Engineering edge security in industrial control systems

1Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Industrial Controllers (e.g., Programmable Logical Controllers – PLCs, and Remote Terminal Units – RTUs) have been specialized to deliver robust control strategies. However, little has been done towards the integration of security strategies within their application-layer. This chapter investigates the integration of security solutions within the industrial control system’s “edge” devices – the Industrial Controller (IC). As a specific case study it demonstrates the implementation of a simple anomaly detection engine traditional in control applications. The approach shows that the scheduling rate of control applications is significantly affected by various events, such as a change in the number of network packets, configuration interventions, etc. Implementations realized on a Phoenix Contact ILC 350-PN controller demonstrate the feasibility and applicability of the proposed methodology.

Cite

CITATION STYLE

APA

Haller, P., Genge, B., & Duka, A. V. (2019). Engineering edge security in industrial control systems. In Advanced Sciences and Technologies for Security Applications (pp. 185–200). Springer. https://doi.org/10.1007/978-3-030-00024-0_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free