首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Reducing security vulnerabilities for critical infrastructure
Authors:Dae Hyun Ryu  HyungJun Kim  Keehong Um
Institution:1. CTS, Uninova, Portugal;2. Dep. de Eng. Electrotécnica, Faculdade de Ciências e Tecnologia, FCT, Universidade Nova de Lisboa, 2829-516 Caparica, Portugal;3. IT, Instituto de Telecomunicações, Portugal;1. Dipartimento di Ingegneria Civile e Industriale, Università di Pisa, Largo Lucio Lazzarino 2, 56126 Pisa, Italy;2. Safety and Security Science Group, Faculty of Technology, Policy, and Management, Delft University of Technology, Jaffalaan 5, 2628 BX Delft, The Netherlands;3. Faculty of Economics and organizational sciences, Campus Brussels, KULeuven, Warmoesberg 26, 1000 Brussels, Belgium;4. DICAM ? Laboratory of Industrial Safety and Environmental Sustainability, Alma Mater Studiorum ? Università di Bologna, via Terracini n.28, 40131 Bologna, Italy;5. Istituto di Ricerche sulla Combustione, CNR, Via Diocleziano 328, 80124 Napoli, Italy;1. Seconda Universita di Napoli, Dipartimento di Matematica e Fisica, viale Lincoln, 5, 81100 Caserta, Italy;2. Ansaldo STS, Innovation and Competitiveness Unit, Via Argine 425, Naples, Italy;3. Universita di Napoli Federico II, Dipartimento di Ingegneria Elettrica e delle Tecnologie dell''Informazione, Via Claudio 21, 80125 Naples, Italy;4. Faculty of Engineering, Universita campus Bio-Medico di Roma, via Alvaro del Portillo 21, 00128 Rome, Italy
Abstract:In this paper, we show the need for improved Process Control System (PCS) security, and describe some of the promising research areas in PCS security. One implementation of PCS in critical infrastructure and factory automation is a supervisory, control, and data acquisition (SCADA) system, a real-time industrial process control system which centrally monitors and controls remote and/or local processes utilizing plant, equipment, or devices (such as switches, valves, pumps, relays, etc.) while collecting and logging field data. Current SCADA systems are distributed, networked, and dependent on open protocols for the internet, which are exposed to remote cyber terrorism. They are particularly vulnerable to unauthorized access. We give some examples of SCADA processes with natural gas control systems in USA and the Ubiquitous Sensor Network (USN) in Korea. We also examine a representative vulnerability and corresponding measures for security, and present an example of concrete measures for the security of mass transportation as a critical infrastructure.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号