Opansec - security integrity monitoring for controllers

نویسندگان

  • Mithil Parekh
  • Yuan Gao
  • Deeksha Gupta
  • Christian Luschmann
چکیده

Industrial automation and control systems (IACS) are more and more a combination of standardized hardware and software components that are respectively linked. A continuous increase in digital Instrumentation and Control (I&C) in production lines and critical infrastructures lead to a remarkable increase in computer-based digital security risk [IE10]. The Internet of Things, services, data and people also opens up new avenues for data theft, industrial espionage and attacks by hackers [BM16]. Currently many solutions are available for industrial network and software but more focus is still required for controller programming integrity checks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Priority-based Multi-level Monitoring of Signal Integrity in a Distributed Powertrain Control System

With the increasing numbers and importance of Electronic Control Units (ECUs) in modern automobiles, there is a need to monitor system and signal integrity to enable desired system behavior. Among the various signals in a vehicle, those associated with torque commands must be prioritized over others while preserving signal integrity as they have a large impact on meeting the powertrain performa...

متن کامل

Cyber Security of Smart Grid Systems Using Intrusion Detection Methods

The wide area monitoring of power systems is implemented at a central control center to coordinate the actions of local controllers. Phasor measurement units (PMUs) are used for the collection of data in real time for the smart grid energy systems. Intrusion detection and cyber security of network are important requirements for maintaining the integrity of wide area monitoring systems. The intr...

متن کامل

Through modeling to synthesis of security automata 1

We define a set of process algebra operators, that we call controller operators, able to mimic the behavior of security automata introduced by Schneider in [17] and by Ligatti and al. in [3]. Security automata are mechanisms for enforcing security policies that specify acceptable executions of programs. Here we give the semantics of four controllers that act by monitoring possible un-trusted co...

متن کامل

Hydraulic anti-lock, anti-skid braking system using fuzzy controller

To maintain the stability trajectory of vehicles under critical driving conditions, anti lock-anti skid controllers, consisting of four anti-lock sub-controllers for each wheel and two anti-skid sub-controllers for left and right pair wheels have been separately designed. Wheel and body systems have been simulated with seven degrees of freedom to evaluate the proper functioning of controllers. ...

متن کامل

A Novel Method for Tracking Moving Objects using Block-Based Similarity

Extracting and tracking active objects are two major issues in surveillance and monitoring applications such as nuclear reactors, mine security, and traffic controllers. In this paper, a block-based similarity algorithm is proposed in order to detect and track objects in the successive frames. We define similarity and cost functions based on the features of the blocks, leading to less computati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016