":[76],"hold":[78],"an":[79,133,161],"certificate":[81,97],"which":[82],"can":[83],"be":[84],"managed":[85],"by":[86],"a":[87,121],"Global":[88],"Discovery":[89],"Server":[90],"(GDS).":[91],"Simply":[92],"put,":[93],"applications":[94],"request":[95],"from":[98],"GDS":[100],"as":[101,103],"well":[102],"information":[104],"about":[105],"revoked":[108],"certificates":[109,149],"third":[111],"parties.":[112],"However,":[113],"specifications":[117],"do":[118],"not":[119],"suggest":[120],"method":[123],"establish":[125,167],"initial":[127,169],"trust":[128,156,170],"GDS.":[137],"Moreover,":[138],"in":[139],"current":[140],"implementations,":[141],"administrator":[143],"has":[144],"manually":[146],"interchange":[147],"peers":[152],"build":[154],"sufficient":[155],"relationships.":[157],"This":[158],"paper":[159],"proposes":[160],"evaluated":[162],"portable":[163],"trust-anchor-based":[164],"concept":[165],"this":[168],"demonstrates":[172],"solely":[174],"based":[175],"on":[176],"standardized":[177],"communication.":[180]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
