Username   Password       Forgot your password?  Forgot your username? 

Security Framework based on Trusted Computing for Industrial Control Systems of CNC Machines

Volume 13, Number 8, December 2017, pp. 1336-1346
DOI: 10.23940/ijpe.17.08.p15.13361346

Shanshan Tua,b, Guojie Liua,b, Qiangqiang Lina, Li Lina,b, Zedong Sunc

aFaculty of Information Technology, Beijing University of Technology, 100124 Beijing, China
bBeijing Key Laboratory of Trusted Computing, 100124 Beijing, China
cArmy Aviation Institute, 101123 Beijing, China

(Submitted on September 29, 2017; Revised on November 12, 2017; Accepted on November 23, 2017)


With the deepening of the integration of information technology and industrialization, industrial control systems of computerized numerical control (CNC) machines is gradually changed from the original isolated closed mode into the Internet model. It is not only facing the internal threat, but also facing the threat from the Internet. The existing industrial control system of CNC machine is due to long-term in a closed environment. The system cannot be updated in time; it is difficult to defend against the threat of industrial networks from the Internet. In view of the above problems, this paper firstly puts forward the security and trusted framework for CNC machine control system based on trusted computing technology, and elaborates the frame composition and function principle in detail. Then, the module of the trusted communication monitoring and control for the control system of CNC machine is presented; it can realize the scalability of the CNC machine system and the correlation of the equipment, while satisfying the trusted measurement function. Finally, this paper analyzes the reliability of the traditional CNC machines by means of experimental simulation. The performance shows that in the controllable range, the proposed framework can effectively enhance the CNC machine computing environment security.


References: 16

      1. J. Huang, D. Nicol, and R. Bobba,“A framework integrating attribute-based policies into role-based access control,” the 17th ACM symposium on Access Control Models and Technologies, pp. 187-196, 2012
      2. B. Genge, D. Rusu, and P. Haller, “A connection pattern-based approach to detect network traffic anomalies in critical infrastructures,” European Workshop on System Security, pp. 1-6, 2014
      3. M. Keinert, A. Lechler, and A. Verl, “Concept of a computerized numerical control kernel for execution on multi-core processors,” 2016 IEEE 14th International Workshop on Advanced Motion Control (AMC), pp. 581-586, 2016
      4. S. Karnouskos, “Stuxnet worm impact on industrial cyber-physical system security,” IEEE Industrial Electronics Society, pp.4490-4494, 2011
      5. N. Paxton, D. Jang, and S. Russell, “Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis,” 2015 48th Hawaii International Conference on System Sciences, pp. 5244-5252, 2015
      6. Y. Peng, C. Jiang, and F. Xie, “Industrial control system cybersecurity research,” J Tsinghua Univ (Sci & Technol), no. 10, pp.1396-1408, 2012
      7. C. Shen, D. Zhang, and J. Liu, “The Strategy of TC 3.0: A Revolutionary Evolution in Trusted Computing,” Engineering Sciences, vol. 18, no. 6,pp. 53-57, 2016
      8. C. Shen, and X. Chen, “Construction of the Information Security Infrastructure Based on Trusted Computing,” Journal of Sichuan University (Engineering Science Edition), vol. 46, no. 1, pp .1-7, 2014
      9. Y. Sun, and Y. Wang, Y. Hong, “Research and application of trusted software base,” Journal of Information Security Research, vol. 3,no. 4,pp. 316-322, 2017
      10. M. Wollschlaeger, T. Sauter, and J. Jasperneite, “The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0,” IEEE Industrial Electronics Magazine, vol. 11, no. 1, pp. 17-27, 2017
      11. N. Wallace, and T. Atkison, “Observing industrial control system attacks launched via metasploit framework,” ACM Southeast Conference, no. 22, 2013
      12. Ö. Yüksel, J. Hartog, and S. Etalle, “Reading between the fields: practical, effective intrusion detection for industrial control systems,” ACM Symposium on Applied Computing, pp. 2063-207, 2016
      13. A. Yang, L. Sun,and X. Wang, “Intrusion detection technique for industrial control systems,” Journal of Computer Research and Development, vol. 53,no. 9,pp. 2039-2054, 2016
      14. S. Yi, C. Zhang, and F. Xie, “Security analysis of industrial control network protocols based on Peach,” J Tsinghua Univ (Sci & Technol),no. 1,pp. 50-54, 2017
      15. Y. Zhang, H. Zhao, and L. Wang, “A non-parametric CUSUM intrusion detection method based on industrial control model,” Journal of Southeast University (Natural Science Edition), vol. 42, no. s1, pp. 55-59, 2012
      16. X. Zhang, and C. Shen, “A novel design of trusted platform control module,” Geomatics and Information Science of Wuhan University, vol. 33, no. 10, pp. 1011-1014, 2008


          Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

          This site uses encryption for transmitting your passwords.