Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.5.1305

Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network  

Shim, Jae-Yoon (NAONWORKS Co., Ltd.)
Lee, June-Kyoung (NAONWORKS Co., Ltd.)
Abstract
The smart factory, a combination of ICT technology to the entire production process of a product, means can you intelligent factory is to achieve such reduction and process improvement of the production cost. To implement the smart factory, inevitably must have an internal equipment connections to the external network, this is by equipment which is operated by the existing closure network is exposed to the outside network, the security vulnerability so that gender is increased. In order to solve this problem, it is possible to apply security solutions that are used in normal environments. However, it is impossible to have just completely blocking security threats that can occur in a smart factory network. Further, considering the economic damage that can occur during security breach accident, which cannot be not a serious problem. Therefore, in this paper, a look to know the security measures that can be applied to smart factory, to introduce the main fusion security technology necessary to smart factory dedicated security gateway.
Keywords
Smart Factory; DPI(Deep Packet Inspection); OPC-UA; Protocol Gateway; Convergence Security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Y.-H. Chen, "Introduction of information security for industrial control system," Korea Institute of Information Security and Cryptology, 19(5), pp. 52-59, Oct. 2009.
2 Keith Stouffer, Joe Falco, and Karen Scarfone, "Guide to industrial control system security," NIST SP800-82, Jun. 2011.
3 N. Falliere, L. O. Murchu, and E. Chien, "Win32.stuxnet dossier," Symantec Security Response, Feb. 2011.
4 Y.S. Choi, "Middle investigation reports for korea hydro & nuclear power plant cyber terror incidents," The Joint Investigation Team for Personal Information Crimes, Mar. 2013
5 S.W. Shin, D.H. Kang, K.Y. Kim, and J.S. Jang, "Analysis of deep packet inspection technology," Electronics and Telecommunications Trends, 19(3), pp.117-124, Jun. 2004.
6 R. Stiennon, "DPI: next phase of firewall technology," Technology T-18-0340 Report, Gartner Group, Nov. 2002.
7 OPC Foundation, "OPC common 1.10 specification," OPC Task Force, Dec. 2002
8 Nathan Pocock, Darek Kominek, and Paul Hunkar, "OPC-UA security how it works," Information Revolution 2014, Aug. 2014
9 "OPC unified architecture-part 1:overview and concepts," IEC62541, International Electrotechnical Commission, Feb. 2010
10 H.W. Heinrich, Industrial accident prevention : a scientific approach, McGraw-Hill, New York, 366pg Jan. 1931