Abstract

The vigorous development of the Industrial Internet of Things brings the advanced connection function of the new generation of industrial automation and control systems. The Supervisory Control and Data Acquisition (SCADA) network is converted into an open and highly interconnected network, where the equipment connections between industrial electronic devices are integrated with a SCADA system through a Modbus protocol. As SCADA and Modbus are easily used for control and monitoring, the interconnection and operational efficiency between systems are highly improved; however, such connectivity inevitably exposes the system to the open network environment. There are many network security threats and vulnerabilities in a SCADA network system. Especially in the era of the Industrial Internet of Things, any security vulnerability of an industrial system may cause serious property losses. Therefore, this paper proposes an encryption and verification mechanism based on the trusted token authentication service and Transport Layer Security (TLS) protocol to prevent attackers from physical attacks. Experimentally, this paper deployed and verified the system in an actual field of energy management system. According to the experimental results, the security defense architecture proposed in this paper can effectively improve security and is compatible with the actual field system.

Highlights

  • With the development and maturity of the Internet of Things technology, a large number of related technologies are being used to realize intelligent manufacturing in the field of industrial automation and information analysis [1]

  • According to the experimental results, the security defense architecture proposed in this paper can effectively improve security and is compatible with the actual field system

  • This paper proposes an encryption and verification mechanism based on the trusted token authentication service and Transport Layer Security (TLS) protocol to ensure Supervisory Control and Data Acquisition (SCADA) network security and prevent attackers from physical attacks in the energy management system of Industrial Internet of Things

Read more

Summary

Introduction

With the development and maturity of the Internet of Things technology, a large number of related technologies are being used to realize intelligent manufacturing in the field of industrial automation and information analysis [1]. The Energy Management System (EMS) [13], which is used for monitoring, managing, and controlling systems, has developed many applications along with the technological improvements of the Industrial Internet of Things, such as the Building Energy Management System (BEMS) [14], which is applied to residences and centered on residents. The growing demand for automatic industrial control systems has brought SCADA from strictly isolated networks to the highly interconnected Internet [21]; infrastructure is exposed to the risk of information security and may be attacked by hackers at any time, which will result in significant economic losses. In order to solve the above problems, this paper proposes an encryption and verification mechanism based on Tokens and the Transport Layer Security (TLS) Protocol to prevent hackers from engaging in physical attacks.

The Security of the Industrial Internet of Things
TLS Protocol
The Authentication in IoT Environment
Problem Definition
TTAS: Trusted Token Authentication Service
Generating Tokens
System of Encryption and Verification Mechanism
Security Analysis
Claim 1
Experiment
Simulating Experimental Environment
Actual Field Experiment Results
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call