Securing the Critical Communication in Dam Control System with SDN

被引:0
|
作者
Liu, I-Hsien [1 ]
Huang, Min-Wei [1 ]
Lai, Hsin-Yu [1 ]
Lee, Meng-Huan [1 ]
Li, Jung-Shian [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Elect Engn, Inst Comp & Commun Engn, 1 Univ Rd, Tainan 701401, Taiwan
来源
关键词
Cybersecurity; Industrial control system; Software-defined network;
D O I
暂无
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
Industrial control systems currently heavily rely on the Internet of Things, which poses a higher risk of cyber attacks. This is particularly concerning in critical infrastructure, as an attack could endanger lives and result in military actions. A software-defined network is a common centralized network architecture in the Internet. It has a lot of uses and is easy to manage. In our research, we applied the SDN (Software-defined network) on the ICS (Industrial Control System) to ensure the critical flow between industrial equipment. (c) 2022 The Author. Published by Sugisaka Masanori at ALife Robotics Corporation Ltd.
引用
收藏
页码:179 / 183
页数:5
相关论文
共 50 条
  • [31] Securing IOT Devices Using SDN and Edge Computing
    Aggarwal, Chaitanya
    Srivastava, Kingshuk
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 877 - 882
  • [32] Critical infrastructures at risk: Securing the European electric power system
    Smith, James F.
    JOURNAL OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT, 2008, 4 (04):
  • [33] Securing Critical IT Infrastructure
    Scholz, James A.
    INFORMATION SECURITY JOURNAL, 2009, 18 (01): : 33 - 39
  • [34] Securing Critical Infrastructure
    Schukat, Michael
    2014 10TH INTERNATIONAL CONFERENCE ON DIGITAL TECHNOLOGIES (DT), 2014, : 298 - 304
  • [35] B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain
    Phan The Duy
    Hien Do Hoang
    Do Thi Thu Hien
    Anh Gia-Tuan Nguyen
    Van-Hau Pham
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 64
  • [36] CPAC: Securing Critical Infrastructure with Cyber-Physical Access Control
    Etigowni, Sriharsha
    Tian, Dave
    Hernandez, Grant
    Zonouz, Saman
    Butler, Kevin
    32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 139 - 152
  • [37] Wisag AGR securing System Availability and Cost Control
    不详
    FLEISCHWIRTSCHAFT, 2016, 96 (06): : 64 - 64
  • [38] An optimized deep networks for securing 5g communication system
    Naveena, Ambidi
    Lakshmi, Maddala Vijaya
    Lakshmi, Meeniga Vijaya
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 4015 - 4029
  • [39] An optimized deep networks for securing 5g communication system
    Ambidi Naveena
    Maddala Vijaya Lakshmi
    Meeniga Vijaya Lakshmi
    Cluster Computing, 2023, 26 : 4015 - 4029
  • [40] A New SDN Traffic Control Application for Security Routing in Critical Infrastructures
    Adami, Davide
    Giordano, Stefano
    D'Amore, Giuseppe
    Brignoli, Mauro Alberto
    de la Hoz, Enrique
    Lopez Civera, German
    DCNET: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 1, 2016, : 129 - 138