Physical-Layer Security for Industrial Wireless Control Systems

被引:57
作者
Pan, Fei [1 ]
Pang, Zhibo [2 ,3 ,4 ,5 ,6 ]
Luvisotto, Michele [7 ]
Xiao, Ming [8 ]
Wen, Hong [9 ,10 ]
机构
[1] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu, Sichuan, Peoples R China
[2] ABB Corp Res, Wireless Commun, Vasteras, Sweden
[3] KTH, Stockholm, Sweden
[4] Tsinghua Univ, Beijing, Peoples R China
[5] Zhejiang Univ, Hangzhou, Zhejiang, Peoples R China
[6] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
[7] ABB Corp Res Ctr, Vasteras, Sweden
[8] Royal Inst Technol, Sch Elect Engn & Comp Sci, Stockholm, Sweden
[9] Univ Waterloo, Elect & Comp Engn Dept, Waterloo, ON, Canada
[10] Univ Elect Sci & Technol China, Chengdu, Sichuan, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/MIE.2018.2874385
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless networks for industrial control systems are promising because of their reduced cost, flexible structure, and improved long-term reliability. However, wireless control systems are vulnerable to probing-free attacks (PFAs), which are not possible in wired control systems. Thus, wireless control systems must be made as secure as wired systems. Physical (PHY)-layer security technology (PHY-Sec) may be a new strategy for securing industrial wireless control systems. Among all PHY-Sec technologies, PHY-layer authentication is the first step for PHYSec in industrial wireless control systems. This article discusses the principles of PHY-Sec, its application to wireless control systems, and potential research directions. © 2007-2011 IEEE.
引用
收藏
页码:18 / 27
页数:10
相关论文
共 37 条
[1]  
[Anonymous], 1974, MICROWAVE MOBILE COM
[2]  
[Anonymous], MUT PLAN EN SECT CYB
[3]  
[Anonymous], AUTHENTICATION UNPUB
[4]   A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components [J].
Baldini, Gianmarco ;
Steri, Gary .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (03) :1761-1789
[5]  
Cell R., 2016, NISTTech. Rep, DOI [10.18434/T44S3N, DOI 10.18434/T44S3N]
[6]  
Chhetri SR, 2017, ICCAD-IEEE ACM INT, P1039, DOI 10.1109/ICCAD.2017.8203896
[7]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[8]   Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature [J].
Fang, Song ;
Liu, Yao ;
Ning, Peng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (07) :1515-1527
[9]  
Fei Pan, 2015, 2015 IEEE/CIC International Conference on Communications in China: Workshops (CIC/ICCC), P115, DOI 10.1109/ICCChinaW.2015.7961591
[10]  
Fei Pan, 2015, 2015 IEEE/CIC International Conference on Communications in China: Workshops (CIC/ICCC), P94, DOI 10.1109/ICCChinaW.2015.7961587