Netinfo Security ›› 2019, Vol. 19 ›› Issue (2): 60-69.doi: 10.3969/j.issn.1671-1122.2019.02.008

Previous Articles     Next Articles

Design and Optimization of Security Monitoring and Controlling Protocol in Industrial Control Systems

Ruiying CHEN1, Zemao CHEN1, Hao WANG2   

  1. 1. Information Security Department, Naval University of Engineering, Wuhan Hubei 430033, China
    2. 91910 Troops of PLA, Dalian Liaoning 116001, China
  • Received:2018-09-12 Online:2019-02-10 Published:2020-05-11

Abstract:

The security threats to industrial monitoring and controlling protocols mainly include integrity, freshness and confidentiality. In contrast, existing industrial monitoring and controlling protocols usually place the first priority on the availability of transmitted data. The study on the security of protocols mainly focuses on the improvement of the confidentiality of the protocols but lack consideration for integrity. Aiming at issues above, the paper uses message authentication code technology to enhance the integrity of monitoring messages and uses a combination of random numbers and the Diffie-Hellman key exchange algorithm to generate the session symmetric key, to avoid the man-in-the-middle attack in the process of Diffie-Hellman key exchange. For the characteristics of the operating environment of special industrial control systems such as limited resources, the paper optimizes the designed protocol on the premise of ensuring the integrity, in order to improve the runtime efficiency of the protocol. Through the analysis of security and performance, the protocol scheme can effectively solve security problems such as source and target authentication, monitoring message integrity authentication, and resistance to reply attacks, etc.

Key words: industrial control system, monitoring and controlling protocol, integrity authentication, message authentication code, key agreement

CLC Number: