Skip to main content

Advertisement

Log in

An Implementation of Convergence Security Solution for Overcoming of Security Vulnerabilities in Industrial Control Communication Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

As ICT has been introduced into the traditional industrial field and the convergence industry environment has been developed, the industrial devices operated as closed networks are exposed to external networks, resulting in increased security vulnerability. If ICT networks with open and bi-directional features control industrial devices using unprotected industrial protocols, the physical and economic damage will increase rapidly. General Internet security equipment can be applied, but it is impossible to completely block security threats. In this paper, we analyze security flaws in ICT convergence industry control network and propose security technology to overcome these vulnerabilities. In addition, the convergence industry security gateway system has been developed by applying DPI Filtering Technology, Self-Similarity Technology, OPC-UA Protocol Gateway Technology and Unidirectional Communication Technology proposed in this paper. This system can be applied to the ICT convergence industry to improve the overall security level, and it is expected that the stability of ICT convergence products and services, which cover a wide range of household devices including automobiles and TVs. Future research will develop an industrial standard protocol conversion technology such as MQTT in addition to OPC-UA, and improve the processing performance and bandwidth of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Bandyopadhyay, D., & Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58(1), 49–69.

    Article  Google Scholar 

  2. Kim, J. S. (2013). Advanced information technologies in future computing environments. Wireless Personal Communications, 73(4), 1345–1348.

    Article  Google Scholar 

  3. Samuel, T. K., & Knud, E. S. (2017). Cyber security threats to IoT applications and service domains. Wireless Personal Communications, 95(1), 169–185.

    Article  Google Scholar 

  4. Lee, M. S., & Lee, D. H. (2013). A study on convergence security system for preventing leakage of internal information. Wireless Personal Communications, 73(2), 175–185.

    Article  Google Scholar 

  5. Falliere, N., Murchu, L. O., & Chien, E. (2011). Win32.stuxnet dossier. Symantec Security Response.

  6. Choi, Y. S. (2013). Middle investigation reports for Korea hydro & nuclear power plant cyber terror incidents. In The joint investigation team for personal information crimes.

  7. Mohamed, A., & Geir, M. K. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65–88.

    Article  Google Scholar 

  8. Stiennon, R. (2002). DPI: Next phase of firewall technology. Technology T-18-0340 Report, Gartner Group.

  9. Noh, H. S., & Lee, J. K. (2017). Network security method using data analysis of industrial network protocol and machine learning thereof, and network security apparatus using same. Korea patent no. 10-2017-0158092.

  10. Heinrich, H. W. (1931). Industrial accident prevention: A scientific approach (p. 366). New York: McGraw-Hill.

    Google Scholar 

  11. OPC Foundation (2002). OPC common 1.10 specification. OPC Task Force,

  12. Pocock, N., Kominek, D., & Hunkar, P. (2014). OPC-UA security how it works. Information Revolution 2014.

  13. International Electrotechnical Commission (2010). OPC unified architecture—part 1: Overview and concepts. IEC62541.

  14. Shim, J. Y., & Lee, J. K. (2017). Security methods and apparatus for industrial networks. Korea patent no. 10-1736223.

  15. Lee, S. J., & Lee, J. K. (2017). Unidirectional communication device and method. Korea patent no. 10-1754321.

  16. Lee, S. J., & Kim, J. W. (2017). Duplex unidirectional communication system and method. Korea patent no. 10-1736224, 2017.

  17. Lee, J. K. (2017). Apparatus and method for securing communication for electric power demand response system. Korea patent no. 10-1750447.

  18. Choi, M. Y., Lee, J. K. (2016). Method apparatus and system for payload analysis of an open automated demand response protocol. Korea patent no. 10-1695958.

  19. Federal Office for Information Security. OPC UA Security Analysis, 2017.

  20. OWASP (2017) OWASP Top 10 application security risks—2017.

Download references

Acknowledgement

This work was supported by the Korea Evaluation Institute of Industrial Technology (KEIT) Grant funded by the Ministry of Trade, Industry & Energy (MOTIE) of the Republic of Korea (No. 10077303).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to June-Kyoung Lee.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, JK., Lee, SW. & Lee, KH. An Implementation of Convergence Security Solution for Overcoming of Security Vulnerabilities in Industrial Control Communication Network. Wireless Pers Commun 105, 545–565 (2019). https://doi.org/10.1007/s11277-018-5970-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5970-4

Keywords

Navigation