Secure Links: Secure-by-Design Communications in IEC 61499 Industrial Control Applications

07/24/2021
by   Awais Tanveer, et al.
0

Increasing automation and external connectivity in industrial control systems (ICS) demand a greater emphasis on software-level communication security. In this article, we propose a secure-by-design development method for building ICS applications, where requirements from security standards like ISA/IEC 62443 are fulfilled by design-time abstractions called secure links. Proposed as an extension to the IEC 61499 development standard, secure links incorporate both light-weight and traditional security mechanisms into applications with negligible effort. Applications containing secure links can be automatically compiled into fully IEC 61499-compliant software. Experimental results show secure links significantly reduce design and code complexity and improve application maintainability and requirements traceability.

READ FULL TEXT

page 6

page 11

research
11/02/2019

On secure communication in sensor networks under q-composite key predistribution with unreliable links

Many applications of wireless sensor networks (WSNs) require deploying s...
research
11/02/2019

Secure Connectivity of Wireless Sensor Networks Under Key Predistribution with on/off Channels

Security is an important issue in wireless sensor networks (WSNs), which...
research
04/19/2021

On Design-time Security in IEC 61499 Systems: Conceptualisation, Implementation, and Feasibility

Cyber-attacks on Industrial Automation and Control Systems (IACS) are ri...
research
01/06/2021

Designing Actively Secure, Highly Available Industrial Automation Applications

Programmable Logic Controllers (PLCs) execute critical control software ...
research
08/23/2019

Building Critical Applications using Microservices

Microservices - combined with secure containers - facilitate new ways to...
research
05/25/2022

Secure and Efficient Tunneling of MACsec for Modern Industrial Use Cases

Trends like Industry 4.0 will pose new challenges for future industrial ...
research
05/25/2022

A Case for Practical Configuration Management Using Hardware-based Security Tokens

Future industrial networks will consist of a complex mixture of new and ...

Please sign up or login with your details

Forgot password? Click here to reset