首页> 外文OA文献 >Secure communications for critical infrastructure control systems
【2h】

Secure communications for critical infrastructure control systems

机译:关键基础设施控制系统的安全通信

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrastructures depend on. This thesis addresses securing control systems, focusing on securing the communications for supervisory control and data acquisition (SCADA) systems. We review the architectures of SCADA systems and produce a list of the system constraints that relate to securing these systems. With these constraints in mind, we survey both the existing work in information and SCADA security, observing the need to investigate further the problem of secure communications for SCADA systems. We then present risk modelling techniques, and model the risk in a simple SCADA system, using the ISM, a software tool for modelling information security risk. In modelling the risk, we verify the hypothesis that securing the communications channel is an essential part of an effective security strategy for SCADA systems. After looking at risk modelling, and establishing the value of securing communications, we move on to key management for SCADA systems. Appropriate key management techniques are a crucial part of secure communications, and form an important part of the contributions made in this work. We present a key management protocol that has been designed to run under the constraints specific to SCADA systems. A reductionist security proof is developed for a simplified version of the protocol, showing it is secure in the Bellare Rogaway model.
机译:2000年3月,100万公升的原污水被排放到昆士兰州阳光海岸的Maroochy Shire的水系统中。这种环境灾难是由不满的前承包商使用无线电发射器非法访问控制系统中的电子控制泵造成的。在2007年,CNN放映了针对发电机的实验性攻击的录像片段。这次攻击使发电机震动并冒烟,从视觉上显示了网络攻击造成的损害。这些攻击凸显了保护关键基础设施所依赖的控制系统的重要性。本文着眼于保护控制系统,着重于保护监督控制和数据采集(SCADA)系统的通信。我们回顾了SCADA系统的体系结构,并列出了与保护这些系统有关的系统约束的列表。考虑到这些限制,我们调查了信息和SCADA安全方面的现有工作,并观察到有必要进一步调查SCADA系统的安全通信问题。然后,我们介绍风险建模技术,并使用ISM(一种用于对信息安全风险进行建模的软件工具)在简单的SCADA系统中对风险进行建模。在对风险进行建模时,我们验证了以下假设:保护通信通道是SCADA系统有效安全策略必不可少的一部分。在研究了风险建模并确定了保护通信的价值之后,我们继续进行SCADA系统的密钥管理。适当的密钥管理技术是安全通信的关键部分,并且是这项工作做出的重要贡献。我们提出了一种密钥管理协议,该协议旨在在SCADA系统特定的约束下运行。针对该协议的简化版本开发了一种简化派的安全证明,表明该协议在Bellare Rogaway模型中是安全的。

著录项

  • 作者

    Dawson Robert Edward;

  • 作者单位
  • 年度 2008
  • 总页数
  • 原文格式 PDF
  • 正文语种 {"code":"en","name":"English","id":9}
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号