Browse > Article
http://dx.doi.org/10.5392/JKCA.2019.19.12.416

Enhanced Operator Authentication Method in SCADA Control Network  

Jo, In-June (배재대학교 사이버보안학과)
Publication Information
Abstract
The authentication technologies used to access computers in both IT and operational technology (OT) network areas include ID/PW, public certificate, and OTP. These authentication technologies can be seen as reflecting the nature of the business-driven IT network. The same authentication technologies is used in SCADA control networks where the operational technology is centered. However, these authentication technologies do not reflect the characteristics of the OT control network environment, which requires strict control. In this paper, we proposed a new enhanced user authentication method suitable for the OT SCADA control network centered on control information processing, utilizing the physical terminal address and operator location information characteristics of the operator's mobile terminal and control network.
Keywords
Building Control; SCADA; Control Network; Network Separation; Security;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Pascal Ackerman, "Industrial Cybersecurity," Packt Publishing Limited, 2017.
2 김일용, 임희택, 지대범, 박재표, "산업제어시스템 환경에서 효과적인 네트워크보안모델," 한국산학기술학회논문지, 제19권, 제4호, pp.664-673, 2018   DOI
3 행정안전부, 국가정보원,한국정보사회진흥원, "국가기관 망분리 구축 가이드," 2008(5).
4 이은배, 김기영, "망 분리기반의 정보보호에 대한 고찰," 한국정보보호학회지, 제20권, 제1호, pp.39-46, 2010(2).
5 이현정, 조대일, 고갑승, "망 분리 환경에서 안전한 서비스 연계를 위한 단방향 망간자료전송 시스템 보안 모델연구," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.5, No.6, pp.539-547, 2015(12).
6 송태기, 조인준, "다중 응용시스템용 앱기반 2-채널사용자인증방안," 한국콘텐츠학회논문지, 제18권, 제9호, pp.141-148, 2018.   DOI
7 이진우, 조인준, "USIM정보를 이용한 사용자인증 방안 설계 및 구현," 한국콘텐츠학회논문지, 제17권, 제7호, pp.571-578, 2017.   DOI