skip to main content
10.1145/3501409.3501589acmotherconferencesArticle/Chapter ViewAbstractPublication PageseitceConference Proceedingsconference-collections
research-article

Authentication scheme for distributed industrial control system terminals

Published: 31 December 2021 Publication History

Abstract

In order to solve the problem of poor security protection ability of terminal equipment in current industrial control system, combining digital signature technology based on public key infrastructure and secret sharing scheme, an authentication scheme for distributed industrial control system terminal is proposed in this paper. In the process of authentication, digital signature technology based on public key infrastructure is used to deliver secret shares. The existence of the trusted center T is no longer required. This solves the problem of key escrow, prevents illegal personnel from using the name of trusted center T to deliver fake secret shares to industrial control terminal equipment, and enhances the security and reliability of the whole control system. The analysis shows that the authentication scheme can realize the authentication function between the engineer station and PLC terminal equipment in the multi-machine cooperation scenario in the industrial control system, prevent the intrusion of external personnel, ensure that the network data will not leak, and ensure the data security to the greatest extent.

References

[1]
Yilmaz E N, Gonen S. (2018). Attack Detection Prevention System Against Cyber Attack in Industrial Control Systems. Computers & Security, 77, 94--105.
[2]
Fei Yan. (2019). Research on the Information Security Protection System of Terminal Equipment of Industrial Control System. Instrument User, 26(01), 80--82.
[3]
Shouhua Zhao, Yuyun Yan, Guo He, Xiangdong Yang. (2019). Analysis and Research on the Safety Status of Industrial Control System. Industrial Control Computer, 32(11), 97+99.
[4]
Ghaleb A, Zhioua S, Almulhem A. (2018). On PLC network security. International Journal of Critical Infrastructure Protection, 22, 62--29.
[5]
Lifei Wang, Tian Lan. (2020). Information Security and Password Application of Industrial Control System. Integrated Circuit Applications, 37(02), 15--17.
[6]
Zhen Xu, Xiaojun Zhou, Liming Wang, Zelong Chen, Kai Chen, Zhenbo Yan, Wei Zhang, Cong Chen. (2019). Research progress in key technologies of PLC attack and defense. Journal of Information Security, 4(03), 48--69.
[7]
Ji Li. (2019). Thoughts on information security protection of industrial control systems. Network Security Technology and Application, 2019(08), 11--12.
[8]
Wei Yang. 2019. Research and application of industrial control system security authentication based on lightweight password. Guangzhou University.
[9]
Deng Z, Xie L, Rong Y, et al. (2016). Data Security Transmission Mechanism in Industrial Networked Control Systems against Deception Attack. International Journal of Security and its Applications, 10(4), 391--404.
[10]
Titus N. Balan, Alexandra C. Balan, Florin D. Sandu. (2019). SDR Implementation of a D2D Security Cryptographic Mechanism. IEEE Access, 7, 38847--38855.
[11]
Zhaohui Wang, Zhenfeng Zhang. (2016). Summary of SM2 elliptic curve public key cryptography algorithm. Information Security Research, 2(11), 972--982.
[12]
Feiyang Zhu. 2018. The realization of classic public key cryptography algorithm in hyperbolic arithmetic. Yunnan University.
[13]
Huigui Rong, Jinxia Mo, Bingguo Chang, Guang Sun, Fei Long. (2015). Key distribution and recovery algorithm based on Shamir secret sharing. Journal of Communications, 36(03), 64--73.
[14]
Harn L. (2013). Group authentication. IEEE Transactions on Computers, 62(9), 1893--1989.

Cited By

View all

Index Terms

  1. Authentication scheme for distributed industrial control system terminals

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      EITCE '21: Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering
      October 2021
      1723 pages
      ISBN:9781450384322
      DOI:10.1145/3501409
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 31 December 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Digital signature
      2. Industrial control system
      3. Secret sharing
      4. Terminal equipment
      5. The identity authentication

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      EITCE 2021

      Acceptance Rates

      EITCE '21 Paper Acceptance Rate 294 of 531 submissions, 55%;
      Overall Acceptance Rate 508 of 972 submissions, 52%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 14 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media