2023
DOI: 10.3390/electronics12051195
|View full text |Cite
|
Sign up to set email alerts
|

PLC Cybersecurity Test Platform Establishment and Cyberattack Practice

Abstract: Programming logic controllers (PLCs) are vital components for conveyors in production lines, and the sensors and actuators controlled underneath the PLCs represent critical points in the manufacturing process. Attacks targeting the exploitation of PLC vulnerabilities have been on the rise recently. In this study, a PLC test platform aims to analyze the vulnerabilities of a typical industrial setup and perform cyberattack exercises to review the system cybersecurity challenges. The PLC test platform is a sortin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Although of all devices installed in the portable IoT station adhere to the latest cyber security standards, a vulnerability assessment can be performed to analyze the structure used on each device and web interface access. A similar approach to the one applied by Ramires et al [28] can be performed, where a strategic offensive attack targeting register modification in a Modbus TCP network is applied; this approach will likely define vulnerabilities in the system.…”
Section: Cyber Security Assessmentmentioning
confidence: 99%
“…Although of all devices installed in the portable IoT station adhere to the latest cyber security standards, a vulnerability assessment can be performed to analyze the structure used on each device and web interface access. A similar approach to the one applied by Ramires et al [28] can be performed, where a strategic offensive attack targeting register modification in a Modbus TCP network is applied; this approach will likely define vulnerabilities in the system.…”
Section: Cyber Security Assessmentmentioning
confidence: 99%
“…Industry 5.0 advocates for establishing intelligent manufacturing systems, which require the Internet of Things based on technological implementation. There are many technological advancements to secure industrial organizations, such as automated attack detection [53,54], automated control rooms [55][56][57], zero trust architecture [58], and digital twins [59]. Osak and Buzina [60] explored ways to evaluate the flexibility and security of power systems under new conditions brought about by digital transformation and changes in industry practices, such as an increase in renewable energy sources and electric cars.…”
Section: Industrial Sectormentioning
confidence: 99%
“…Interoperability issues among diverse devices and communication protocols further complicate the establishment of consistent security measures. Moreover, the limited computing resources inherent to PLCs necessitate a delicate balance between robust security implementations and optimal system performance [234], [235]. Real-time monitoring difficulties, human errors, and stringent regulatory compliance demands further amplify the complexity of securing PLCs.…”
Section: Security Solutions Challengesmentioning
confidence: 99%