The Stuxnet worm is a sophisticated malware designed to sabotage industrial control systems (ICSs). It exploits vulnerabilities in removable drives, local area communication networks, and programmablelogic controller...
详细信息
ISBN:
(纸本)9781479901784
The Stuxnet worm is a sophisticated malware designed to sabotage industrial control systems (ICSs). It exploits vulnerabilities in removable drives, local area communication networks, and programmable logic controllers (PLCs) to penetrate the process control network (PCN) and the control system network (CSN). Stuxnet was successful in penetrating the control system network and sabotaging industrial control processes since the targeted control systems lacked security mechanisms for verifying message integrity and source authentication. In this work, we propose a novel proactive defense system framework, in which commands from the system operator to the PLC are authenticated using a randomized set of cryptographic keys. The framework leverages cryptographic analysis and control-and game-theoretic methods to quantify the impact of malicious commands on the performance of the physical plant. We derive the worst-case optimal randomization strategy as a saddle-point equilibrium of a game between an adversary attempting to insert commands and the system operator, and show that the proposed scheme can achieve arbitrarily low adversary success probability for a sufficiently large number of keys. We evaluate our proposed scheme, using a linear-quadratic regulator (LQR) as a case study, through theoretical and numerical analysis.
Nowadays information and automation technology infrastructures, as used in Critical Infrastructures, manufacturing plants or distributed sensor networks, have become very complex and dependant to automation. This does...
详细信息
ISBN:
(纸本)9781479932146;9781479932139
Nowadays information and automation technology infrastructures, as used in Critical Infrastructures, manufacturing plants or distributed sensor networks, have become very complex and dependant to automation. This does not only demand for higher bandwidths and bit rates in connecting network technologies, furthermore major security issues arise as seen over the last years. The vision of secure information and automation infrastructures cannot be achieved only by securing single parts, like a programmablelogic Controller or Personal Computer, without looking at the interplay of components. The following paper shows an approach to enhance security in these infrastructures by detecting unknown anomalies thoughout all levels of automation, including the operator interface.
The standardized Medium Access Control (MAC) protocols for Power Line Communication (PLC) networks (Homeplug and IEEE 1901) are based on the Distributed Coordination Function (DCF) defined for IEEE 802.11. However, th...
详细信息
ISBN:
(纸本)9781467362337
The standardized Medium Access Control (MAC) protocols for Power Line Communication (PLC) networks (Homeplug and IEEE 1901) are based on the Distributed Coordination Function (DCF) defined for IEEE 802.11. However, the backoff procedure is modified with the goal of decreasing the collision probability. In this work, the backoff procedure of PLC MAC protocols is compared to DCF in different traffic conditions and scenarios, including scenarios with all nodes in coverage range as well as topologies with hidden and exposed terminal problems. The goal is to demonstrate and quantify the pros and cons of each approach in each particular case. Results show that the modified backoff procedure of the Homeplug MAC reduces the collision probability when there is high contention. However, the performance is not always improved compared to DCF. Moreover, when Homeplug provides better performance than the vanilla DCF, we show that the DCF can be easily tuned to achieve similar gains.
High voltage power transformer is widely used in all over the world as generation of Electrical Power in either voltage level. In power-transformer lots of equipment working together like cooling fan, Buchholz relay, ...
详细信息
ISBN:
(纸本)9781467329071;9781467329064
High voltage power transformer is widely used in all over the world as generation of Electrical Power in either voltage level. In power-transformer lots of equipment working together like cooling fan, Buchholz relay, breather, bushing, differential relay and so on. So It is necessary to find out problems occur in it and to eradicate them as early as possible so the high cost of High voltage power transformer does not get damage and optimum use. Here we should focus how to diminish and operate them in smarter way. In this paper an attempt has been made to elaborate the use of computer and modern automation system for protection and optimum use of High voltage power transformer, its advantages and cost effectiveness. programmable logic controllers (PLC) can be used for control & automation of High voltage power transformer. The main reason for this is cost effectiveness and optimum use. Various functions and controls can be achieved by programming the PLC. They can be used for full plant automation including governing of auto-operation includes cooling fan, control, oil level control, automatic start/stop of pump, transformer oil leakage control, replacement of Buchholz relay by pressure sensor control, start/stop of auxiliary systems, and protection requirement etc Functions other than control like continuous monitoring, data recording, instrumentation and protections can also be performed. For remote operation, communication with PLC can be performed. For continuous monitoring purpose, a personal computer can be interfaced with PLC and continuous data can be recorded regularly.
