Skip to main content

2017 | OriginalPaper | Buchkapitel

TICS: Trusted Industry Control System Based on Hardware Security Module

verfasst von : Yu Qin, Yingjun Zhang, Wei Feng

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The new attack technologies have caused great security threats to industry control system, especially APT attacks such as Stuxnet, BlackEnergy, WannaCrypt. Traditional protection methods fail to defend the hackers attacks on the cyber and physical components of ICS. This paper propose an ICS terminal defense solution in establishing the trustworthiness of with trusted execution environment. The check attestation method is employed to optimize ICS software attestation, and the whitelist mechanism is used to enforce the process execution in terminal. We design and implement a trusted terminal defense system in industry control network. The test results shows that the performance of hardware security module and process enforcement meets the real-time requirements. abstract environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat National Institute of Standards and Technology: NIST Spp. 800-82 Guide to Industrial Control System (ICS) Security (2011) National Institute of Standards and Technology: NIST Spp. 800-82 Guide to Industrial Control System (ICS) Security (2011)
2.
Zurück zum Zitat International Electrotechnical Commission: IEC Industrial Control Network and System Security Standardization (2013) International Electrotechnical Commission: IEC Industrial Control Network and System Security Standardization (2013)
3.
Zurück zum Zitat National Technical Committee 124 on Standardization Administration of China (SAC/TC124): Evaluation Specification for Security in Industrial Control Network (2010) National Technical Committee 124 on Standardization Administration of China (SAC/TC124): Evaluation Specification for Security in Industrial Control Network (2010)
4.
Zurück zum Zitat Defrawy, K.E., Francillon, A., Perito, D., Tsudik, G.: SMART: secure and minimal architecture for (establishing a dynamic) root of trust. In: Network and Distributed System Security Symposium (NDSS). Internet Society (2012) Defrawy, K.E., Francillon, A., Perito, D., Tsudik, G.: SMART: secure and minimal architecture for (establishing a dynamic) root of trust. In: Network and Distributed System Security Symposium (NDSS). Internet Society (2012)
5.
Zurück zum Zitat Koeberl, P., Schulz, S., Sadeghi, A.-R., et al.: Trustlite: a security architecture for tiny embedded devices. In: Proceedings of the Ninth European Conference on Computer Systems (EuroSys 2014) (2014) Koeberl, P., Schulz, S., Sadeghi, A.-R., et al.: Trustlite: a security architecture for tiny embedded devices. In: Proceedings of the Ninth European Conference on Computer Systems (EuroSys 2014) (2014)
6.
Zurück zum Zitat Brasser, F., El Mahjoub, B., Sadeghi, A.-R., et al.: TyTAN: tiny trust anchor for tiny devices. In: Proceedings of the 52nd Annual Design Automation Conference (DAC 2015) (2015) Brasser, F., El Mahjoub, B., Sadeghi, A.-R., et al.: TyTAN: tiny trust anchor for tiny devices. In: Proceedings of the 52nd Annual Design Automation Conference (DAC 2015) (2015)
7.
Zurück zum Zitat Sadeghi, A.R., Wachsmann, C, Waidner, M.: Security and privacy challenges in industrial internet of things. In: Proceedings of the 52nd Annual Design Automation Conference, vol. 54. ACM (2015) Sadeghi, A.R., Wachsmann, C, Waidner, M.: Security and privacy challenges in industrial internet of things. In: Proceedings of the 52nd Annual Design Automation Conference, vol. 54. ACM (2015)
8.
Zurück zum Zitat Da Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inform. 10(4), 2233–2243 (2014)CrossRef Da Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inform. 10(4), 2233–2243 (2014)CrossRef
9.
Zurück zum Zitat Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the internet of things: a standardization perspective. Internet Things J. IEEE 1(3), 265–275 (2014)CrossRef Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the internet of things: a standardization perspective. Internet Things J. IEEE 1(3), 265–275 (2014)CrossRef
10.
Zurück zum Zitat Kil, C., Sezer, E.C., Azab, A.M., Ning, P., Zhang, X.: Remote attestation to dynamic system properties: towards providing complete system integrity evidence. In: IEEE/IFIP DSN (2009) Kil, C., Sezer, E.C., Azab, A.M., Ning, P., Zhang, X.: Remote attestation to dynamic system properties: towards providing complete system integrity evidence. In: IEEE/IFIP DSN (2009)
11.
Zurück zum Zitat Seshadri, A., Perrig, A., Van Doorn, L., Khosla, P.: SWATT: software-based attestation for embedded devices. In: IEEE S&P (2004) Seshadri, A., Perrig, A., Van Doorn, L., Khosla, P.: SWATT: software-based attestation for embedded devices. In: IEEE S&P (2004)
12.
Zurück zum Zitat Li, Y., McCune, J.M., Perrig, A.: VIPER: verifying the integrity of PERipherals firmware. In: ACM CCS (2011) Li, Y., McCune, J.M., Perrig, A.: VIPER: verifying the integrity of PERipherals firmware. In: ACM CCS (2011)
13.
Zurück zum Zitat Seshadri, A., Luk, M., Perrig, A.: SAKE: software attestation for key establishment in sensor networks. Ad Hoc Netw. 9(6) (2008) Seshadri, A., Luk, M., Perrig, A.: SAKE: software attestation for key establishment in sensor networks. Ad Hoc Netw. 9(6) (2008)
14.
Zurück zum Zitat Seshadri, A., Luk, M., Perrig, A., Doorn, L.V., Khosla, P.: SCUBA: secure code update by attestation in sensor networks. In: ACM WiSec (2006) Seshadri, A., Luk, M., Perrig, A., Doorn, L.V., Khosla, P.: SCUBA: secure code update by attestation in sensor networks. In: ACM WiSec (2006)
15.
Zurück zum Zitat Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.: Using FIRE & ICE for detecting and recovering compromised nodes in sensor networks. Technical report, DTIC Document, December 2004 Seshadri, A., Luk, M., Perrig, A., van Doorn, L., Khosla, P.: Using FIRE & ICE for detecting and recovering compromised nodes in sensor networks. Technical report, DTIC Document, December 2004
16.
Zurück zum Zitat Li, Y., McCune, J.M., Perrig, A.: SBAP: software-based attestation for peripherals. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust 2010. LNCS, vol. 6101, pp. 16–29. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13869-0_2 CrossRef Li, Y., McCune, J.M., Perrig, A.: SBAP: software-based attestation for peripherals. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust 2010. LNCS, vol. 6101, pp. 16–29. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-13869-0_​2 CrossRef
17.
Zurück zum Zitat Armknecht, F., Sadeghi, A.R., Schulz, S., et al.: A security framework for the analysis and design of software attestation. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1–12. ACM (2013) Armknecht, F., Sadeghi, A.R., Schulz, S., et al.: A security framework for the analysis and design of software attestation. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1–12. ACM (2013)
18.
Zurück zum Zitat Coble, K., Wang, W., Chu, B., et al.: Secure software attestation for military telesurgical robot systems. In: Proceedings of Military Communications Conference (MILCOM 2010), pp. 965–970. IEEE (2010) Coble, K., Wang, W., Chu, B., et al.: Secure software attestation for military telesurgical robot systems. In: Proceedings of Military Communications Conference (MILCOM 2010), pp. 965–970. IEEE (2010)
Metadaten
Titel
TICS: Trusted Industry Control System Based on Hardware Security Module
verfasst von
Yu Qin
Yingjun Zhang
Wei Feng
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-69471-9_37