期刊文献+

面向工控系统的安全可信技术 被引量:5

Technology of security and credibility for industrial control system
下载PDF
导出
摘要 针对工控系统面临的主要安全问题进行较为深入的分析,结合自主可控技术、可信计算技术、冗余容错技术,设计自主可信工控计算机、三模冗余可信执行装置,提出一种可信联锁互锁方法,探索一种实现工控系统安全的途径。实验结果表明,该系统能够完成对操作站关键安全属性的可信度量,能够确保执行装置每一步动作的安全,系统开销可控制在接受范围内。 The main security problems of the industrial control system were analyzed. Combined with the self-controlled technology, trusted computing technology, redundancy and fault tolerance technology, self-controlled and trusted industrial control computer and triple modular redundancy trusted execution device, a trusted interlock method was proposed and a way to achieve the industrial control system security was explored. Experimental results show that the system can complete the trusting measurement of critical attributes of the operating station, and ensure the safety of every step of the execution device, and the system overhead is controlled within an acceptable range.
出处 《计算机工程与设计》 北大核心 2017年第1期47-52,共6页 Computer Engineering and Design
基金 北京市自然科学基金项目(4132025) 北京市青年英才计划基金项目(YETP1448) 国家自然科学基金青年基金项目(61402022) 北京市哲学社科规划基金项目(14JGB033)
关键词 工控系统 可信计算 三模冗余 可信密码模块 自主可控 industrial control system trusted computing triple modular redundancy trust cryptography module self-controllable
  • 相关文献

参考文献2

二级参考文献105

  • 1缪学勤.20种类型现场总线进入IEC61158第四版国际标准[J].自动化仪表,2007,28(z1):25-29. 被引量:17
  • 2NIST SP800-82.Guide to Industrial Control Systems(ICS)Security[S].Gaithersburg,USA:National Institute of Standards and Technology(NIST),2011.
  • 3Simon H A.The architecture of complexity[C] //Proceedings of the American Philosophical Society.Philadelphia,USA:Batsford,1962:467-482.
  • 4Bishop M.Computer Security[M].Boston,USA:Addison Wesley,2003.
  • 5Department of Homeland Security(DHS).Cyber Security Assessments of Industrial Control System[S].Washington DC,USA:Department of Homeland Security(DHS),2010.
  • 6The European Network and Information Security Agency(ENISA).Protecting Industrial Control Systems,Recommendations for Europe and Member States[R].Heraklion,Greece:Recommendations for Europe and Member States,2011.
  • 7Byres E J,Kay J,Carter J.Myths and facts behind cyber security and industrial control(2003)[Z/OL].(2010-02-12),http://www.pimaweb.org/conference/april2003/pdfs/MythsAndFactsBehindCyberSecurity.pdf.
  • 8David A.Multiple Efforts to Secure Control Systems Are Under Way,but Challenges Remain,GAO-07-1036[R].Washington DC,USA:US Government Accountability Office(US GAO),2007.
  • 9IEC61508.Functional Safety of E/E/PE Safety-Related Systems[S].Geneva,Switzerland:International Electrotechnical Commission(IEC),2000.
  • 10Piètre-Cambacédès L,Chaudet C.The SEMA referential framework:Avoiding ambiguities in the terms“security”and“safety”[J].International Journal of Critical Infrastructure Protection,2010,3(2):55-66.

共引文献213

同被引文献31

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部