Simulating and modelling the impact of secure communication latency for closed loop control

R. D. Sparrow, A. A. Adekunle, R. J. Berry, R. Farnish
{"title":"Simulating and modelling the impact of secure communication latency for closed loop control","authors":"R. D. Sparrow, A. A. Adekunle, R. J. Berry, R. Farnish","doi":"10.1109/ITECHA.2015.7317384","DOIUrl":null,"url":null,"abstract":"Closed loop control systems have been implemented to conduct a variety of tasks (e.g. manufacturing and automation). Industrial Control System (ICS) have been used to regulate a closed loop process; however, ICS are exposed to the same security vulnerabilities associated with enterprise networks. Cryptography has been deployed to overcome the associated data communication weaknesses between each ICS node through the use of block ciphers; however, the drawback of applying cryptographic algorithms to ICS is the additional communication latency. This paper investigates the relationship between security constructs and latency for closed loop control system with test conducted in a simulated environment. A case scenario is illustrated to demonstrate the impact of the results obtained to a real world context.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Internet Technologies and Applications (ITA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITECHA.2015.7317384","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Closed loop control systems have been implemented to conduct a variety of tasks (e.g. manufacturing and automation). Industrial Control System (ICS) have been used to regulate a closed loop process; however, ICS are exposed to the same security vulnerabilities associated with enterprise networks. Cryptography has been deployed to overcome the associated data communication weaknesses between each ICS node through the use of block ciphers; however, the drawback of applying cryptographic algorithms to ICS is the additional communication latency. This paper investigates the relationship between security constructs and latency for closed loop control system with test conducted in a simulated environment. A case scenario is illustrated to demonstrate the impact of the results obtained to a real world context.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
对安全通信延迟对闭环控制的影响进行了仿真和建模
已实施闭环控制系统来执行各种任务(例如制造和自动化)。工业控制系统(ICS)已被用于调节闭环过程;但是,ICS暴露于与企业网络相关的相同安全漏洞。密码学已被部署,通过使用分组密码来克服每个ICS节点之间相关的数据通信弱点;然而,将加密算法应用于ICS的缺点是额外的通信延迟。本文通过仿真环境测试,研究了闭环控制系统的安全结构与时延之间的关系。通过一个案例场景来演示所获得的结果对真实世界环境的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
IOT enabled sensor in multimodal intelligent applications for children with special needs Reconfigurable neurons - making the most of configurable logic blocks (CLBs) A self-report study that gauges perceived and induced emotion with music Template matching for noisy images Physical layer network coding with two-way relay free space optical communication link
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1