Cyber-physical system security for networked industrial processes

被引:41
作者
Huang S. [1 ,2 ]
Zhou C.-J. [1 ,2 ]
Yang S.-H. [3 ]
Qin Y.-Q. [1 ,2 ]
机构
[1] School of Automation, Huazhong University of Science and Technology, Wuhan
[2] Key Laboratory of Ministry of Education for Image Processing and Intelligent Control, Wuhan
[3] Department of Computer Science, Loughborough University, Leicestershire
关键词
Critical infrastructures; cyber-physical systems (CPSs); information security; intrusion tolerance; system and architecture design;
D O I
10.1007/s11633-015-0923-9
中图分类号
学科分类号
摘要
Cyber-physical systems (CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology (IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language (AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach. © 2015, Institute of Automation, Chinese Academy of Sciences and Springer-Verlag Berlin Heidelberg.
引用
收藏
页码:567 / 578
页数:11
相关论文
共 35 条
[1]  
Lee E.A., Cyber physical systems: Design challenges, Proceedings of the 11th International Symposium on Object Oriented Real-time Distributed Computing, pp. 363-369, (2008)
[2]  
Zhao L.J., Chai Y.T., Yuan D.C., Selective ensemble extreme learning machine modeling of effluent quality in wastewater treatment plants, International Journal of Automation and Computing, 9, 6, pp. 627-633, (2012)
[3]  
Zhao M.Y., Walker J., Wang C.C., Challenges and opportunities for securing intelligent transportation system, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 3, 1, pp. 96-105, (2013)
[4]  
Hashimoto Y., Toyoshima T., Yogo S., Koike M., Hamaguchi T., Jing S., Koshijima I., Safety securing approach against cyber-attacks for process control system, Computers and Chemical Engineering, 57, pp. 181-186, (2013)
[5]  
Cheminod M., Durante L., Valenzano A., Review of security issues in industrial networks, IEEE Transactions on Industrial Informatics, 9, 1, pp. 277-293, (2013)
[6]  
Lopez J., Alcaraz C., Roman R., Smart control of operational threats in control substations, Computers and Security, 38, pp. 14-27, (2013)
[7]  
ACM Transactions on Autonomous and Adaptive Systems, 6, 3, (2011)
[8]  
Altinisik U., Yildirim M., A new fault tolerant control approach for the three-tank system using data mining, Computers and Electrical Engineering, 38, 6, pp. 1627-1635, (2012)
[9]  
Zhang Y.Y., Zhang J.L., Luo X.Y., Guan X.P., Sensor/actuator faults detection for networked control systems via predictive control, International Journal of Automation and Computing, 10, 3, pp. 173-180, (2013)
[10]  
Fergus D.J., Industrial Control System Security Current Trends & Risk Mitigation, Technical Report. Intekras, Inc., Sterling, USA, (2009)