Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/5222
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kılınç, Görkem | - |
dc.contributor.author | Fovino, Igor Nai | - |
dc.contributor.author | Ferigato, Carlo | - |
dc.contributor.author | Koltuksuz, Ahmet | - |
dc.date.accessioned | 2017-04-05T07:31:03Z | - |
dc.date.available | 2017-04-05T07:31:03Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | Kılınç, G., Fovino, I. N., Ferigato, C., Koltuksuz, A. (2012). A model of distributed key generation for industrial control systems. IFAC Proceedings Volumes, 45(29), 356-363. doi:10.3182/20121003-3-MX-4033.00057 | en_US |
dc.identifier.issn | 1474-6670 | - |
dc.identifier.uri | http://doi.org/10.3182/20121003-3-MX-4033.00057 | - |
dc.identifier.uri | http://hdl.handle.net/11147/5222 | - |
dc.description | 11th International Workshop on Discrete Event Systems, WODES 2012; Guadalajara, Jalisco; Mexico; 3 October 2012 through 5 October 2012 | en_US |
dc.description.abstract | The cyber-security of industrial control systems (ICS) is gaining high relevance due to the impact of industrial system failures on the citizen life. There is an urgent need for the consideration of security in their design, and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to cyber-threats is mainly due to the intrinsic weakness of the communication protocols used to control the process network. The peculiarities of the industrial protocols (low computational power, large geographical distribution, near to real-time constraints) make hard the effective use of traditional cryptographic schemes and in particular the implementation of an effective key management infrastructure supporting a cryptographic layer. In this paper, we describe a "model of distributed key generation for industrial control systems" we have recently implemented. The model is based on a known Distributed Key Generator protocol we have adapted to an industrial control system environment and to the related communication protocol (Modbus). To validate in a formal way selected security properties of the model, we introduced a Petri Nets representation. This representation allows for modeling attacks against the protocol and understanding some potential weaknesses of its implementation in the industrial control system environment. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier Ltd. | en_US |
dc.relation.ispartof | IFAC Proceedings Volumes | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Control systems | en_US |
dc.subject | Cryptographic schemes | en_US |
dc.subject | Industrial control systems (ICS) | en_US |
dc.subject | Security protocols | en_US |
dc.subject | Supervisory Control and Data Acquisition | en_US |
dc.subject | Petri nets | en_US |
dc.title | A model of distributed key generation for industrial control systems | en_US |
dc.type | Conference Object | en_US |
dc.institutionauthor | Kılınç, Görkem | - |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.identifier.volume | 45 | en_US |
dc.identifier.issue | 29 | en_US |
dc.identifier.startpage | 356 | en_US |
dc.identifier.endpage | 363 | en_US |
dc.identifier.scopus | 2-s2.0-84881067523 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.3182/20121003-3-MX-4033.00057 | - |
dc.relation.doi | 10.3182/20121003-3-MX-4033.00057 | en_US |
dc.coverage.doi | 10.3182/20121003-3-MX-4033.00057 | en_US |
local.message.claim | 2022-06-14T16:22:01.541+0300 | * |
local.message.claim | |rp01152 | * |
local.message.claim | |submit_approve | * |
local.message.claim | |dc_contributor_author | * |
local.message.claim | |None | * |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | N/A | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.grantfulltext | open | - |
item.cerifentitytype | Publications | - |
item.fulltext | With Fulltext | - |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection Sürdürülebilir Yeşil Kampüs Koleksiyonu / Sustainable Green Campus Collection |
CORE Recommender
SCOPUSTM
Citations
4
checked on Nov 22, 2024
Page view(s)
254
checked on Nov 25, 2024
Download(s)
294
checked on Nov 25, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.