Bảo mật và xác thực thông tin trong mạng điều khiển công nghiệp
Abstract— This paper presents a solution for secure and authentication of industrial control systems based-on the analysis of some attack models in control systems, especially phishing attacks and DoS attacks. We propose a solution that AES encryption is used to protect control signals and the hash function is used to authenticate. In our experiment, we have built two modules: attack detection and reaction to detect misleading control information between devices in industrial control systems.
Tài liệu tham khảo [1]. Eric D.Knapp, “Industrial Network Security”, Elsevier Inc, 2011. [2]. Sjoerd Peerkamp, “Process Control Network Security”, ICT Security and Control, 2010. [3]. Alvaro A.Cárdenas, Saurabh Amin, Shankar Sastry, “Research Challenges for the Security of Control Systems”, University of California, Berkeley, 2008. [4]. A. Treytl, T. Sauter, C. Schwaiger, “Security measures for Industrial Fieldbus Systems – State of the Art and Solutions for IP-Based Approaches” in Proc. WFCS 2004 IEEE International Workshop on Factory Communication System, 2004. [5]. M. Tangermann, D. Reinetl, “Security concept for automation networks” in Praxis Profiline Industrial Ethernet Volume D/E, Vogel Industrie Medien GmbH & Co. KG, Wurzburg, 2006. [6]. Alvaro A.Cárdenas, Saurabh Amin, Shankar Sastry, S. Secure control: Towards survivable cyber-physical systems. In Proceedings of the First International Workshop on Cyber-Physical Systems, June 2008. [7]. William Stallings, “Cryptography and Network security Principles and Practice”, Fifth Edition, 2011. [8]. FIPS-197, National Institue of Standards and Technology, 11-2001. [9]. AES page http://www.nist.gov/CryptoToolkit [10]. P. Neumann, “Communication in industrial automation - what is going on?” in Control Engineering Practice. Elsevier Ltd, 2006, vol. 15, pp. 1332–1347. [11]. Nguyễn Đào Trường, Nguyễn Đức Tâm, “Một phương pháp chống tấn công giả mạo trong hệ thống điều khiển”, Tạp chí Nghiên cứu KH-CN số 31, 06-2014, Tr. 104-108. [12]. NIST SP 800-131A, “Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths”, 2011. |
Nguyễn Đào Trường, Nguyễn Đức Tâm, Nguyễn Thị Nga