Agent-based PKI for Distributed Control System

Security in Industrial Control Systems is a rapidly growing subject as awareness of the threat of exposure is being taken ever more seriously. From the SCADA schemas to the Distributed Control Systems (DCS) the threats have evolved from the physical to the computational. Industrial "Command&...

Full description

Saved in:
Bibliographic Details
Published in2015 World Congress on Industrial Control Systems Security (WCICSS) pp. 28 - 35
Main Authors Blanch-Torne, Sergi, Cores, Fernando, Moreno Chiral, Ramiro
Format Conference Proceeding
LanguageEnglish
Published Infonomics Society 01.12.2015
Subjects
Online AccessGet full text
DOI10.1109/WCICSS.2015.7420319

Cover

Abstract Security in Industrial Control Systems is a rapidly growing subject as awareness of the threat of exposure is being taken ever more seriously. From the SCADA schemas to the Distributed Control Systems (DCS) the threats have evolved from the physical to the computational. Industrial "Command&control" flow, especially in Critical Infrastructure that requires hard protection and the basis to have a strong background is being developed. This is a proposal to incorporate Public Key Infrastructure (PKI) functionalities, focussing on distributed features, into Industrial Control Systems (ICS). Taking advantage of the use of well-known tools and security solutions, adjusting them to the constraints and limitations of the deployment scenario, the industrial computation must do "security by default". We show how a PKI can be built with distributed features to be used within a DCS. We propose an agent-based distributed system that can take advantage of an object-oriented paradigm to integrate PKI and cryptography in the most natural way. The main security threats and requirements have been analysed, leading to a new [D]PKI architecture and the specification of its main protocols (join, search and leave).
AbstractList Security in Industrial Control Systems is a rapidly growing subject as awareness of the threat of exposure is being taken ever more seriously. From the SCADA schemas to the Distributed Control Systems (DCS) the threats have evolved from the physical to the computational. Industrial "Command&control" flow, especially in Critical Infrastructure that requires hard protection and the basis to have a strong background is being developed. This is a proposal to incorporate Public Key Infrastructure (PKI) functionalities, focussing on distributed features, into Industrial Control Systems (ICS). Taking advantage of the use of well-known tools and security solutions, adjusting them to the constraints and limitations of the deployment scenario, the industrial computation must do "security by default". We show how a PKI can be built with distributed features to be used within a DCS. We propose an agent-based distributed system that can take advantage of an object-oriented paradigm to integrate PKI and cryptography in the most natural way. The main security threats and requirements have been analysed, leading to a new [D]PKI architecture and the specification of its main protocols (join, search and leave).
Author Cores, Fernando
Blanch-Torne, Sergi
Moreno Chiral, Ramiro
Author_xml – sequence: 1
  givenname: Sergi
  surname: Blanch-Torne
  fullname: Blanch-Torne, Sergi
  email: sblanch@alumnes.udl.cat
  organization: Escola Politec. Super., Spain
– sequence: 2
  givenname: Fernando
  surname: Cores
  fullname: Cores, Fernando
  email: fcores@diei.udl.cat
