Security of the data transmission in the industrial control system
Journal Title: Bulletin of the Military University of Technology - Year 2015, Vol 64, Issue 4
Abstract
The theme of this paper is to present the data transmission security system between the stations of the industrial control system. The possible options for secure communications between process stations, as well as between process and operator station are described. Transmission security mechanism is based on algorithms for symmetric and asymmetric encryption. The authentication process uses a software token algorithm and a one-way hash function. The algorithm for establishing a secured connection between the stations, including the authentication process and encryption of data transmission is given. The process of securing the transmission consists of 4 sub-processes: (I) authentication; (II) asymmetric, public keys transmission; (III) symmetric key transmission; (IV) data transmission. The presented process of securing the transmission was realized in the industrial controller and emulator. For this purpose, programming languages in accordance with EN 61131 were used. The functions were implemented as user function blocks. This allows us to include a mixed code in the structure of the block (both: ST and FBD). Available function categories: support of the asymmetric encryption; asymmetric encryption utility functions; support of the symmetric encryption; symmetric encryption utility functions; support of the hash value calculations; utility functions of conversion.[b]Keywords[/b]: transmission security, encryption, authentication, industrial control system
Authors and Affiliations
Marcin Bednarek, Tadeusz Dąbrowski
Dynamic displacement analysis of reinforced concrete deep beams made of high strength concrete. Part II: Dynamic displacement analysis of reinforced concrete deep beams made of high strength C200 grade concrete
The dynamic load displacements were analysed of rectangular concrete deep beams made of very high strength concrete, grade C200, including an evaluation of the physical non-linearity of the construction materials: concre...
Obrona przed bronią masowego rażenia. Rozwiązania techniczne i funkcjonalne w ochronie indywidualnej w Wojskach Obrony Terytorialnej
W pracy scharakteryzowano obronę przed bronią masowego rażenia, jako system zabezpieczenia wojsk w przypadku zagrożenia skażeniami (zakażeniami) w ujęciu funkcjonalnym i zadaniowym. Przedstawiono podstawowe wyposażenie t...
Influence of alkyl chain length and fluorine atoms substitution on infrared spectra of chiral liquid crystalline esters
The infrared spectra were registered for series of three-ring liquid crystalline esters, differing in the structure of alkyl chain, in the substitution of benzene ring by fluorine atoms and in the type of helicoidal stru...
Analiza mechanizmów ochrony hasłem Telegram i Viber
Telegram i Viber to jedne z najpopularniejszych komunikatorów mobilnych. W odróżnieniu od produktów takich jak WhatsApp czy Facebook Messenger komunikatory te pozwalają na ograniczanie dostępu do wiadomości przechowywany...
Random linear codes in steganography
Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear cod...