I. Introduction
While industrial networks, e.g., for factory and process automation, traditionally were designed as isolated networks, advances like Industry 4.0 [1] significantly increase the network connectivity leading to a growing Industrial Internet of Things (IIoT). Thus, today’s modern Internet-connected industrial networks offer a large variety of attack vectors that already have been exploited by several incidents, e.g., NotPetya or manipulation attacks on several industrial devices [2]. Hence, IIoT deployments require notable adaptations in security. Particularly, end-to-end secure communication via the Internet and access control are important to prevent attackers from (i) eavesdropping sensitive data and (ii) maliciously controlling production lines.