Journal on Communications ›› 2017, Vol. 38 ›› Issue (Z2): 185-196.doi: 10.11959/j.issn.1000-436x.2017277

• Comprehensive Reviews • Previous Articles     Next Articles

Research on vulnerability and security technology of industrial Ethernet protocol

Tao FENG1,Ye LU2,3,4,Jun-li FANG1   

  1. 1 College of Computer and Communication,Lanzhou University of Technology,Lanzhou 730050,China
    2 College of Electrical and Information Engineering,Lanzhou University of Technology,Lanzhou 730050,China
    3 Key Laboratory of Gansu Advanced Control for Industrial Processes,Lanzhou University of Technology,Lanzhou 730050,China
    4 National Demonstration Center for Experimental Electrical and Control Engineering Education,Lanzhou University of Technology,Lanzhou 730050,China.
  • Online:2017-11-01 Published:2018-06-07
  • Supported by:
    The National Natural Science Foundation of China(61462060);The National Natural Science Foundation of China(61762060);Gansu Science and Technology Plan Youth Science and Technology Fund Project(1610RJYA008)

Abstract:

To solve the information security of industrial control system,the safety of industrial Ethernet protocol was studied deeply,the research status of protocol security protection was reported and the vulnerability of the five-major protocol was analyzed.Firstly,the architecture of industrial control system and industrial Ethernet protocol was discussed.Secondly,from the three aspects of external active defense technology,internal passive defense technology and protocol security improvement,a perfect industrial Ethernet protocol security protection model was put forward,and the main protection technology was discussed.Finally,the future development direction and research ideas of information security improvement of industrial Ethernet protocol were pointed out.

Key words: industrial control system, industrial Ethernet protocol, information security, defense technology

CLC Number: 

No Suggested Reading articles found!