Abstract
With the promotion of industrial automation and information technology, industrial control system becomes more and more complicated, which makes it more difficult to detect running errors. Errors usually lead to industrial accidents and put national economy and civil property at risk. In this paper, we propose a safety mechanism in Industrial Control System based on essential safety, which is the combination of information security and functional safety. This paper mainly describes the targets and functions of the safety of industrial control system, the state transition mechanism. This paper also gives the deployment of safety system and the experimental results, which achieving the safety of industrial control system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stouffer, K., Falco, J., Scarfone, K.: Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology, 55–62 (2011)
Client Company.: Quarterly Report on Cyber Security Incidents and Trends Affecting Industrial Control Systems. Security Incidents Organization, 35–77 (2009)
Zhang, S.: Industrial control system security status and risk analysis. Computer Security, 15–19 (2012)
CNCERT.: Internet network security situation report in China 2011. Netinfo Security, 56–58 (2012)
Hua, R.: Stuxnet Rings an Alarming Bell to Industrial Control System. Instrument Standardization and Metrology, 30–34 (2011)
Li, S.: Open the mystery of Stuxnet virus. Science and Culture, 24–25 (2011)
Junhua, C., Wen, C., Lingling, Z., Chen, Y.: Analysis for Information Security in Industrial Control Systems Triggered by Stuxnet. In: Proceedings of 2011 IEEE International Conference on Information Theory and Information Security (ICITIS 2011) VOL02, Hangzhou, China (2011)
Charles, C.Y., Johnson, B.W., Joseph, A.: Safety issues in the comparative analysis of dependable architectures. IEEE Transactions on Reliability 46(3), 316–322 (1997)
Zalewski, J., Ehrenberger, W., Sagliettic, F., Gorski, J.: Safety of computer control systems: challenges and results in software development. Annual Reviews in Control 27(1), 23–37 (2003)
Guo, Z., Zeckzer, D., Liggesmeyer, P., Mackel, O.: Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques. In: 2010 Fifth International Conference on Software Engineering Advances (ICSEA), pp. 508–513 (2010)
Falco, J., Stouffer, K., Wavering, A.: IT Security for Industrial Control Systems. National Institute of Standards and Technology, 201–235 (2001)
The President’s Commission on Critical Infrastructure Protection. Critical Foundations: Protecting America’s Infrastructures, The Report of President’s Commision on Critical Infrastructure Protection. Washington DC, USA: The President’s Commision on Critical Infrastructure Protection (1997)
US-CERT. The National Strategy to Secure Cyberspace. United States Computer Emergency Readiness Team, Washington, DC (2003)
The Smart Grid Interoperability Panel-Cyber Security Working Group: Guideline for smart grid cyber security. NIST (2010)
Department of Homeland Security. National Infrastructure Protection Plan. Department of Homeland Security, Washigton, DC (2006)
Department of Homeland Security (DHS) National Cyber Security Division. Strategy for Securing Control Systems: Coordinating and Guiding Federal, State, and Private Sector Initiatives. Department of Homeland Security, DHS, Washington, DC (2009)
Eisenhauer, J., Donnelly, P., Ellis, M., et al.: Roadmap to Secure Control Systems in the Energy Sector. Energetics Incorporated, the US Department of Energy and the US Department of Homeland Security, Washington, DC (2006)
Pollet, J.: Innovative defense strategies for securing SCADA control systems, Innovative Defense Strategies for Securing Manufacturing and Control Systems. Instrumentation, Systems, and Automation Society, ISA, Chicago (2005)
Giese, H. (ed.): ISARCS 2010. LNCS, vol. 6150. Springer, Heidelberg (2010)
OuYang, J.S., Ding, L.: Review on IEC 62443 Industrial Control Network and System Security Standardization. Information Technology and Standardization, 24–27 (2012)
Sommestad, T., Ericsson, G.N., Nordlander, J.: SCADA system cyber security’s comparison of standards. In: 2010 IEEE on Power and Energy Society General Meeting. IEEE Power and Energy Society, USA, pp. 1–8. Minneapolis (2010)
European Network and Information Security Agency. Protecting Industrial Control Systems-Annex III, ICS Security Related Standards, Guidines and Policy Documents. Heraklion, Greece: European Network and Information Security Agency, ENISA (2011)
DHS CSSP. Recommended Proctice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies. US-CERT Defense In Depth (October 2009)
Xu, X., Kang, W., Fang, Z., Sun, B., Wang, Y., Zhu, T.: Global and Initiative Safety Mechanism in Industrial Control System. International Journal of Computational Science and Engineering, 1742–7185 (2012)
Xu, X., Zhu, T., Kang, W., Sun, B., Fang, Z., Yan, W.: Building Safety Mechanism in Industrial Control System based on Data Mining. Application of Electronic Technique, 87–90 (2012)
Kornecki, A.J., Stevenson, W.F.: Impact of Adding Security to Safety-Critical Real-Time Systems: A Case Study. In: 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 116–121 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Kang, W., Xu, X., Li, L., Fang, Z. (2014). Building Safety Mechanism in Industrial Control System Based on Essential Safety. In: Zu, Q., Vargas-Vera, M., Hu, B. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2013. Lecture Notes in Computer Science, vol 8351. Springer, Cham. https://doi.org/10.1007/978-3-319-09265-2_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-09265-2_23
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09264-5
Online ISBN: 978-3-319-09265-2
eBook Packages: Computer ScienceComputer Science (R0)