scholarly journals Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System

2020 ◽  
Vol 10 (8) ◽  
pp. 2796 ◽  
Author(s):  
Raimarius Delgado ◽  
Jaeho Park ◽  
Cheonho Lee ◽  
Byoung Wook Choi

Android is gaining popularity as the operating system of embedded systems and recent demands of its application on industrial control are steadily increasing. However, its feasibility is still in question due to two major drawbacks: safety and security. In particular, ensuring the safe operation of industrial control systems requires the system to be governed by stringent temporal constraints and should satisfy real-time requirements. In this sense, we explore the real-time characteristics of Xenomai to guarantee strict temporal deadlines, and provide a viable method integrating Android processes to real-time tasks. Security is another issue that affects safety due to the increased connectivity in industrial systems provoking a higher risk of cyber and hardware attacks. Herein, we adopted a hardware copy protection chip and enforced administrative security policies in the booting process and the Android application layer. These policies ensure that the developed system is protected from physical tampering and unwanted Android applications. The articulacy of the administrative policies is demonstrated through experiments. The developed embedded system is connected to an industrial EtherCAT motion device network exhibiting operability on an actual industrial application. Real-time performance was evaluated in terms of schedulability and responsiveness, which are critical in determining the safety and reliability of the control system.

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Wenli Shang ◽  
Xiangyu Xing

Aiming at the real-time requirements for industrial control systems, we proposed a corresponding trust chain method for industrial control system application software and a component analysis method based on security sensitivity weights. A dynamic length trust chain structure is also proposed in this paper. Based on this, the industrial control system software integrity measurement method is constructed. Aimed at the validity of the model, a simulation attack experiment was performed, and the performance of the model was repeated from multiple perspectives to verify the performance of the method. Experiments show that this method can effectively meet the integrity measurement under the condition of high real-time performance, protect the integrity of files, and improve the software credibility of industrial control system.


Author(s):  
Claudia ARAUJO MACEDO ◽  
Jos MENTING

Cybersecurity in industrial control system environments has become a significant concern and is even more relevant in the context of critical infrastructures where control system disruption could have a profound impact on health, safety and the environment. This makes this type of system a major target for malicious activities. Notwithstanding an organization’s interest in protecting its industrial control systems against cyber-attacks, the implementation of security measures, whether technical, organizational or human, still faces resistance and is often seen as a constraint. Using the best technology to protect industrial control systems makes no sense if persons with access do not act attentively and protectively. Technical and human cybersecurity measures are intrinsically linked, and it is essential that all persons with access to these systems are fully aware of the inherent cyber risks. Organizations must also act so that staff receive appropriate training on how to keep systems continuously protected against cyber-attack when carrying out their daily tasks. These educational processes can contribute to building an effective cybersecurity culture fully reflective of management and staff attitudes, so that the availability, integrity and confidentiality of information in industrial control systems can be assured.


Author(s):  
Devdas Shetty ◽  
Naresh Poudel ◽  
Esther Ososanya

Increasing demands on the productivity of complex systems, such as machine tools and their steadily growing technological importance will require the application of new methods in the product development process. This paper shows that the analysis of the simulation results from the simulation based mechatronic model of a complex system followed by a procedure that allows a better understanding of the dynamic behavior and interactions of the components. Mechatronics is a design philosophy, which is an integrating approach to engineering design. Through a mechanism of simulating interdisciplinary ideas and techniques, mechatronics provides ideal conditions to raise the synergy, thereby providing a catalytic effect for the new solutions to technically complex situations. This paper shows how the mechatronic products can exhibit performance characteristics that were previously difficult to achieve without the synergistic combination. The paper further examines an approach used in modeling, simulation and optimization of dynamic machine tools and adopts it for general optimized design of mechatronics instrumentation and portable products. By considering the machine tool as a complete mechatronic system, which can be broken down into subsystems, forms the fundamental basis for the procedure. Starting from this point of view it is necessary to establish appropriate simulation models, which are capable of representing the relevant properties of the subsystems and the dynamic interactions between the machine components. Many real-world systems can be modeled by the mass-spring-damper system and hence considering one such system, namely Mechatronics Technology Demonstrator (MTD) is discussed here. MTD is a portable low cost, technology demonstrator, developed and refined by the authors. It is suitable for studying the key elements of mechatronic systems including; mechanical system dynamics, sensors, actuators, computer interfacing, and application development. An important characteristic of mechatronic devices and systems is their built-in intelligence that results through a combination of precision, mechanical and electrical engineering, and real time programming integrated to the design process. The synergy can be generated by the right combination of parameters, that is, the final product can be better than just the sum of its parts. The paper highlights design optimization of several mechatronic products using the procedures derived by the use of mass spring damper based mechatronic system. The paper shows step by step development of a mechatronic product and the use of embedded software for portability of hand held equipment. A LabVIEW based platform was used as a control tool to control the MTD, perform data acquisition, post-processing, and optimization. In addition to the use of LabVIEW software, the use of embedded control system has been proposed for real-time control and optimization of the mass-spring-damper system. Integrating embedded control system with the mass-spring-damper system makes the MTD a multi-concepts Mechatronics platform. This allows interface with external sensors and actuators with closed-loop control and real-time monitoring of the physical system. This teaches students the skill set required for embedded control: design control algorithms (model-based embedded control software development, signal processing, communications), Computer Software (real-time computation, multitasking, interrupts), Computer hardware (interfacing, peripherals, memory constraints), and System Performance Optimization. This approach of deriving a mathematical model of system to be controlled, developing simulation model of the system, and using embedded control for rapid prototyping and optimization, will practically speed product development and improve productivity of complex systems.


2015 ◽  
Vol 11 (5) ◽  
pp. 64
Author(s):  
Jan Vávra ◽  
Martin Hromada ◽  
Roman Jašek

The contemporary trend of increasing connectivity, interoperability and efficiency of technologies, which are used in organizations, also affected Industrial Control System (further only ICS). The recently isolated system is becoming more dependent on interconnection with external technologies. This leads to a formation of new vulnerabilities, which are significant threats to ICS. For this reason, it is necessary to devote considerable effort to analyze vulnerabilities. Neglecting of this area could lead to damage or unavailability of ICS services. The purpose of the article is to evaluate vulnerabilities related to individual elements of ICS. The fundamental question of the article is to find a true distribution of security risk related to ICS.


2018 ◽  
Vol 7 (2.14) ◽  
pp. 153 ◽  
Author(s):  
Qais Saif Qassim ◽  
Norziana Jamil ◽  
Maslina Daud ◽  
Norhamadi Ja'affar ◽  
Salman Yussof ◽  
...  

IEC 60870-5-104 is an international standard used for tele-control in electrical engineering and power system applications. It is one of the major principal protocols in SCADA system. Major industrial control vendors use this protocol for monitoring and managing power utility devices. One of the most common attacks which has a catastrophic impact on industrial control systems is the control command injection attack. It happens when an attacker injects false control commands into a control system. This paper presents the IEC 60870-5-104 vulnera-bilities from the perspective of command and information data injection. From the SCADA testbed that we setup, we showed that a success-ful control command injection attack can be implemented by exploiting the vulnerabilities identified earlier.  


Sign in / Sign up

Export Citation Format

Share Document