Security Assist Mechanisms for Industrial Control Systems with Authentication

被引:2
作者
Tsou, Chia-Wei [1 ]
Ma, Yi-Wei [1 ]
Tu, Yi-Hao [1 ]
Chen, Jiann-Liang [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Elect Engn, Taipei, Taiwan
来源
2023 25TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, ICACT | 2023年
关键词
Industry control system; security; central control; device to device (D2D); hybrid;
D O I
10.23919/ICACT56868.2023.10079611
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to a lack of identification and authentication in the communication protocol used for industrial control systems. It is easy for an intruder to forge false information or impersonate a device to send inappropriate commands to other devices, causing them to malfunction or be damaged. This study designs three kinds of identity security mechanisms used in industrial control communication protocols: central control, device to device (D2D), and a hybrid mechanism combining the above two. Using the proposed mechanism can prevent intruders from disguising as legitimate devices to join the industrial network, resulting in information tampering or equipment impersonation.
引用
收藏
页码:186 / 188
页数:3
相关论文
共 8 条
  • [1] Empirical Study of PLC Authentication Protocols in Industrial Control Systems
    Ayub, Adeen
    Yoo, Hyunguk
    Ahmed, Irfan
    [J]. 2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 383 - 397
  • [2] Claudio U. O, 2018, P IEEE 3 ECUADOR TEC, P1
  • [3] A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
    Esfahani, Alireza
    Mantas, Georgios
    Matischek, Rainer
    Saghezchi, Firooz B.
    Rodriguez, Jonathan
    Bicaku, Ani
    Maksuti, Silia
    Tauber, Markus G.
    Schmittner, Christoph
    Bastos, Joaquim
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 288 - 296
  • [4] Hung-Chang Chang, 2020, 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), P375, DOI 10.1109/CyberC49757.2020.00070
  • [5] Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments
    Karati, Arijit
    Islam, S. K. Hafizul
    Karuppiah, Marimuthu
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3701 - 3711
  • [6] LuYao Yang, 2021, EITCE 2021: Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering, P1005, DOI 10.1145/3501409.3501589
  • [7] Wang JR, 2020, PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), P314, DOI [10.1109/icaiis49377.2020.9194854, 10.1109/ICAIIS49377.2020.9194854]
  • [8] Cross-Layer Device Authentication With Quantum Encryption for 5G Enabled IIoT in Industry 4.0
    Xu, Dongyang
    Yu, Keping
    Ritcey, James A.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6368 - 6378