Back to Search Start Over

Research on Key Protocol Technology of Safe Access and Imitation Attack for Power Industrial Control Terminal Equipment

Authors :
Rui
Zhao Xuehai Yu
Jinye Zhang
Xiaoqiang Wang
Source :
IOP Conference Series: Materials Science and Engineering. 677:042068
Publication Year :
2019
Publisher :
IOP Publishing, 2019.

Abstract

Industrial control system is widely used in social production activities and its security is directly related to national security and social stability. In this paper, the security threats and protection status of power industry control system are analyzed. A framework of information security evaluation system for power industry control system is proposed, which consists of three parts: experimental verification environment, product detection capability and security service capability, and the construction scheme of the system is discussed. A hardware-in-the-loop simulation and verification platform is constructed to realize the simulation and verification of power industry control system tools. The vulnerability of power industry control protocol can be found in depth. The problem of ambiguous attack mechanism and lack of verification means of power industry control system is discussed, which can provide support for the research of attack and protection of power industry control system.

Details

ISSN :
1757899X and 17578981
Volume :
677
Database :
OpenAIRE
Journal :
IOP Conference Series: Materials Science and Engineering
Accession number :
edsair.doi...........bf58a972a852538b593349247ee59eae
Full Text :
https://doi.org/10.1088/1757-899x/677/4/042068