Study of Wireless Network Information Trust Evaluation Model in Industrial Control System

被引:3
作者
Zhang Qingjiang [1 ]
Qu Jiaxing [1 ]
Wang Lili [2 ]
机构
[1] Natl Def Sci & Technol Inst Heilongjiang Prov, Harbin, Peoples R China
[2] Harbin Univ Sci & Technol, Harbin, Peoples R China
来源
2014 FOURTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC) | 2014年
关键词
component; Industrial Wireless Network; Industrial Control System(ICS); Information Security; Trust Value; Trust Evaluation Model;
D O I
10.1109/IMCCC.2014.103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security of industrial wireless network of Industrial Control System (ICS), which is at a stage of rapid development, has gradually become a hot research. Through the analysis of typical framework of industrial wireless network and factors of network node trust transmission, the corresponding relationship of encourage factor, trust value and current cooperation frequency is proposed in this paper and a trust evaluation model is designed, which takes the abnormal behaviors of nodes, historical trust information and trust information of neighbor nodes into comprehensive consideration. This model avoids the limitation of trust judgment merely through abnormal behaviors of nodes and further ensures the fairness and accuracy of network trust evaluation.
引用
收藏
页码:473 / 477
页数:5
相关论文
共 39 条
[21]   A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS [J].
Sun, Dihua ;
Zhao, Hongzhuan ;
Cheng, Senlin .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5710-5723
[22]   A High-Assurance Trust Model for Digital Community Control System Based on Internet of Things [J].
LI Hongtao ;
XING Jinsheng ;
MA Jianfeng .
WuhanUniversityJournalofNaturalSciences, 2016, 21 (01) :29-36
[23]   An information system risk assessment model: a case study in online banking system [J].
Shokouhyar, Sajjad ;
Panahifar, Farhad ;
Karimisefat, Azadeh ;
Nezafatbakhsh, Maryam .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (01) :39-60
[24]   Study on Information Security Sharing System among the Industrial IoT Service and Product Provider [J].
Choi, Jongsoek ;
Shin, Yongtae ;
Cho, Sunok .
2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, :551-555
[25]   Study on Information Secure Evaluation Framework of Smart Grid Application System [J].
Yu Yong ;
Lin Wei-min .
12TH ANNUAL MEETING OF CHINA ASSOCIATION FOR SCIENCE AND TECHNOLOGY ON INFORMATION AND COMMUNICATION TECHNOLOGY AND SMART GRID, 2010, :497-500
[26]   Conceptual Model for Adaptive Control of a Geographic Information System under Conditions of Destabilization [J].
Gryzunov, V. V. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) :1222-1227
[27]   Conceptual Model for Adaptive Control of a Geographic Information System under Conditions of Destabilization [J].
V. V. Gryzunov .
Automatic Control and Computer Sciences, 2021, 55 :1222-1227
[28]   A Study on Information Security Management System Model for Small and Medium Enterprises [J].
Lee, Wan-Soo ;
Jang, Sang-Soo .
RECENT ADVANCES IN E-ACTIVITIES, INFORMATION SECURITY AND PRIVACY, 2009, :84-+
[29]   Construction and Case Study of Evaluation Index System on the Information Security of Smart City [J].
Sun De-mei ;
Li Pan-pan .
PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (12TH) & INTERNATIONAL SYMPOSIUM ON WEST AFRICAN STUDIES (1ST), VOL I, 2017, :309-315
[30]   Research on system logs collection and analysis model of the network and information security system by using multi-agent technology [J].
Shi Shengyan ;
Shen Xiaoliu ;
Zhao Jianbao ;
Ma Xinke .
2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, :23-26