Industrial control equipment such as programmable logic controllers, supervisory control and data acquisition (SCADA), distributed control, and building automation systems are presently the target of cyber attacks. Some of these systems manage critical infrastructure such as electrical power distribution, water distribution, or sewage infrastructure where system failure is not an option. In all of these equipment types, various plug-in modules and sensors are integrated for system operation and control. If sourced from non-genuine channels, they could create catastrophic, destructive, and human-dangerous system behavior.

Because these industrial products can be expensive and in some cases produced in large quantities, there is a strong profit motive for counterfeiters to offer replacement or re-manufactured products that can be lower in price and quality.

Counterfeiters have the technology to reverse engineer simple authentication techniques like serial number IDs or simple password solutions. Therefore, the electronic authentication solution chosen for use with industrial products must offer strong authentication features in order to eliminate the possibility of non-genuine alternatives from being used. A crypto-strong method based on challenge-and-response authentication provides a solution that is backed by industry standards and practice.

Maxim's DeepCover® Secure Authenticators meet and exceed these requirements with features including Crypto based on symmetric-key SHA-256 (secure hash algorithm) or asymmetric-key ECDSA (elliptic-curve digital signature algorithm).

The following diagrams represent typical authentication applications for industrial products:

Application: PLC Module Authentication

PLC Module Authentication

Back to Top |

Application: Pre-pay Utility Meter

Pre-pay Utility Meter

Back to Top |

Application: On-Site Feature Enablement via Authenticated Smart Phone

On-Site Feature Enablement via Authenticated Smart Phone

Back to Top |

Application: "Feature Enabling" via Authentication Read

Feature Enabling via Authentication Read

Back to Top |