Survey of Industrial Control Systems Security

被引:0
|
作者
Yang T. [1 ,2 ]
Zhang J. [2 ,3 ]
Huang Z. [1 ]
Chen Y. [1 ]
Huang C. [1 ]
Zhou W. [4 ]
Liu P. [5 ]
Feng T. [3 ]
Zhang Y. [1 ,2 ,6 ]
机构
[1] School of Cyber Engineering, Xidian University, Xi'an
[2] National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing
[3] School of Computer and Communication, Lanzhou University of Technology, Lanzhou
[4] School of Cyber Science and Engineering, Huazhong University of Science & Technology, Wuhan
[5] College of Information Sciences and Technology, Pennsylvania State University, State College, 16802, PA
[6] School of Computer Science and Cyberspace Security, Hainan University, Haikou
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2022年 / 59卷 / 05期
基金
中国国家自然科学基金;
关键词
Attack; Countermeasures; Industrial control systems security; Industrial Internet of things; Industry; 4.0;
D O I
10.7544/issn1000-1239.20211154
中图分类号
学科分类号
摘要
In addition to the application of manufacturing industries, industrial control systems are also widely used in critical infrastructure such as transportation, energy, and water treatment industries. Accelerated application of digital, network, and intelligent technologies in industrial control systems, more and more smart devices are connected to it, leading to severe challenges to its security. Therefore, the security of industrial control systems has attracted the attention of researchers. In order to let the researchers systematically understand the current research progress, we have researched the core database of Web of Science, EI database, the network and information security related papers of CCF recommended international academic conferences and other high-level research work in the past three years. First, the architecture of industrial control systems is introduced, then the security threats that ICS faces are introduced. Moreover, according to the architecture of the industrial control systems, we divide the security research work into three parts: the communication security of industrial control system and cloud, the communication security of human machine interface (HMI) to device, the security of device firmware and other security research issues, analyze them from the perspective of attack and defense. Finally, we put forward the main challenges that security research faces, identify open problems for future research directions. © 2022, Science Press. All right reserved.
引用
收藏
页码:1035 / 1053
页数:18
相关论文
共 131 条
  • [1] Lasi H, Fettke P, Kemper H G, Et al., Industry 4.0, Business & Information Systems Engineering, 6, 4, pp. 239-242, (2014)
  • [2] Zhou Ji, Intelligent manufacturing-main direction of "Made in China 2025, China Mechanical Engineering, 26, 17, pp. 2273-2284, (2015)
  • [3] Threat landscape for industrial automation systems
  • [4] Panchal A C, Khadse V M, Mahalle P N., Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures, Proc of 2018 IEEE Global Conf on Wireless Computing and Networking (GCWCN), pp. 124-130, (2018)
  • [5] Asghar M R, Hu Q, Zeadally S., Cybersecurity in industrial control systems: Issues, technologies, and challenges, Computer Networks, 165, (2019)
  • [6] Thomas R J, Gardiner J, Chothia T, Et al., Catch me if you can: An in-depth study of CVE discovery time and inconsistencies for managing risks in critical infrastructures, Proc of the 2020 Joint Workshop on CPS& IoT Security and Privacy, pp. 49-60, (2020)
  • [7] Yu Xingjie, Guo Huaqun, A survey on IIoT security, Proc of 2019 IEEE VTS Asia Pacific Wireless Communications Symp (APWCS), pp. 1-5, (2019)
  • [8] Singh A, Chatterjee K., Cloud security issues and challenges: A survey, Journal of Network and Computer Applications, 79, pp. 88-115, (2017)
  • [9] Sajid A, Abbas H, Saleem K., Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges, IEEE Access, 4, pp. 1375-1384, (2016)
  • [10] Security Notification-ConneXium