A cryptographic credential based access control mechanism for industrial control system

被引:0
作者
Shi, Sha [1 ]
Wen, Qiaoyan [2 ]
机构
[1] State key laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications
[2] State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing
关键词
Access control; Cryptographic credential; Industrial control system;
D O I
10.4156/ijact.vol4.issue7.17
中图分类号
学科分类号
摘要
There involves a large number of relatively closed and limited computing power industrial components in different Industrial Control System (ICS), such as Programmable Logic Controller (PLC), and Radio Frequency Identification (RFID), etc. These units are used in specific industrial environments, and are specifically need security features, such as secure communication, access control, authorization and audit. More smart solutions are needed to support security in ICS. In this article we describe the design of an cryptographic credential based access control mechanism for ICS and this will separate simple authorization functions with complicated and flexible identity identification and authentication, respectively, in terminal equipment and a dedicated access control server implementation; then use access control info from access control server to end equipment securely to prevent the transmission of the access control decision is counterfeiting and tampering; finally, the authorized components in end equipment will use the access control info for final implementation.
引用
收藏
页码:152 / 158
页数:6
相关论文
共 26 条
[1]  
Atzoria L., Ierab A., Morabito G., The Internet of Things: A survey, Journal of Computer Networks, 54, 15, pp. 2787-2805, (2010)
[2]  
Weber R.H., Internet of Things-New security and privacy challenges, Journal of Computer Law & Security Review, 26, 1, pp. 23-30, (2010)
[3]  
Rieback M.R., Crispo B., Tanenbaum A.S., The evolution of RFID security, Journal of IEEE Pervasive Computing, 5, 1, pp. 62-69, (2006)
[4]  
Jules A., RFID security and privacy: A research survey, Journal of IEEE Selected Areas in Communications, 24, 2, pp. 381-394, (2006)
[5]  
Golaup A., Mustapha M., Patanapongpibul L.B., Femtocell access control strategy in UMTS and LTE, Journal of IEEE Communications Magazine, 47, 9, pp. 117-123, (2009)
[6]  
McDaniel P., McLaughlin S., Security and Privacy Challenges in the Smart Grid, Journal of IEEE Security & Privacy, 7, 3, pp. 75-77, (2009)
[7]  
Anderson R.J., Security Engineering: A Guide to Building Dependable Distributed Systems, (2010)
[8]  
Schapranow M.P., Zeier A., Plattner H., A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access, Proceedings of the 4th International Conference On Network and System Security (NSS), pp. 371-376, (2010)
[9]  
Kopetz H., Real-time Systems: Design Principles for Distributed Embedded Applications, (2011)
[10]  
Ngaia E.W.T., Moonb K.K.L., Rigginsc F.J., Yib C.Y., RFID research: An academic literature review (1995-2005) and future research directions, Journal of Production Economics, 112, 2, pp. 510-520, (2008)