  organization: Distrib. Comput. Res. Group, Univ. de Lleida, Lleida, Spain
– sequence: 3
  givenname: Ramiro
  surname: Moreno Chiral
  fullname: Moreno Chiral, Ramiro
  email: ramiro@matematica.udl.cat
  organization: Cryptography & Graphs Res. Group, Spain
BookMark eNotj8tqwzAQRVVoF02aL8jGP2BX0kiytQzqyyTQghu6DCN7VASJXWR1kb9voFldOAcO3AW7HaeRGFsLXgnB7eOXa13XVZILXdVKchD2hi2E5Q1Irhu4Z9Xmm8ZcepxpKD62bRGmVDzFOafof_OFuWnMaToW3XnOdHpgdwGPM62uu2T7l-dP91bu3l9bt9mVUUjIpZC9UbbBYIYeidRgDXCgmsgTGqVVMMb0OCirAcFCbXwPQQf08qKpgSVb_3cjER1-UjxhOh-uF-AP_tRACg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/WCICSS.2015.7420319
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1908320583
9781908320582
EndPage 35
ExternalDocumentID 7420319
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i123t-12c6498af6dcaee4d96303e7eebea6454f666cad4953a39376bc3f5fab2a64e83
IEDL.DBID RIE
IngestDate Thu Jun 29 18:36:30 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i123t-12c6498af6dcaee4d96303e7eebea6454f666cad4953a39376bc3f5fab2a64e83
PageCount 8
ParticipantIDs ieee_primary_7420319
PublicationCentury 2000
PublicationDate 20151201
PublicationDateYYYYMMDD 2015-12-01
PublicationDate_xml – month: 12
  year: 2015
  text: 20151201
  day: 01
PublicationDecade 2010
PublicationTitle 2015 World Congress on Industrial Control Systems Security (WCICSS)
PublicationTitleAbbrev WCICSS
PublicationYear 2015
Publisher Infonomics Society
Publisher_xml – name: Infonomics Society
Score 1.604245
Snippet Security in Industrial Control Systems is a rapidly growing subject as awareness of the threat of exposure is being taken ever more seriously. From the SCADA...
SourceID ieee
SourceType Publisher
StartPage 28
SubjectTerms Computer architecture
Critical Information Infrastructure Protection (CIIP)
Cryptography Engineering
Distributed Control Systems
Distributed Security
Elliptic curve cryptography
Industrial control
Industrial Internet of Things (IIoT)
Key management
Proposals
Protocols
Title Agent-based PKI for Distributed Control System
URI https://ieeexplore.ieee.org/document/7420319
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEB3anjyptOI3OXh00zTZfB0lWlqlUqjF3sp-zIIIrUhy8dc7k8SK4sHbsruQ7C7hzWTfewNwlQWpUxSYi1ynUsgoUEKhC0TmnM6pEWYBa4dnj8lkKe9X8aoD1zstDCLW5DP0uVnf5dutqfhX2ZDSOBbddKGbZkmj1WqNhEZBPnwupsViwWyt2G9n_iiZUiPGeB9mX89qiCKvflVq33z8smH878scwOBbm-fNd6hzCB3c9MG_YYWUYEiy3vxh6lEo6t2yJy6Xs6K-omGke41B-QCW47unYiLaSgjihZClFKPQJDLPlEusUYjS0mcTRJgiHYFiTy5HWYhRlsmiii3uEm0iFzulQxrGLDqC3ma7wWPwEspYlDOJss5JJy3BNWKOUR5rS7FKeAJ9Xuv6rTG7WLfLPP27-wz2eL8bfsc59Mr3Ci8IpUt9WR_PJ-DylEc
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEB1qPehJpRW_zcGjm6bJJk2OEi2t_aDQFnsrm91ZkEIrkl789c4ksaJ48LbsLiS7S3gz2ffeANzFXscqCsxFknWkkIGnhELridjaLKGGH3usHR6No95cPi_CRQ3ud1oYRCzIZ-hys7jLNxu95V9lLUrjWHSzB_uhlDIs1VqVlVDbS1ovaT-dTpmvFbrV3B9FUwrM6B7B6OtpJVVk5W7zzNUfv4wY__s6x9D8Vuc5kx3unEAN1w1wH1gjJRiUjDMZ9B0KRp1HdsXlglbUl5acdKe0KG_CvPs0S3uiqoUgXglbctH2dSSTWNnIaIUoDX04XoAdpENQ7MplKQ_RyjBdVLHJXZTpwIZWZT4NYxycQn29WeMZOBHlLMrqSBlrpZWGABsxwSAJM0PRin8ODV7r8q20u1hWy7z4u_sWDnqz0XA57I8Hl3DIe1-yPa6gnr9v8ZowO89uiqP6BNdSl5Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+World+Congress+on+Industrial+Control+Systems+Security+%28WCICSS%29&rft.atitle=Agent-based+PKI+for+Distributed+Control+System&rft.au=Blanch-Torne%2C+Sergi&rft.au=Cores%2C+Fernando&rft.au=Moreno+Chiral%2C+Ramiro&rft.date=2015-12-01&rft.pub=Infonomics+Society&rft.spage=28&rft.epage=35&rft_id=info:doi/10.1109%2FWCICSS.2015.7420319&rft.externalDocID=7420319