SIA OpenIR  > 工业控制网络与系统研究室
Alternative TitleConstruction Method and Verification of Local Trusted Computing Environment in Industrial Control Network
尚文利1,3,4,5; 张修乐1,2,3,4; 刘贤达1,3,4,5; 尹隆1,3,4,5
Source Publication信息网络安全
Contribution Rank1
Funding Organization国家自然科学基金面上项目[61773368] ; 国家电网公司科技项目[52110118001H] ; 中国科学院战略性先导科技专项[XDC02000000]
Keyword工业控制系统 可信PLC 可信计算环境 深度信念网络
Other AbstractThe information security protection capability of terminal system layer of industrial control system is relatively weak. Constructing the trusted computing environment of the local industrial control equipment layer is of great significance for greatly improving the information security protection capability of industrial control system. This paper proposes the design of industrial control network security application based on trusted PLC. Starting from the security problem of terminal control equipment, the application design completes the security protection of the equipment itself and its network, and constructs high-security and high-trusted industrial control network operating environment. The simulation experiment combines the trusted PLC and the special safety products of industrial control system to build the local trusted computing architecture of industrial control network, verify the trusted start-up process of trusted PLC, and guide the trusted PLC to exchange the security function data. The anomaly detection model based on deep belief network is used to detect the normal communication data and the data subjected to the simulated attack in the trusted computing environment. The experimental results verify the security and credibility of the local trusted computing environment of industrial control network.
Document Type期刊论文
Corresponding Author尚文利
Recommended Citation
GB/T 7714
尚文利,张修乐,刘贤达,等. 工控网络局域可信计算环境构建方法与验证[J]. 信息网络安全,2019(4):1-10.
APA 尚文利,张修乐,刘贤达,&尹隆.(2019).工控网络局域可信计算环境构建方法与验证.信息网络安全(4),1-10.
MLA 尚文利,et al."工控网络局域可信计算环境构建方法与验证".信息网络安全 .4(2019):1-10.
Files in This Item: Download All
File Name/Size DocType Version Access License
工控网络局域可信计算环境构建方法与验证.(2572KB)期刊论文出版稿开放获取CC BY-NC-SAView Download
Related Services
Recommend this item
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[尚文利]'s Articles
[张修乐]'s Articles
[刘贤达]'s Articles
Baidu academic
Similar articles in Baidu academic
[尚文利]'s Articles
[张修乐]'s Articles
[刘贤达]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[尚文利]'s Articles
[张修乐]'s Articles
[刘贤达]'s Articles
Terms of Use
No data!
Social Bookmark/Share
File name: 工控网络局域可信计算环境构建方法与验证.pdf
Format: Adobe PDF
This file does not support browsing at this time
All comments (0)
No comment.

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.