Browse > Article
http://dx.doi.org/10.11001/jksww.2019.33.5.329

The development of industrial secure L2 switch and introduction example for management and security improvement of supervisory control network in purification plant  

Kim, Yunha (Changwon Office, K-water)
Yu, Chool (Jeongeup Office, K-water)
Oh, Eun (Management Information System Dept. K-water)
Kim, Chanmoon (Management Information System Dept. K-water)
Park, Ikdong (Technology Development Dept. HanDreamnet Corporation)
Kim, Yongseong (School of Bioconvergence, Kyungnam University)
Choi, Hyunju (Department of Mathematics Science and Computer(MSC), Kyungnam University)
Publication Information
Journal of Korean Society of Water and Wastewater / v.33, no.5, 2019 , pp. 329-339 More about this Journal
Abstract
Recently, the advancement of information and communication technology(ICT) is expanding the connectivity through Internet of Things(IoT), and the media of connection is also expanding from wire/cable transmission to broadband wireless communication, which has significantly improved mobility. This hyperconnectivity has become a key element of the fourth industrial revolution, whereas the supervisory control network of purification plants in korea is operated as a communication network separated from the outside, thereby lagging in terms of connectivity. This is considered the best way to ensure security, and thus there is hardly any consideration of establishing alternatives to operate an efficient and stable communication network. Moreover, security for management of a commercialized communication network and network management solution may be accompanied by immense costs, making it more difficult to make new attempts. Therefore, to improve the conditions for the current supervisory control network of purification plants, this study developed a industrial security L2 switch that supports modbus TCP(Transmission Control Protocol) communication and encryption function of the transmission section. As a result, the communication security performance improved significantly, and the cost for implementing the network management system using Historical Trend and information of HMI(Human Machine Interface) could be reduced by approximately KRW 200 million. The results of this study may be applied to systems for gas, electricity and social safety nets that are infrastructure communication networks that are similar to purification plants.
Keywords
Network design; Secured switch; Network management; Service; Operations management;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Ahn, S.Y., Jeon, I.C., Kim, J.H., Lee, Y.T. and Choi, S.J. (2015). A study on internet emergency alert distribution system adaptive to the receiver characteristics, J. Broadcast Eng., 20(4), 598-605.   DOI
2 Do, V.L., Fillatre, L., Nikiforov, I. and Willett, P. (2017). Security of SCADA systems against cyber-physical attacks, IEEE Aerosp. Electron. Syst. Mag., 32(5), 28-45.   DOI
3 Lee, H.H., Jang S.B., Hong, S.T. and Chun, M.G. (2014). Intelligent controller for constant control of residual chlorine in water treatment process, J. Korean Inst. Intell. Syst., 24(2), 147-154.   DOI
4 Morgan, H. (2013). Cyber security risk management in the SCADA critical infrastructure environment, Eng. Manag. J., 25(2), 38-45.   DOI
5 Oh, E. and Park, C.K. (2017). Development of customized wireless R.T.U(Remote Terminal Unit), J. Korean Inst. Commun. Inf. Sci., 42(12), 2402-2410.   DOI
6 Park, E.C. and Choi, H.J. (2018a). A study on operation efficacy and security improvement through structural modification of CCTV network for bansong water purification plant, J. Korean Soc. Water Wastewater, 32(2), 193-200.   DOI
7 Park, E.C. and Choi, H.J. (2018b). The case study on wireless lan design technique for bansong purification plant using network integrated management system and security switch, J. Korean Soc. Water Wastewater, 32(4), 309-315.   DOI
8 Park, N.S., Lee, Y.J., Chae, S.H. and Yoon, S.M. (2015). A study on the statistical predictability of drinking water qualities for contamination warning system, J. Korean Soc. Water Wastewater, 29(4), 469-479.   DOI
9 Puliafito, A. and Tomarchio, O. (2000). Using mobile agents to implement flexible network management strategies, Comput. Commun., 23(8), 708-719.   DOI
10 Ralston, P.A.S., Graham, J.H. and Hieb, J.L. (2007). Cyber security risk assessment for SCADA and DCS networks, ISA Trans., 46(4), 583-594.   DOI
11 Rothenberg, E.C. and Roos, A.A. (2008). A review of policy-based resource and admission control functions in evolving access and next generation networks, J. Netw. Syst. Manage., 16, 14-45.   DOI