Browse > Article
http://dx.doi.org/10.9728/dcs.2017.18.5.1001

A Study on Application Method of Crypto-module for Industrial Control System  

Seok, Byoungjin (Department of Computer Engineering, Seoul National University of Science and Technology)
Kim, Yeog (Department of Computer Engineering, Seoul National University of Science and Technology)
Lee, Changhoon (Department of Computer Engineering, Seoul National University of Science and Technology)
Publication Information
Journal of Digital Contents Society / v.18, no.5, 2017 , pp. 1001-1008 More about this Journal
Abstract
Because cyber attacks on industrial control systems can lead to massive financial loss or loss of lives, the standardization and the research on cyber security of industrial control systems are actively under way. As a related system, the industrial control system of social infrastructures must be equipped with the verified cryptographic module according to the e-government law and appropriate security control should be implemented in accordance with the security requirements of the industrial control system. However, the industrial control system consisting of the operation layer, the control layer, and the field device layer may cause a problem in performing the main function in each layer due to the security control implementation. In this paper, we propose things to check when performing security control in accordance with the security control requirements for each layer of the industrial control system and proper application.
Keywords
ICS(Industrial Control System); Crypto module; Cyber threat; Critical infrastructure; Security requirements for Industrial Control System;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Y. H. Cha, B. H. Cho, and J. C. Na, "Security Technology Trends and prospective of Industrial Control System", KEIT PD Issue Report, Vol. 13, No. 6, pp. 79-100, 2013.
2 K. Stouffer, J. Falce, K. Scarfone, "Guide to industrial control systems(ICS) security", NIST Special Publication, 800-82, 2011.
3 S. G. Lee, S. Y. Lee, J. C. Kim. "A Study on Security Vulnerability Management in Electric Power Industry IoT". Journal of Digital Contents Society, Vol. 17, No. 6, pp. 499-507, Dec 2016   DOI
4 "[Analysis Report]Critical Infrastructure Threats", AhnLab ASEC Analysis Report, 2016.
5 J. H. Oh, Y. I. You, K. H. Lee. "Infrastructure Accident and Control System Standard Trends". Korea Institute of Information Security and Cryptology, Vol. 27, No. 2, pp. 5-11, Apr 2017   DOI
6 "The Department of Homeland Security, Sector Risk Snapshots Released", KISA Internet & Security Bimonthly, Vol. 3, pp.24-28, 2014.
7 "Sector Risk Snapshots", U.S. Department of Homeland Security, 2014.
8 D. Y. Kim. "Vulnerability Analysis for Industrial control System Cyber Security", The Journal of the Korea Institute of Electronic Communication Sciences, Vol. 9, No. 1, pp. 137-142, Jan 2014.   DOI
9 "Security Requirements for Industrial Control System - Part 1: Concepts and Reference Model", Telecommunications Technology Association, TTAK.KO-12.0307, 2017.
10 Y. H. Chen, "Introduction of Information Security for Industrial Control System," Korea Institute of Information Security and Cryptology, vol. 19, no. 5, pp. 52-59, Oct 2009.
11 ABB Group. Information of AC500 PLC Series producted by ABB Group. Available : http:/new.abb.com/plc/programmable-logic-controllers-plcs
12 Honeywell. Information of RTU2020 producted by Honeywell. Available: https://www.honeywellprocess.com/en-US/explore/product s/control-monitoring-and-safety-systems/scada-systems/Pages/controledgertu.aspx
13 Schneider Electric. Information of PLC, HMI produced by Schneider Electric. Available : http://www.schneider-electric.com/b2b/en/products/automation-and-control.jsp
14 Crypto++ maintained by Jeffrey Walton and Crypto++ community. Speed benchmarks for some commonly used cryptographic algorithms. Available : https://www.cryptopp.com/benchmarks.html