Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework

Author(s):  
Cong Chen ◽  
Dongdai Lin
Author(s):  
Claudia ARAUJO MACEDO ◽  
Jos MENTING

Cybersecurity in industrial control system environments has become a significant concern and is even more relevant in the context of critical infrastructures where control system disruption could have a profound impact on health, safety and the environment. This makes this type of system a major target for malicious activities. Notwithstanding an organization’s interest in protecting its industrial control systems against cyber-attacks, the implementation of security measures, whether technical, organizational or human, still faces resistance and is often seen as a constraint. Using the best technology to protect industrial control systems makes no sense if persons with access do not act attentively and protectively. Technical and human cybersecurity measures are intrinsically linked, and it is essential that all persons with access to these systems are fully aware of the inherent cyber risks. Organizations must also act so that staff receive appropriate training on how to keep systems continuously protected against cyber-attack when carrying out their daily tasks. These educational processes can contribute to building an effective cybersecurity culture fully reflective of management and staff attitudes, so that the availability, integrity and confidentiality of information in industrial control systems can be assured.


2021 ◽  
Vol 14 (1) ◽  
pp. 376-386
Author(s):  
Eko Riyadi ◽  
◽  
Tri Priyambodo ◽  
Agfianto Putra ◽  
◽  
...  

Most of the communication protocols in the Industrial Control System (ICS) are vulnerable to cyber-attacks. Initially, the network protocol was designed for reliable performance, and thus did not incorporate data transmission security features. Therefore, ICS requires adequate data transmission security. This paper suggests improving the security of data transmission through a dynamic symmetric four-key-generators system, wherein the system anticipates cyberattacks by generating four keys before encryption. It involves four generators: a random initial key generator, a keystream generator, a key scheduling algorithm generator, and a pseudo-random number algorithm generator. In the receiver section, the system generates three keys before decryption to ensure data confidentiality and to avoid cyberattacks. The test results show that the proposed system keyspace is ≈22048 bits, meaning that the key is more secure from brute force attacks. As a result, the cipher data have a correlation value of 0.00007. The entropy value is 7.99, indicating that the cipher data is more secure. Also, speed tests show that the processing time still qualifies as realtime.


Author(s):  
Adam Padée ◽  
Michał Wójcik ◽  
Arkadiusz Ćwiek ◽  
Konrad Klimaszewski ◽  
Przemysław Kopka ◽  
...  

This paper outlines the problem of cybersecurity in OT (operations/operational technology) networks. It provides descriptions of the most common components of these systems, summarizes the threats and compares them with those present in the IT domain. A considerable section of the paper summarizes research conducted over the past decade, focusing on how common the problem is and in which countries it prevails. The article presents techniques most commonly used in the protection of these systems, with many examples from the nuclear industry given.


2018 ◽  
Author(s):  
Kevin E. Hemsley ◽  
Dr. Ronald E. Fisher

Sign in / Sign up

Export Citation Format

Share Document