期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Review of PLC Security Issues in Industrial Control System 被引量:1
1
作者 Xiaojun Pan Zhuoran Wang Yanbin Sun 《Journal of Cyber Security》 2020年第2期69-83,共15页
Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number ... Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number of industrial control systems are connected to the Internet which exposes the PLC equipment to the Internet,and thus raising security concerns.First of all,we introduce the basic principle of PLC in this paper.Then we analyze the PLC code security,firmware security,network security,virus vulnerability and Modbus communication protocol by reviewing the previous related work.Finally,we make a summary of the current security protection methods. 展开更多
关键词 Industrial control system plc security issues plc safety protection
下载PDF
PLC Protection System Based on Verification Separation
2
作者 Xiaojun Pan Haiying Li +2 位作者 Xiaoyi Li Li Xu Yanbin Sun 《Computers, Materials & Continua》 SCIE EI 2022年第5期2401-2417,共17页
Supervisory control and data acquisition systems(SCADAs)play an important role in supervising and controlling industrial production with the help of programmable logic controllers(PLCs)in industrial control systems(IC... Supervisory control and data acquisition systems(SCADAs)play an important role in supervising and controlling industrial production with the help of programmable logic controllers(PLCs)in industrial control systems(ICSs).A PLC receives the control information or program from a SCADA to control the production equipment and feeds the production data back to the SCADA.Once a SCADA is controlled by an attacker,it may threaten the safety of industrial production.The lack of security protection,such as identity authentication and encryption for industrial control protocols,increases the potential security risks.In this paper,we propose a PLC protection system combined with a monitor between a SCADA and a PLC and a physically separated monitoring station.By using the PLC protection system,identity verification and command verification are separated,and both the identity of the operator and the corresponding commands are recorded.Experiments show that even if the SCADA is controlled by an attacker,our system could still protect the PLC in the field and record the identity of the key command operator,which facilitates the tracing and forensics of malicious activities. 展开更多
关键词 ICS SCADA plc security
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部