期刊文献+

工业控制系统无线网络安全体系的研究 被引量:13

Research on wireless network security architecture of industrial control system
下载PDF
导出
摘要 随着我国工业化和信息化的深度融合以及物联网的快速发展,工业控制系统的信息安全已经上升到国家的战略安全。特别是在恶劣的工业现场环境应用的工业无线网络,更容易遇到各种各样的风险和安全威胁,这使得安全性成为无线网络正常通信的关键问题。文中介绍了工业控制系统无线网络技术,分析了工业控制系统无线网络面临的安全威胁,研究了ISA100.11a网络、无线HART网络和WIA-PA网络的安全架构,同时,对这三种安全体系进行了比较和分析。 With the combination of industrialization and informatization as well as the rapid development of Internet of Things in China, information security of industrial control system (ICS) has been promoted to the state's strategy security. Industrial wireless network, which is often applied in abominable industrial environment, is more likely to confront various risks and security threats. Therefore, security has become the key to the normal correspondence of wireless network. This paper introduces the wireless network technology of ICS, analyzes the security threats faced by ICS, researches in the security architecture of wireless HART network, ISA100.11a network and WIAPA network and finally makes a comparative analysis of the three architecture.
出处 《信息技术》 2013年第1期36-38,42,共4页 Information Technology
基金 黑龙江省自然科学基金面上项目(F201244)
关键词 信息安全 工业控制系统 无线网络 安全体系 information security industry control system wireless network security system
  • 相关文献

参考文献16

二级参考文献22

  • 1WirelessHART Device Specification. HCF Standard, HCF_SPEC-290, Revision 1.1.
  • 2C8PSK Physical Layer Specification. HCF Standard, HCF_SPEC-60, Revision 1.0.
  • 3TDMA Data Link Layer Specification. HCF Standard, HCF_SPEC-075, Revision 1.1.
  • 4Network Management Specification. HCF Standard, HCF_SPEC-085, Revision 1.1.
  • 5ISA100: Wireless Systems for Automation, Fttp:// www.isa.org/MSTemplate.cfm?MicrositeID=1 134& CommitteeID=6891.
  • 6ISA_100_11a Draft_D1-2008-05-05.Ftp://ftp.isa.org.
  • 7WirelessHART Standard Approved and Released, http:// www.hartcomm2.org/hcf/press/pr2007/hart7released. html.
  • 8Pottle G J, Kaiser W J. Embedding the internet., wireless integrated network sensors [C]. Communications of the ACM, 2000,43(5):51-58
  • 9Wood A D, Stankovic J A. Denial of service in sensor networks.IEEE Computer,2002, 35(10): 54-62
  • 10Pister K, Hohlt B,Jeong J, Doherty L,Vainio J P. Ivy-A sensor network infrastructure. 2003. http://www-bsac. eecs. Berkeley. edu/projects/ivy

共引文献44

同被引文献131

  • 1裴瑞凌,荣冈.炼油过程的智能工厂流程模拟仿真平台[J].化工自动化及仪表,2005,32(2):43-46. 被引量:14
  • 2郎为民,杨宗凯,吴世忠,谭运猛.无线传感器网络安全研究[J].计算机科学,2005,32(5):54-58. 被引量:27
  • 3李长福,王刚,周宇鹏.基于本体论的企业参考模型的研究[J].机械设计与制造,2006(4):162-164. 被引量:1
  • 4湛成伟.网络安全技术发展趋势浅析[J].重庆工学院学报,2006,20(8):119-121. 被引量:22
  • 5XC系列可编程序控制器操作手册(XC1/XC3/XC5/XCM).信捷科技电子有限公司.
  • 6IEEE. IEEE Std 802,15.4-2006 Wireless Medium Access Control(MAC) and Physical Layer(PHY) Specifications for Low-rate Wireless Personal Area Networks(LR-WPANs)[S] 2006.
  • 7Texas Instmments.CC2530 Data Sheet. http://www.ti.com. 2011.
  • 8Future Teehnology Devices International Limited. Software Application Development D2xx Programmer's guide[Z/OL] http ://www. ftdiehip, com.
  • 9WU Haitao, CHENG Shiduan, PEUG Yong. IEEE 802. 11 Dis- tributed Coordination Function(DCF) : Analysis and Enhancement [ C ]//ICC 2002, New York, USA, April 2002.
  • 10YE W, HEIDEMANN J, ESTRIN D. An Energy-efficient MAC Protocol for Wireless Sensor Network [ C ]//In : Proc. of the IN- FOCOM 2002, San Francisco: IEEE Computer Society, 2002.

引证文献13

二级引证文献100

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部