Netinfo Security ›› 2019, Vol. 19 ›› Issue (6): 1-10.doi: 10.3969/j.issn.1671-1122.2019.06.001

    Next Articles

Construction Technology and Application of Industrial Control System Security and Trusted Environment

Wenli SHANG1,2,3,4, Long YIN1,2,3,4(), Xianda LIU1,2,3,4, Jianming ZHAO1,2,3,4   

  1. 1. Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang Liaoning 110016, China
    2. Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang Liaoning 110016, China
    3. University of Chinese Academy of Sciences, Beijing 100049, China
    4. Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang Liaoning 110016, China
  • Received:2019-01-21 Online:2019-06-10 Published:2020-05-11

Abstract:

Aiming at the problem of low information security protection ability of traditional PLC in industrial measurement and control system, this paper presents a method of building a trusted computing environment based on the key technology of embedded equipment security protection in industrial control system. Firstly, this paper introduces the research work and shortcomings of trusted computing in system application, and then gives a detailed design of security technology architecture for industrial embedded equipment, including trusted PLC main control unit based on bus arbitration mechanism, trusted PLC running environment based on virtualization sandbox technology and trusted PLC network security unit based on white list access control. Experiments show that the trusted computing environment construction method proposed in this paper can be used to build a secure and trusted system network for traditional industrial control equipment and realize the equipment built-in security capability.

Key words: industrial control system, trusted computing, trusted PLC, network security unit

CLC Number: