Netinfo Security ›› 2019, Vol. 19 ›› Issue (4): 1-10.doi: 10.3969/j.issn.1671-1122.2019.04.001

    Next Articles

Construction Method and Verification of Local Trusted Computing Environment in Industrial Control Network

Wenli SHANG1,3,4,5(), Xiule ZHANG1,2,3,4, Xianda LIU1,3,4,5, Long YIN1,3,4,5   

  1. 1. Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang Liaoning 110016, China
    2. Faculty of Automation and Electrical Engineering, Shenyang Ligong University, Shenyang Liaoning 110159, China
    3. Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang Liaoning 110016, China
    4. Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang Liaoning 110016, China
    5. University of Chinese Academy of Sciences, Beijing 100049, China
  • Received:2019-01-07 Online:2019-04-10 Published:2020-05-11

Abstract:

The information security protection capability of terminal system layer of industrial control system is relatively weak. Constructing the trusted computing environment of the local industrial control equipment layer is of great significance for greatly improving the information security protection capability of industrial control system. This paper proposes the design of industrial control network security application based on trusted PLC. Starting from the security problem of terminal control equipment, the application design completes the security protection of the equipment itself and its network, and constructs high-security and high-trusted industrial control network operating environment. The simulation experiment combines the trusted PLC and the special safety products of industrial control system to build the local trusted computing architecture of industrial control network, verify the trusted start-up process of trusted PLC, and guide the trusted PLC to exchange the security function data. The anomaly detection model based on deep belief network is used to detect the normal communication data and the data subjected to the simulated attack in the trusted computing environment. The experimental results verify the security and credibility of the local trusted computing environment of industrial control network.

Key words: industrial control system, trusted PLC, trusted computing environment, deep belief network

CLC Number: