Method and System for Protection of Automated Control Systems for “Smart Buildings”

Full Text (PDF, 212KB), PP.1-8

Views: 0 Downloads: 0

Author(s)

Dmitry Mikhaylov 1,* Igor Zhukov 1 Andrey Starikovskiy 1 Alexander Zuykov 1 Anastasia Tolstaya 1 Maxim Fomin 1

1. National Research Nuclear University “MEPhI”, Moscow, Russia

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2013.09.01

Received: 22 Dec. 2012 / Revised: 21 Mar. 2013 / Accepted: 2 May 2013 / Published: 8 Jul. 2013

Index Terms

Automated control systems (ACS), protection system, anti-virus, twisted-pair, power lines, radio channels

Abstract

The paper is related to system and method for protection of an automated control system (ACS) against un-authorized devices connected to the ACS via wired or wireless channels that substantially obviates the disadvantages of the related art. The protection system monitors the signals spreading in the network analyzing the performance of the network for malicious code or hidden connections of attacker. The system is developed specifically for this purpose and it can protect the industrial control systems more effectively than standard anti-virus programs. Specific anti-virus software installed on a central server of the automated control system protects it from software-based attacks both from internal and external offenders. The system comprises a plurality of bus protection devices of different types, including any of a twisted-pair protection device, a power lines protection device, On-Board Diagnostics signal protocol protection device, and a wireless protection device.

Cite This Paper

Dmitry Mikhaylov, Igor Zhukov, Andrey Starikovskiy, Alexander Zuykov, Anastasia Tolstaya, Maxim Fomin, "Method and System for Protection of Automated Control Systems for "Smart Buildings"", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.9, pp.1-8, 2013. DOI:10.5815/ijcnis.2013.09.01

Reference

[1]Dmitry Mikhaylov, Igor Zhukov, Andrey Starikovskiy, Alexander Zuykov, Anastasia Tolstaya, Stanislav Fesenko and Stepan Sivkov. Hardware-software complex ensuing information security of automated building management systems. International Journal of Application or Innovation in Engineering & Management, Volume 2, Issue 3, March 2013. Р 408-412. URL: http://www.ijaiem.org/Volume2Issue3/IJAIEM-2013-03-27-092.pdf .
[2]Starikovskiy A.V., Zhukov I.Yu., Mikhaylov D.M., Tolstaya A.M., Zhorin F.V., Makarov V.V., Vavrenyuk A.B. Research on vulnerabilities of digital home. Scientific-technical Journal "Special Equipment and Communication" №2, Moscow 2012. Pages 55-57.
[3]Kasperski K. Notes of researcher of computer viruses. St.-Petersburg.: "Piter", 2006. 216 р.
[4]Babalova I.F., Shustova L.I., Pronichkin A.S., Aristov M.I., Evseev V.L., Fesenko S.D. Attacks on automated management systems based on vulnerabilities of wireless data transmission channel Wi-Fi. Scientific-technical Journal "Special Equipment and Communication" №4, Moscow 2012. Pages 20-22.
[5]Beltov A.G., Novitskiy A.V., Pronichkin A.S., Krimov A.S. Attacks on automated management systems based on vulnerabilities of digital data transmission devices. Scientific-technical Journal "Special Equipment and Communication" №4, Moscow 2012. Pages 26-28.
[6]Zhukov I.Yu., Mikhaylov D.M., Starikovskiy A.V., Smirnov A.S. Covert channel of data stovepiping in automated building control systems. Scientific-technical Journal "Special Equipment and Communication" №4, Moscow 2012. Pages 9-11.
[7]"Specification for the ADVANCED ENCRYPTION STANDARD (AES)". Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). November 26, 2001. URL: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
[8]Gilmore, John, "Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design", 1998, O'Reilly.
[9]Bakhtiari M., Maarof M. A. Serious Security Weakness in RSA Cryptosystem // IJCSI International Journal of Computer Science. — January 2012. — В. 1, № 3. — Т. 9. URL: http://www.ijcsi.org/papers/IJCSI-9-1-3-175-178.pdf.
[10]Diffie-Hellman - technical definition. Computer Desktop Encyclopedia. URL: http://computer.yourdictionary.com/diffie-hellman.