Programmable logic controllers(PLCs)play a critical role in many industrial control systems,yet face increasingly serious cyber *** this paper,we propose a novel PLC-compatible software-based defense mechanism,called ...
详细信息
Programmable logic controllers(PLCs)play a critical role in many industrial control systems,yet face increasingly serious cyber *** this paper,we propose a novel PLC-compatible software-based defense mechanism,called Heterogeneous Redundant Proactive Defense Framework(HRPDF).We propose a heterogeneous PLC architecture in HRPDF,including multiple heterogeneous,equivalent,and synchronous runtimes,which can thwart multiple types of attacks against PLC without the need of external *** ensure the availability of PLC,we also design an inter-process communication algorithm that minimizes the overhead of *** implement a prototype system of HRPDF and test it in a real-world PLC and an OpenPLC-based device,*** results show that HRPDF can defend against multiple types of attacks with 10.22%additional CPU and 5.56%additional memory overhead,and about 0.6 ms additional time overhead.
By allocating IP address and changing IP address in source and destination hosts, network address space randomization is committed to construct a dynamic and heterogeneous network to decrease the attacking possibility...
详细信息
By allocating IP address and changing IP address in source and destination hosts, network address space randomization is committed to construct a dynamic and heterogeneous network to decrease the attacking possibility and predictability. The research mainly deploys the features of OpenFlow network including data plane and control plane decoupling, centralized control of the network and dynamic updating of forwarding rules, combines the advantages of the network address space randomization technology with the features of the OpenFlow network, and designs a novel resolution towards IP conversion in Floodlight controller. The research can help improve the unpredictability and decrease the possibility of worm attacking and IP sniffing by IP allocation.
CLEFIA is a block cipher developed by Sony Corporation in 2007. It is a recommended cipher of CRYPTREC, and has been adopted as ISO/IEC international standard in lightweight cryptography. In this paper, some new 9-rou...
详细信息
Time photonic crystals are media in which their electromagnetic parameters are modulated periodically in time, showing promising applications in non-resonant lasers and particle accelerators, among others. Traditional...
详细信息
Convolutional neural networks are widely used in computer vision and image processing. However, when the original input is added with manually imperceptible perturbations, these deep network models mostly tend to outp...
详细信息
With the rapid development of information technology, the scale of software has increased exponentially. Binary code similarity detection technology plays an important role in many fields, such as detecting software p...
详细信息
With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of ***,i...
详细信息
With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of ***,it is a great challenge to achieve anonymous authentication of IoT nodes and secure data *** present,blockchain technology is widely used in authentication and s data storage due to its decentralization and ***,Fan et *** a secure and efficient blockchain-based IoT authentication and data sharing *** studied it as one of the state-of-the-art protocols and found that this scheme does not consider the resistance to ephemeral secret compromise attacks and the anonymity of IoT *** overcome these security flaws,this paper proposes an enhanced authentication and data transmission scheme,which is verified by formal security proofs and informal security ***,Scyther is applied to prove the security of the proposed ***,it is demonstrated that the proposed scheme achieves better performance in terms of communication and computational cost compared to other related schemes.
Dear editor,The issue on how to ensure the smart grid environment’s security and reliability has always been a focus in current research. The rapid expansion of the Internet of Things enables billions of smart device...
详细信息
Dear editor,The issue on how to ensure the smart grid environment’s security and reliability has always been a focus in current research. The rapid expansion of the Internet of Things enables billions of smart devices to be involved in the smart grid, such as smart meters, who play a part in monitoring and recording consumers’ power usage. The smart meter first amasses the information of energy consumption and then sends it to utility control.
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assist...
详细信息
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assistance of a server trusted by both the clients via an unprotected network communication environment. The 3 PAKE protocols can be applied to various scenarios, including mobile commerce environment.
Solving large-scale linear equations is of great significance in many engineering fields, such as weather forecasting and bioengineering. The classical computer solves the linear equations, no matter adopting the elim...
详细信息
暂无评论