The article proposes an approach to construction and verification of PLC ST-programs for discrete problems. The linear-time temporal logic LTL is used for the specification of the program behavior. Programming is carr...
详细信息
ISBN:
(纸本)9780986077319
The article proposes an approach to construction and verification of PLC ST-programs for discrete problems. The linear-time temporal logic LTL is used for the specification of the program behavior. Programming is carried out in the ST (Structured Text) language, according to the LTL-specification. The correctness analysis of the LTL-specification is performed by Cadence SMV, a symbolic model checking tool. A new approach to programming and verification of PLC ST-programs is illustrated. For each discrete problem, we propose creating an ST-program, its LTL-specification, and an SMV-model.
A Tunnel FET (TFET), for which the device operation is based upon a band-to-band tunneling mechanism, is known to be very promising for low-power logic applications. A good output current saturation is necessary to ma...
详细信息
ISBN:
(纸本)9781607683780;9781623320270
A Tunnel FET (TFET), for which the device operation is based upon a band-to-band tunneling mechanism, is known to be very promising for low-power logic applications. A good output current saturation is necessary to make a device also attractive for mixed-signal system-on-chip applications. In this paper, the output current saturation mechanism for a TFET is reviewed. A comparison of different analog performance parameters between a double-gate (DG) n-channel TFET and a similar DG n-channel MOSFET is presented. It is shown that a TFET can produce higher gain at the same power level than a conventional MOSFET. It is also shown that a complementary TFET amplifier can have more than one order of magnitude higher voltage gain than its MOS counterpart.
The first step to grappling with the security problems that face modern supervisory control and data acquisition (SCADA) systems and industrial control networks is investing in research and education. However, because...
详细信息
ISBN:
(纸本)9783642453304
The first step to grappling with the security problems that face modern supervisory control and data acquisition (SCADA) systems and industrial control networks is investing in research and education. However, because of the specialized nature of industrial control systems and networks, the cost of even a modest testbed for research or education can quickly get out of hand. Hardware-based testbeds are often not practical due to budgetary constraints, and they do not readily scale to meet educational demands. Software simulations are a cost-effective alternative, but current solutions focus primarily on network aspects, not the implementation of field device and application functionality. This paper describes the design and implementation of a programmablelogic controller emulator using VMware. The emulator solution is both cost-effective and scalable. Moreover, it can accurately replicate real-world field device functionality to meet research and educational requirements.
One of the most widespread techniques to evaluate various aspects of a manufacturing system is discrete-event simulation (DES). However, building a simulation model of a manufacturing system is a difficult task and ne...
详细信息
One of the most widespread techniques to evaluate various aspects of a manufacturing system is discrete-event simulation (DES). However, building a simulation model of a manufacturing system is a difficult task and needs great resource expenditures. Automated data collection and model buildup can drastically reduce the time of the design phase as well as support model reusability. Since most of the manufacturing systems are controlled by low level controllers (e. g., PLCs, CNCs) they inherently store structure and control logic of the system to be modeled by a DES system. The paper introduces an ongoing research of PLC code processing method for automatic ISA standard simulation model generation of a conveyor system of a leading automotive factory. Results of the validation process and simulation experiments are also described through a case study. (C) 2013 The Authors. Published by Elsevier B. V.
Functional and nonfunctional validation is an important task in complex embedded system developments. This paper proposes a method of applying model checking techniques to validate programable logiccontrollers (PLCs)...
详细信息
ISBN:
(纸本)9781424419944
Functional and nonfunctional validation is an important task in complex embedded system developments. This paper proposes a method of applying model checking techniques to validate programable logiccontrollers (PLCs). Abstraction is used to ameliorate the state explosion problem. The experiment results of an industry application demonstrate the effectiveness of our approach.
This paper described a PLC (programmablelogic Controller) program model and its implementation, based on the IEC 61131-3 Standard. The Model was built using the State Machine Theory and Petri nets, the transformation...
详细信息
暂无评论