Study of Wireless Network Information Trust Evaluation Model in Industrial Control System

被引:3
作者
Zhang Qingjiang [1 ]
Qu Jiaxing [1 ]
Wang Lili [2 ]
机构
[1] Natl Def Sci & Technol Inst Heilongjiang Prov, Harbin, Peoples R China
[2] Harbin Univ Sci & Technol, Harbin, Peoples R China
来源
2014 FOURTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC) | 2014年
关键词
component; Industrial Wireless Network; Industrial Control System(ICS); Information Security; Trust Value; Trust Evaluation Model;
D O I
10.1109/IMCCC.2014.103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security of industrial wireless network of Industrial Control System (ICS), which is at a stage of rapid development, has gradually become a hot research. Through the analysis of typical framework of industrial wireless network and factors of network node trust transmission, the corresponding relationship of encourage factor, trust value and current cooperation frequency is proposed in this paper and a trust evaluation model is designed, which takes the abnormal behaviors of nodes, historical trust information and trust information of neighbor nodes into comprehensive consideration. This model avoids the limitation of trust judgment merely through abnormal behaviors of nodes and further ensures the fairness and accuracy of network trust evaluation.
引用
收藏
页码:473 / 477
页数:5
相关论文
共 39 条
[31]   Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data [J].
Zhang, Fan ;
Kodituwakku, Hansaka Angel Dias Edirisinghe ;
Hines, J. Wesley ;
Coble, Jamie .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (07) :4362-4369
[32]   A Student's Grade Evaluation Model for Network Teaching System Based on BP Algorithm [J].
Xia Jun ;
Mang Yinshuo ;
Wang Peng .
PROCEEDINGS OF 2013 2ND INTERNATIONAL CONFERENCE ON MEASUREMENT, INFORMATION AND CONTROL (ICMIC 2013), VOLS 1 & 2, 2013, :542-545
[33]   Integrating a High-Reliability Multicriteria Trust Evaluation Model with Task Role-Based Access Control for Cloud Services [J].
Alshammari, Salah T. ;
Albeshri, Aiiad ;
Alsubhi, Khalid .
SYMMETRY-BASEL, 2021, 13 (03)
[34]   Study on Business Action-based Asset Model and Assets Identification of Information System [J].
Yu Zhi-wei .
2011 AASRI CONFERENCE ON INFORMATION TECHNOLOGY AND ECONOMIC DEVELOPMENT (AASRI-ITED 2011), VOL 1, 2011, :246-249
[35]   Study on Business Action-based Asset Model and Assets Identification of Information System [J].
Yu Zhi-wei .
2011 INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND NEURAL COMPUTING (FSNC 2011), VOL IV, 2011, :246-249
[36]   A study on strengthening security awareness programs based on an RFID access control system for inside information leakage prevention [J].
Choi, Kyong-Ho ;
Lee, DongHwi .
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (20) :8927-8937
[37]   A study on strengthening security awareness programs based on an RFID access control system for inside information leakage prevention [J].
Kyong-Ho Choi ;
DongHwi Lee .
Multimedia Tools and Applications, 2015, 74 :8927-8937
[38]   Artificial Immune Wireless Intelligent Sensor and Actuator Network (WISAN) for More Electrical Aircraft Performance Monitoring System (study case: 80 Passenger Aircraft) [J].
Hendrarini, Nina ;
Ema .
Proceeding of 2015 1st International Conference on Wireless and Telematics (ICWT), 2015,
[39]   Predicting Energy Consumption by Creating Power Network Meta Model Creating advanced meta models of power networks using geographical information system and web services for weather prediction [J].
Baldzhiev, Nikolay ;
Ivanov, Ivan Evgeniev .
PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, 2015, :350-352