Research on Trusted Industrial Control Ethernet Network

Full Text (PDF, 222KB), PP.40-46

Views: 0 Downloads: 0

Author(s)

ZHOU Sen-xin 1,2,* HAN Jiang-hong 1 TANG Hao 1

1. School of Computer and Information, Hefei University of Technology, Hefei Anhui, 230009 ,China

2. Information engineering School of Anhui University of finance & economics, Bengbu Anhui , 233041, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2010.02.06

Received: 13 May 2010 / Revised: 22 Jul. 2010 / Accepted: 8 Oct. 2010 / Published: 8 Dec. 2010

Index Terms

Trusted industrial network, Security, Trust Model, Controllability, Survivability

Abstract

Industrial control Ethernet networks are more important in connecting with equipments each other of enterprise comprehensive automation and integrating information. With the explosive growth of network techniques, the traditional control networks can no longer satisfy the security demands on network connectivity, data storage and information exchanges. New types of networks emerged in recent years in order to provide solutions for the increasing requirements on networked services. We propose a trust evaluation model for industrial control Ethernet network. Our study shows the importance and necessity of applying theoretical analyses to understand the complex characteristics of trusted industrial control Ethernet networks.

Cite This Paper

ZHOU Sen-xin, HAN Jiang-hong, TANG Hao, "Research on Trusted Industrial Control Ethernet Network", International Journal of Computer Network and Information Security(IJCNIS), vol.2, no.2, pp.40-46, 2010. DOI:10.5815/ijcnis.2010.02.06

Reference

[1] A. Willig, A. Wolisz, Ring stability of the PROFIBUS tokenpassing protocol over error-prone links, IEEE Trans. Ind. Electron. 48 (2001) 1025– 1033.

[2] S. Lee, K.C. Lee, M.C. Han, J.S. Yoon, On-line fuzzy performance management of Profibus networks, Comput. Ind. 46 (2001) 123– 137.

[3] IEC 61158-4, Digital data communications for measurement and control—Fieldbus for use in industrial control systems—Part 4: Data link protocol specification (IEC, 1999).

[4] J.H. Park, Y.C. Yoon, An extended TCP/IP protocol for real-time local area network, Control Eng. Pract. 6 (1998) 111 – 118.

[5] K.J. Christensen, A simulation study of enhanced arbitration methods for improving Ethernet performance, Comput. Commun.21 (1998) 24– 36.

[6] S. Vitturi, On the use of Ethernet at low level of factory communication systems, Comput. Stand. Interfaces 23 (2001)267– 277.

[7] G. Ye, H. Deng, L. Chen, L. Liu, X. Wang, A prototype switched Ethernet data acquisition system, Fusion Eng. Des. 43 (1999) 413– 416.

[8] B.Y. Choi, S. Song, N. Birch, J. Huang, Probabilistic approach to switched Ethernet for real-time control applications, Proceedings of Seventh International Conference on Real-Time Computing Systems and Applications, 2000, pp. 384– 388.

[9] E. Vonnahme, S. Ruping, U. Ruckert, Measurements in switched Ethernet networks used for automation systems, Proceedings of 2000 IEEE International Workshop on Factory Communication Systems, 2000, pp. 231– 238.

[10] D.A. Glanzer, Plantwide data integration using FOUNDATION fieldbus, Hydrocarbon Process. 80 (2001) F20– F22.

[11] M.Y. Chow, Y. Tipsuwan, Network-based control systems: a tutorial, 27th Annual Conference of the IEEE Industrial Electronics Society, Denver, 2001, pp. 1593– 1602.

[12] G.C. Walsh, Y. Hong, Scheduling of networked control systems,IEEE Control Syst. Mag. 21 (2001) 57–65.

[13] Gokhale and Trivedi, “Analytical Models for Architecture-Based Software Reliability Prediction: A Unification Framework”, IEEE Transactions Volume 55, Issue 4, 2006, pp. 578–590. International Journal of Grid and Distributed Computing Vol.3, No.1, March, 2010

[14] Leys P, Potemans J, Van den Broeck B, Theunis J, Van Lil E and Van de Capelle A: Use of Raw Packet Generator in OPNET, http://www.esat.kuleuven.ac.be/telemic/networking/opnetwork02_ pieter.pdf

[15] E A Smith,Understanding performance issues in IP networks, BT Technology Journal Vol 24 No 4,2006, pp. 172– 178

[16] S. Chinni et al, Trust model for certificate revocation in ad hoc networks, Ad Hoc Networks 6 (2008) 441–457