Ajou University repository

A novel security framework for industrial iot based on isa 100.11a
  • Kim, Hyunjin ;
  • Kim, Sungjin ;
  • Kwon, Sungmoon ;
  • Jo, Wooyeon ;
  • Shon, Taeshik
Citations

SCOPUS

0

Citation Export

Publication Year
2019-01-01
Journal
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Publisher
Springer Verlag
Citation
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Vol.272, pp.61-72
Keyword
Industrial Control System (ICS)Industrial IoT (IIoT) ISA100.11aSecurity framework
Mesh Keyword
Communication testHardware specificationsIndustrial control systemsIndustrial IoT (IIoT) ISA100.11aNetwork environmentsSecurity frameworksSecurity functionsWireless communication protocols
All Science Classification Codes (ASJC)
Computer Networks and Communications
Abstract
This paper proposes a security assurance technology of IoT devices using their relevant standard, focusing on ISA100.11a, one of the ICS wireless communication protocols. The proposed security assurance technology is divided broadly into communication test and security function assessment. In detail, the communication test is divided into baseline operation test, resource robustness testing, and packet manipulation testing. The security function assessment conducted with the devices that have passed communication testing is proposed differing the required items, divided by the components of ISA100.11a, such as a field device, backbone router, and host so that an assessment appropriate for the hardware specifications and roles of each component is achieved. In addition, the paper seeks to facilitate the implementation and application of the proposed security assurance technology by proposing concrete methods or criteria for communication testing and security function assessment. Finally, this paper attempts to verify the conformance of the proposed security assurance by testing the security assurance technology in a test-bed with a network environment where the standard ISA100.11a can work network environment.
ISSN
1867-8211
Language
eng
URI
https://aurora.ajou.ac.kr/handle/2018.oak/36406
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85070989755&origin=inward
DOI
https://doi.org/10.1007/978-3-030-14413-5_5
Journal URL
http://www.springer.com/series/8197
Type
Conference
Funding
-This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2018-2016-0-00304) supervised by the IITP (Institute for Information & communications Technology Promotion). -This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (NRF-2018R1D1A1B07043349). -This work was supported by an IITP grant funded by the Korean government (MSIT) (No. 2018-0-00336, Advanced Manufacturing Process Anomaly Detection to prevent the Smart Factory Operation Failure by Cyber Attacks).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

SHON, TAE SHIK Image
SHON, TAE SHIK손태식
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.