Open-Source OPC UA Security and Scalability

Nikolas Mühlbauer, Erkin Kirdan, Marc Oliver Pahl, Georg Carle

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

26 Scopus citations

Abstract

OPC UA is widely adopted for remote-control in industrial environments. It has a central role for industrial control systems as it enables remote management. Compromising OPC UA can lead to compromising entire production facilities. Consequently, OPC UA requires a high level of security. Major commercial OPC UA implementations have compliance certificates ensuring that their security models obey the specification. However, open-source OPC UA implementations that have wide deployment mostly lack these certificates. In this work, we investigate the security models of the four most commonly used open-source implementations: open62541, node-opcua, UA-.NETStandard, and python-opcua. Furthermore, their scalabilities for the number of clients and OPC UA nodes are also analyzed.

Original languageEnglish
Title of host publicationProceedings - 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages262-269
Number of pages8
ISBN (Electronic)9781728189567
DOIs
StatePublished - Sep 2020
Event25th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2020 - Vienna, Austria
Duration: 8 Sep 202011 Sep 2020

Publication series

NameIEEE International Conference on Emerging Technologies and Factory Automation, ETFA
Volume2020-September
ISSN (Print)1946-0740
ISSN (Electronic)1946-0759

Conference

Conference25th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2020
Country/TerritoryAustria
CityVienna
Period8/09/2011/09/20

Keywords

  • OPC UA
  • open-source
  • scalability
  • security

Fingerprint

Dive into the research topics of 'Open-Source OPC UA Security and Scalability'. Together they form a unique fingerprint.

Cite this