scholarly journals Approach for Securing Network Communications Modelling Based on Smart Multipath Routing

2020 ◽  
Vol 23 (4) ◽  
pp. 386-396
Author(s):  
A. D. Dakhnovich ◽  
D. A. Moskvin ◽  
D. P. Zegzhda

Digital transformation, or Industry 4.0, is already changing manufacturing processes as it brings more automation to standardized Industrial Control Systems (ICS) based systems such as Supervisory Control and Data Acquisition (SCADA) systems. It is performed by the means of cyber-physical systems such as Internet of Things (IoT). For now, these “Things” are communicating in a new network area, where peer-to-peer communications are widely used. Such networks are responsible for real life processes safety. However, such shift also extends a threat vectors and entry points for an adversary inside the industrial segments. In the paper, new cybersecurity challenges on the Industrial Internet of Things network segments are considered as well as known practices to mitigate some of them. As a result, a peer-to-peer smart multipath network routing based on garlic routing is proposed to model secure network communications in IoT field. An approach is aimed to be used on the IoT field to tackle all of the network-scoped cybersecurity challenges.

2019 ◽  
Vol 11 (3) ◽  
pp. 66 ◽  
Author(s):  
Samer Jaloudi

Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled. However, the MODBUS TCP is an open de facto standard, and is used for some automation and telecontrol systems. It is based on a polling mechanism and follows the synchronous request–response pattern, as opposed to the asynchronous publish–subscribe pattern. In this study, polling-based and event-based protocols are investigated to realize an open and interoperable Industrial Internet of Things (IIoT) environment. Many Internet of Things (IoT) protocols are introduced and compared, and the message queuing telemetry transport (MQTT) is chosen as the event-based, publish–subscribe protocol. The study shows that MODBUS defines an optimized message structure in the application layer, which is dedicated to industrial applications. In addition, it shows that an event-oriented IoT protocol complements the MODBUS TCP but cannot replace it. Therefore, two scenarios are proposed to build the IIoT environment. The first scenario is to consider the MODBUS TCP as an IoT protocol, and build the environment using the MODBUS TCP on a standalone basis. The second scenario is to use MQTT in conjunction with the MODBUS TCP. The first scenario is efficient and complies with most industrial applications where the request–response pattern is needed only. If the publish–subscribe pattern is needed, the MQTT in the second scenario complements the MODBUS TCP and eliminates the need for a gateway; however, MQTT lacks interoperability. To maintain a homogeneous message structure for the entire environment, industrial data are organized using the structure of MODBUS messages, formatted in the UTF-8, and then transferred in the payload of an MQTT publish message. The open and interoperable environment can be used for Internet SCADA, Internet-based monitoring, and industrial control systems.


2011 ◽  
Vol 216 ◽  
pp. 360-363 ◽  
Author(s):  
Jun Wang ◽  
Zhan Mei ◽  
Li Feng Wei

For further development and building a solid foundation of industrial Internet of things, a wireless communication card (WCC) based on UWB used in industrial Internet of Things (IoT) is designed in the paper. The implementations of WCC are proposed and critical problem on software design is solved. It successfully solves the problem of communication with IO card. At the same time, it provides upgrade program form industrial control systems to industrial Internet of Things.


Author(s):  
Yangha Chun

In the past, the general practice for the control system network that manages and controls industrial facilities such as electric power, gas, oil, water, chemicals, automobiles, etc. was to install and operate this as an independent system, but over time the practice has gradually shifted toward the use of an open and standardized system. Until recently, most industrial control systems consisted of an independent network, and the possibility of cyber threat infringement was very low. As information storage media such as laptops or USB are connected to the control system for maintenance or management purposes, the possibility of cyber infringement is increasing. When the use of the control system's operational information increases due to beingVinked with the internal business system network or the Internet, countermeasures against external cyber threats must be provided.This paper analyzes and organizes the cyber threat factors that exist in the linking section connected to the industrial control system and other networks, examining domestic and foreign incidents of hacking of control systems to identify the vulnerabilities and security measures for each scenario in the control system network linkage section. Through this analysis, a method is suggested for establishing a control network that secures both availability and security, which are important in the control system, as well as the safe relay system in the configuration of the linkage between the control network and the business network, while addressing the vulnerabilities in the structure due to long-term use of the control system.This study analyzes cyber threat factors and real-life examples of infringements with the aim of providing approaches that will ensure industrial control systems can be operated safely and the risk of cyber hacking threats that occur in connection with other networks can be managed, and suggesting cyber security measures for the control system connection sections.


