2015 International Conference on Industrial Instrumentation and Control (ICIC) 2015
DOI: 10.1109/iic.2015.7150724
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation of a security framework for industrial control systems

Abstract: We address the problems of network and reconfiguration attacks on an industrial control system (ICS) by describing a trustworthy autonomic interface guardian architecture (TAIGA) that provides security against attacks originating from both supervisory and plant control nodes. In contrast to the existing security techniques which attempt to bolster perimeter security at supervisory levels, TAIGA physically isolates trusted defense mechanisms from untrusted components and monitors the physical process to detect … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Sawada et al [12] and Harshe et al [3] have proposed cyber-physical system security solutions that use local (backup) controllers, which kick in when remote (central) controllers are compromised or are unavailable. The central controllers usually optimize the networked control system to yield high performance while the local controller guarantees the minimum performance requirements of the logical subsystem.…”
Section: Related Workmentioning
confidence: 99%
“…Sawada et al [12] and Harshe et al [3] have proposed cyber-physical system security solutions that use local (backup) controllers, which kick in when remote (central) controllers are compromised or are unavailable. The central controllers usually optimize the networked control system to yield high performance while the local controller guarantees the minimum performance requirements of the logical subsystem.…”
Section: Related Workmentioning
confidence: 99%
“…The trigger mechanism is responsible for the switch-over from the production controller to the backup controller in the presence of any malicious activity [38]. The plant's sensor values are stored, a process state model is maintained and used to predict the plant's future behavior.…”
Section: Detection and Mitigation Of Attacksmentioning
confidence: 99%