z-logo
open-access-imgOpen Access
Research on Key Protocol Technology of Safe Access and Imitation Attack for Power Industrial Control Terminal Equipment
Author(s) -
Xiaoqiang Wang,
Rui Rui,
Zhao Yu,
Jinye Zhang
Publication year - 2019
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/677/4/042068
Subject(s) - vulnerability (computing) , computer security , key (lock) , industrial control system , protocol (science) , computer science , control (management) , electric power industry , security controls , electric power system , control system , power (physics) , embedded system , engineering , electricity , electrical engineering , medicine , physics , alternative medicine , pathology , quantum mechanics , artificial intelligence
Industrial control system is widely used in social production activities and its security is directly related to national security and social stability. In this paper, the security threats and protection status of power industry control system are analyzed. A framework of information security evaluation system for power industry control system is proposed, which consists of three parts: experimental verification environment, product detection capability and security service capability, and the construction scheme of the system is discussed. A hardware-in-the-loop simulation and verification platform is constructed to realize the simulation and verification of power industry control system tools. The vulnerability of power industry control protocol can be found in depth. The problem of ambiguous attack mechanism and lack of verification means of power industry control system is discussed, which can provide support for the research of attack and protection of power industry control system.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here