中国电力 ›› 2015, Vol. 48 ›› Issue (8): 150-154.DOI: 10.11930.2015.8.150

• 信息与通信 • 上一篇    下一篇

工业控制系统安全性分析及通讯协议增强设计

张波,赵婷,徐兴坤,赵晋文   

  1. 中国电力科学研究院,北京 100192
  • 收稿日期:2015-04-27 出版日期:2015-08-25 发布日期:2015-11-25
  • 作者简介:张波(1984—),男,河南沁阳人,助理工程师,从事网络与信息安全、操作系统与数据库安全研究。E-mail: zhangbo@epri.sgcc.com.cn
  • 基金资助:
    国家高科技研究发展计划(863计划)资助项目(2012AA050804)

Safety Analysis of Industrial Control System and Improvement of Communication Protocol Design

ZHANG Bo, ZHAO Ting, XU Xingkun, ZHAO Jinwen   

  1. China Electric Power Research Institute, Beijing 100192, China
  • Received:2015-04-27 Online:2015-08-25 Published:2015-11-25
  • Supported by:
    National High Technology Research and Development Program of China (863 Program) (No. 2012AA050804).

摘要: 随着越来越多工业控制系统(industrial control system,ICS)安全事件的曝光,如何防护ICS的安全已经引起了广泛的关注。然而对于ICS安全防护的研究还主要停留在理论研究和防护体系层面,缺少可以快速建立的、能够降低关键风险的具体防护措施。首先抽象出ICS通信模型,梳理ICS面临的安全风险和威胁,明确了最急迫和关键的安全需求,然后在不影响功能、效率,以及能够快速部署的前提下,设计了一种通信安全增强方案,包括对关键通信报文进行单向的身份认证和完整性检验,并结合了时间戳机制和登记机制。最后通过对增强方案的安全分析,证明其能够抵御伪装、篡改和重放等常见攻击。

关键词: 工业控制系统, 安全性分析, 协议增强, 身份认证, 重放攻击

Abstract: Due to the increase of industrial control system(ICS) security accidents, cyber security in ICS has been greatly concerned in recent years. However, the research on cyber security protection still remains in the theoretical stage. A prevention measure that can be rapidly built and can reduce the key risks is urgently required. In this paper, a communication model of ICS is firstly established. Based on the model, the security risks and threats of ICS are in-vestigated, and the top urgent and critical security needs are clarified. Moreover, a corresponding security enhancing scheme is proposed with the system function and efficiency unaffected. Based on the one-way identity authentication and integrity checking of the key communication messages and combining with the timestamp checking mechanism and the registration mechanism, the proposed scheme is proved to be able to resist the camouflage, tampering, replay attacks and other common attacks, which can satisfy the system security requirements.

Key words: industrial control system, security analyses, security enhance, identity authentication, replay attack

中图分类号: