期刊文献+

智能制造系统安全风险分析 被引量:9

Security Risk Analysis of Intelligent Manufacturing System
下载PDF
导出
摘要 智能制造系统是一种由智能机器和人类专家共同组成的人机一体化智能系统,是以信息物理系统为基础,将生产及制造设备和过程与新一代信息技术深度融合的网络化、智能化的系统,是我国推进两化深度融合的主攻方向。与传统信息系统不同,智能制造系统的高度集成、信息融合、异构网络互联互通等特性为系统安全带来了巨大的挑战。本文基于对智能制造系统的概念、技术体系、参考架构和安全风险因素的分析,提出了一个层次化的安全风险矩阵,并提出了安全防护建议。 Based on Cyber-physical systems(CPS),intelligent manufacturing system is a networked,intelligent and man-machine integrative system consisting of smart machines and human experts,which is adeeply essential amalgamation of production and manufacturing equipments,processes with new-generationinformation communication technology(ICT).Intelligent manufacturing system is the main orientation ofdeep integration of informationization and industrialization promoted by Chinese government.Different fromtraditional information systems,characteristics of intelligent manufacturing system,such as highly integration,information fusion,heterogeneous networks’interconnection introduce huge security challenges.Based on aserial analysis of concept,technologies,reference architecture and risk factors of Intelligent manufacturingsystem,a hierarchical security risk matrix and security protection recommendations were proposed.
作者 周峰 邵枝华 陈渌萍 Zhihua Shao;Feng Zhou;Lu-ping Chen(Research Center for Computer and Microelectronics Industry Development,(China Software Testing Center), Beijing, 100048, China)
出处 《电子科学技术》 2017年第2期45-51,共7页 Electronic Science & Technology
关键词 智能制造 信息安全 风险分析 安全防护 Intelligent Manufacturing System Security Risk Analysis Security Protection
  • 相关文献

参考文献2

二级参考文献22

  • 1ITU Internet Report 2005:The Internet of Things[R/OL].[2005-11-17] http://www.itu.int/osg/spu/publications/internetofthings/.
  • 2OHN H,MARBURGER J H,KVAMME E F,et al.Leadership Under Challenge:Information Technology R&D in a Competitive World[R/OL].[2005-11-17].An Assessment of the Federal Networking and Information Technology R&D Program.2007-08.http://ostp.gov/pdf/nitrd_review.pdf.
  • 3蒋林涛.单一IP技术很难满足物联网的需求[C] //2000年中国通信产业发展形势报告会,北京.2010.
  • 4KARLOF C,WAGNER D.Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[C] //Proceedings of the 1 st International Workshop on Sensor Network Protocols and Applications (SNPA'03),May 11,2003,Berkeley,CA,USA.Los Alamitos.CA,USA:lEEE Computer Society,2003:113-127.
  • 5STALLINGS W.Cryptography and Network Security:Principles and Practice[M] 4th ed.Boston.MA,USA:Prentice Hall,2006.
  • 6CARDENAS A A.AMIN S,SASTRY S.Secure Control:Towards Survivable Cyber-Physical Systems[C] //Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS'08),Jun 17-20,2008,Beijing,China Piscataway,NJ,USA:IEEE,2008:495-500.
  • 7ABDELZAHER T.Research Challenges in Distributed Cyber-Physical Systems[C] //Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing(EUC'08):Vol 1,Dec 17-20,2008,Shanghai,China.Piscataway,NJ,USA:IEEE,2008:5.
  • 8DJENOURI D,KHELLADI L,BADACHE A N.A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks[J].IEEE Communications Surveys & Tutorials,2005,7(4):2-28.
  • 9WANG Yong,ATTEBURY G,RAMAMURTHY B.A Survey of Security Issues in Wireless Sensor Networks[J].IEEE Communications Surveys & Tutorials,2006,8(2):2-23.
  • 10PERRIG A,STANKOVIC J,WAGNER D.Security in Wireless Sensor Networks[J].Communications of the ACM,2004,47(6):53-57.

共引文献52

同被引文献133

引证文献9

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部