2021
DOI: 10.1109/tii.2020.3009133
|View full text |Cite
|
Sign up to set email alerts
|

Secure Links: Secure-by-Design Communications in IEC 61499 Industrial Control Applications

Abstract: Increasing automation and external connectivity in industrial control systems (ICS) demand a greater emphasis on software-level communication security. In this article, we propose a secure-by-design development method for building ICS applications, where requirements from security standards like ISA/IEC 62443 are fulfilled by design-time abstractions called secure links. Proposed as an extension to the IEC 61499 development standard, secure links incorporate both light-weight and traditional security mechanism… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…The final stage of design tool integration uses secure links-a secure-by-design tool-for ICS [52] that briefly introduces the idea of integrating secure links and TORUS with a requirements repository. However, we consolidate the concept by demonstrating its practical use with the LPG repository proposed in this article.…”
Section: Irbmentioning
confidence: 99%
See 3 more Smart Citations
“…The final stage of design tool integration uses secure links-a secure-by-design tool-for ICS [52] that briefly introduces the idea of integrating secure links and TORUS with a requirements repository. However, we consolidate the concept by demonstrating its practical use with the LPG repository proposed in this article.…”
Section: Irbmentioning
confidence: 99%
“…1 that extends the use of the repository by integrating it with design-time and traceability tools to create practical and maintainable ICS security applications. We use a secure-by-design approach called "secure links" presented in [52] to link the CSRS LPG graph requirements to the design and implementation of IEC 61499 applications. Secure links development methodology proposes the abstractions for security requirements repository along with TORUS [49] for tracing requirements in ICS applications.…”
Section: Design-time Tool Integrationmentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, the integration of cipher suites, as used in the Transport Layer Security (TLS) protocol, is mandated by the IEC 62351 standard to secure end-to-end communication between two connection terminals through secure key exchange, encryption, and authentication [16]. However, traditional process networks usually consist of performancelimited devices, so the trade-off between security and performance can result in critical real-time requirements not being met [17]. An approach which does not actively interfere with the process network is an IDS, which typically monitors network traffic with passive sniffing and detects attack indicators over the monitored network [18].…”
Section: B Security Measures and Challengesmentioning
confidence: 99%