Advertisement

Building Safety Mechanism in Industrial Control System Based on Essential Safety

  • Wei Kang
  • Xinguo Xu
  • Lin Li
  • Zhiqi Fang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8351)

Abstract

With the promotion of industrial automation and information technology, industrial control system becomes more and more complicated, which makes it more difficult to detect running errors. Errors usually lead to industrial accidents and put national economy and civil property at risk. In this paper, we propose a safety mechanism in Industrial Control System based on essential safety, which is the combination of information security and functional safety. This paper mainly describes the targets and functions of the safety of industrial control system, the state transition mechanism. This paper also gives the deployment of safety system and the experimental results, which achieving the safety of industrial control system.

Keywords

Industrial Control System Safety Essential Safety 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Stouffer, K., Falco, J., Scarfone, K.: Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology, 55–62 (2011)Google Scholar
  2. 2.
    Client Company.: Quarterly Report on Cyber Security Incidents and Trends Affecting Industrial Control Systems. Security Incidents Organization, 35–77 (2009)Google Scholar
  3. 3.
    Zhang, S.: Industrial control system security status and risk analysis. Computer Security, 15–19 (2012)Google Scholar
  4. 4.
    CNCERT.: Internet network security situation report in China 2011. Netinfo Security, 56–58 (2012)Google Scholar
  5. 5.
    Hua, R.: Stuxnet Rings an Alarming Bell to Industrial Control System. Instrument Standardization and Metrology, 30–34 (2011)Google Scholar
  6. 6.
    Li, S.: Open the mystery of Stuxnet virus. Science and Culture, 24–25 (2011)Google Scholar
  7. 7.
    Junhua, C., Wen, C., Lingling, Z., Chen, Y.: Analysis for Information Security in Industrial Control Systems Triggered by Stuxnet. In: Proceedings of 2011 IEEE International Conference on Information Theory and Information Security (ICITIS 2011) VOL02, Hangzhou, China (2011)Google Scholar
  8. 8.
    Charles, C.Y., Johnson, B.W., Joseph, A.: Safety issues in the comparative analysis of dependable architectures. IEEE Transactions on Reliability 46(3), 316–322 (1997)CrossRefGoogle Scholar
  9. 9.
    Zalewski, J., Ehrenberger, W., Sagliettic, F., Gorski, J.: Safety of computer control systems: challenges and results in software development. Annual Reviews in Control 27(1), 23–37 (2003)CrossRefGoogle Scholar
  10. 10.
    Guo, Z., Zeckzer, D., Liggesmeyer, P., Mackel, O.: Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques. In: 2010 Fifth International Conference on Software Engineering Advances (ICSEA), pp. 508–513 (2010)Google Scholar
  11. 11.
    Falco, J., Stouffer, K., Wavering, A.: IT Security for Industrial Control Systems. National Institute of Standards and Technology, 201–235 (2001)Google Scholar
  12. 12.
    The President’s Commission on Critical Infrastructure Protection. Critical Foundations: Protecting America’s Infrastructures, The Report of President’s Commision on Critical Infrastructure Protection. Washington DC, USA: The President’s Commision on Critical Infrastructure Protection (1997)Google Scholar
  13. 13.
    US-CERT. The National Strategy to Secure Cyberspace. United States Computer Emergency Readiness Team, Washington, DC (2003)Google Scholar
  14. 14.
    The Smart Grid Interoperability Panel-Cyber Security Working Group: Guideline for smart grid cyber security. NIST (2010)Google Scholar
  15. 15.
    Department of Homeland Security. National Infrastructure Protection Plan. Department of Homeland Security, Washigton, DC (2006)Google Scholar
  16. 16.
    Department of Homeland Security (DHS) National Cyber Security Division. Strategy for Securing Control Systems: Coordinating and Guiding Federal, State, and Private Sector Initiatives. Department of Homeland Security, DHS, Washington, DC (2009)Google Scholar
  17. 17.
    Eisenhauer, J., Donnelly, P., Ellis, M., et al.: Roadmap to Secure Control Systems in the Energy Sector. Energetics Incorporated, the US Department of Energy and the US Department of Homeland Security, Washington, DC (2006)Google Scholar
  18. 18.
    Pollet, J.: Innovative defense strategies for securing SCADA control systems, Innovative Defense Strategies for Securing Manufacturing and Control Systems. Instrumentation, Systems, and Automation Society, ISA, Chicago (2005)Google Scholar
  19. 19.
    Giese, H. (ed.): ISARCS 2010. LNCS, vol. 6150. Springer, Heidelberg (2010)Google Scholar
  20. 20.
    OuYang, J.S., Ding, L.: Review on IEC 62443 Industrial Control Network and System Security Standardization. Information Technology and Standardization, 24–27 (2012)Google Scholar
  21. 21.
    Sommestad, T., Ericsson, G.N., Nordlander, J.: SCADA system cyber security’s comparison of standards. In: 2010 IEEE on Power and Energy Society General Meeting. IEEE Power and Energy Society, USA, pp. 1–8. Minneapolis (2010)Google Scholar
  22. 22.
    European Network and Information Security Agency. Protecting Industrial Control Systems-Annex III, ICS Security Related Standards, Guidines and Policy Documents. Heraklion, Greece: European Network and Information Security Agency, ENISA (2011)Google Scholar
  23. 23.
    DHS CSSP. Recommended Proctice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies. US-CERT Defense In Depth (October 2009)Google Scholar
  24. 24.
    Xu, X., Kang, W., Fang, Z., Sun, B., Wang, Y., Zhu, T.: Global and Initiative Safety Mechanism in Industrial Control System. International Journal of Computational Science and Engineering, 1742–7185 (2012)Google Scholar
  25. 25.
    Xu, X., Zhu, T., Kang, W., Sun, B., Fang, Z., Yan, W.: Building Safety Mechanism in Industrial Control System based on Data Mining. Application of Electronic Technique, 87–90 (2012)Google Scholar
  26. 26.
    Kornecki, A.J., Stevenson, W.F.: Impact of Adding Security to Safety-Critical Real-Time Systems: A Case Study. In: 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 116–121 (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Wei Kang
    • 1
  • Xinguo Xu
    • 1
  • Lin Li
    • 1
  • Zhiqi Fang
    • 1
  1. 1.The 6th Research Institute of China Electronics CorporationChina

Personalised recommendations