Open Access

ARTICLE

PLC Protection System Based on Verification Separation

Xiaojun Pan1, Haiying Li2, Xiaoyi Li1, Li Xu1, Yanbin Sun1,*
1 Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, 510000, China
2 School of Science and Engineering, Laval University, Quebec, G1V0A6, Canada
* Corresponding Author: Yanbin Sun. Email:

Computers, Materials & Continua 2022, 71(2), 2401-2417. https://doi.org/10.32604/cmc.2022.021020

Received 19 June 2021; Accepted 29 September 2021; Issue published 07 December 2021

Abstract

Supervisory control and data acquisition systems (SCADAs) play an important role in supervising and controlling industrial production with the help of programmable logic controllers (PLCs) in industrial control systems (ICSs). A PLC receives the control information or program from a SCADA to control the production equipment and feeds the production data back to the SCADA. Once a SCADA is controlled by an attacker, it may threaten the safety of industrial production. The lack of security protection, such as identity authentication and encryption for industrial control protocols, increases the potential security risks. In this paper, we propose a PLC protection system combined with a monitor between a SCADA and a PLC and a physically separated monitoring station. By using the PLC protection system, identity verification and command verification are separated, and both the identity of the operator and the corresponding commands are recorded. Experiments show that even if the SCADA is controlled by an attacker, our system could still protect the PLC in the field and record the identity of the key command operator, which facilitates the tracing and forensics of malicious activities.

Keywords

ICS; SCADA; PLC security

Cite This Article

X. Pan, H. Li, X. Li, L. Xu and Y. Sun, "Plc protection system based on verification separation," Computers, Materials & Continua, vol. 71, no.2, pp. 2401–2417, 2022.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 698

    View

  • 634

    Download

  • 0

    Like

Share Link

WeChat scan