2021 ◽  
Author(s):  
Marieke Klaver ◽  
Eric Luiijf

Information and communication technology (ICT) plays an important role in critical infrastructures (CIs). Some ICT-based services are in itself critical for the functioning of society while other ICT elements are essential for the functioning of critical processes within CIs. Moreover, many critical processes within CIs are monitored and controlled by industrial control systems (ICS) also referred to as operational technology (OT). In line with the CI-concept, the concept of critical information infrastructure (CII) is introduced comprising both ICT and OT. It is shown that CIIs extend beyond the classical set of CIs. The risk to society due to inadvertent and deliberate CI/CII disruptions has increased due to the interrelation, complexity, and dependencies of CIs and CIIs. The cyber risk due to threats to and vulnerabilities of ICT and OT is outlined. Methods to analyze the cyber risk to CI and CII are discussed at both the organization, national, and the service chain levels. Cyber threats, threat actors, and the organizational, personnel, and technological cyber security challenges are outlined. An outlook is given to near future cyber security risk challenges, and therefore upcoming risk, stemming from (industrial) internet of things and other new cyber-embedded technologies.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Hanrui Zhang ◽  
Qianmu Li ◽  
Shunmei Meng ◽  
Zhuoran Xu ◽  
Chaoxian Lv

With the rapid development of intelligent manufacturing and Industrial Internet of Things, many industrial control systems have high requirements for the security of the system itself. Failures of industrial control equipment will cause abnormal operation of industrial control equipment and waste of resources. It is very meaningful to detect and identify potential equipment abnormalities and failures in time and implement effective fault tolerance strategies. In the Industrial Internet of Things environment, the instructions and parameters of industrial control equipment often change due to changes in actual requirements. However, it is impractical to customize the learning method for each parameter value. Aiming at the problem, this paper proposes a fault diagnosis model based on ensemble learning and proposes a method of updating voting weights based on dynamic programming to assist decision-making. This method is based on Bagging strategy and combined with dynamic programming voting weight adjustment method to complete fault type prediction. Finally, this paper uses different loads as dynamic conditions; the diagnostic capability of the Bagging-based fault diagnosis integrated model in a dynamically changing industrial control system environment is verified by experiments. The fault diagnosis model of industrial control equipment based on ensemble learning effectively improves the adaptive ability of the model and makes the fault diagnosis framework truly intelligent. The voting weight adjustment method based on dynamic programming further improves the reliability of voting.


Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 572 ◽  
Author(s):  
Jiawen Xiong ◽  
Gang Zhu ◽  
Yanhong Huang ◽  
Jianqi Shi

Programmable logic controllers (PLCs) are special embedded computers that are widely used in industrial control systems. To ensure the safety of industrial control systems, it is necessary to verify the correctness of PLCs. Formal verification is considered to be an effective method to verify whether a PLC program conforms to its specifications, but the expertise requirements and the complexity make it hard to be mastered and widely applied. In this paper, we present a specification-mining-based verification approach for IEC 61131-3 PLC programs. It only requires users to review specifications mined from the program behaviors instead of model checking for specified specifications, which can greatly improve the efficiency of safety verification and is much easier for control system engineers to use. Moreover, we implement a proof-of-concept tool named PLCInspector that supports directly mining LTL specifications and data invariants from PLC programs. Two examples and one real-life case study are presented to illustrate its practicability and efficiency. In addition, a comparison with the existing verification approaches for PLC programs is discussed.


2021 ◽  
Author(s):  
Chia-Mei Chen ◽  
Zheng-Xun Cai ◽  
Gu-Hsin Lai

The “Industry 4.0” revolution and Industry Internet of Things (IIoT) has dramatically transformed how manufacturing and industrial companies operate. Industrial control systems (ICS) process critical function, and the past ICS attacks have caused major damage and disasters in the communities. IIoT devices in an ICS environment communicate in heterogeneous protocols and the attack vectors might exhibit different misbehavior patterns. This study proposes a classification model to detect anomalies in ICS environments. The evaluation has been conducted by using ICS datasets from multiple sources and the results show that the proposed LSTM detection model performs effectively.


Sign in / Sign up

Export Citation Format

Share Document