{"title":"Construction of Integrated Protection System for Industrial Control System Based on Trusted Computing","authors":"Yuan Tao, Wei Hu, Sheng Li","doi":"10.1109/ICAA53760.2021.00155","DOIUrl":null,"url":null,"abstract":"Industrial control system requires high availability. In principle, security measures should not adversely affect the basic functions of high availability industrial control system. The method of building a secure and trusted PLC are proposed based on trusted computing. Under the premise of ensuring business security, the security protection system of industrial control system is built through trusted computing, and hardware solutions are provided on the security master controller. In order to prevent the attack from the industrial control system network, the encryption technology is used to ensure the confidentiality and integrity of the communication session, which are between the field of control equipment layer and the process monitoring equipment layer, so as to make the industrial control system in a stable and reliable state.","PeriodicalId":121879,"journal":{"name":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAA53760.2021.00155","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Industrial control system requires high availability. In principle, security measures should not adversely affect the basic functions of high availability industrial control system. The method of building a secure and trusted PLC are proposed based on trusted computing. Under the premise of ensuring business security, the security protection system of industrial control system is built through trusted computing, and hardware solutions are provided on the security master controller. In order to prevent the attack from the industrial control system network, the encryption technology is used to ensure the confidentiality and integrity of the communication session, which are between the field of control equipment layer and the process monitoring equipment layer, so as to make the industrial control system in a stable and reliable state.