A model of distributed key generation for industrial control systems

Loading...
Publication Logo

Date

2012

Authors

Görkem Kılınç Soylu
Igor Nai-Fovino
Carlo Ferigato
Ahmet Hasan Koltuksuz

Journal Title

Journal ISSN

Volume Title

Publisher

IFAC Secretariat Schlossplatz 12 A-2361 Laxenburg A-2361

Open Access Color

BRONZE

Green Open Access

Yes

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Average
Influence
Average
Popularity
Average

Research Projects

Journal Issue

Abstract

The cyber-security of industrial control systems (ICS) is gaining high relevance due to the impact of industrial system failures on the citizen life. There is an urgent need for the consideration of security in their design and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to cyber-threats is mainly due to the intrinsic weakness of the communication protocols used to control the process network. The peculiarities of the industrial protocols (low computational power large geographical distribution near to real-time constraints) make hard the effective use of traditional cryptographic schemes and in particular the implementation of an effective key management infrastructure supporting a cryptographic layer. In this paper we describe a "model of distributed key generation for industrial control systems" we have recently implemented. The model is based on a known Distributed Key Generator protocol we have adapted to an industrial control system environment and to the related communication protocol (Modbus). To validate in a formal way selected security properties of the model we introduced a Petri Nets representation. This representation allows for modeling attacks against the protocol and understanding some potential weaknesses of its implementation in the industrial control system environment. © 2018 Elsevier B.V. All rights reserved.

Description

Keywords

Ics - Industrial Control Systems, Petri Nets, Scada - Supervisory Control And Data Acquisition, Security Protocols, Discrete Event Simulation, Geographical Distribution, Network Security, Petri Nets, Public Key Cryptography, Scada Systems, Systems Engineering, Cryptographic Schemes, Distributed Key Generation, Effective Key Managements, Industrial Control Systems, Industrial Protocols, Real Time Constraints, Security Protocols, Supervisory Control And Data Acquisition, Intelligent Control, Discrete event simulation, Geographical distribution, Network security, Petri nets, Public key cryptography, SCADA systems, Systems engineering, Cryptographic schemes, Distributed key generation, Effective key managements, Industrial control systems, Industrial protocols, Real time constraints, Security protocols, Supervisory control and data acquisition, Intelligent control, SCADA - Supervisory Control and Data Acquisition, Security Protocols, Petri Nets, ICS - Industrial Control Systems, Control systems, Industrial control systems (ICS), Supervisory Control and Data Acquisition, Cryptographic schemes, Petri nets, Security protocols

Fields of Science

0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences

Citation

WoS Q

Scopus Q

OpenCitations Logo
OpenCitations Citation Count
3

Source

11th International Workshop on Discrete Event Systems WODES 2012

Volume

45

Issue

29

Start Page

356

End Page

363
PlumX Metrics
Citations

CrossRef : 3

Scopus : 4

Captures

Mendeley Readers : 13

SCOPUS™ Citations

4

checked on Apr 09, 2026

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
2.2727

Sustainable Development Goals

INDUSTRY, INNOVATION AND INFRASTRUCTURE9
INDUSTRY, INNOVATION AND INFRASTRUCTURE