Font Size: a A A

Research On The Authentication And Terminal Measurement Technology Of PLC Based On Trusted Computing

Posted on:2019-08-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2428330545470715Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
With the "Made in China 2025" and "Internet +" strategy is put forward,significant changes happening in industrial control field,in the two cross fusion on the basis of the continued industry transformation and upgrading and structural adjustment.Industrial control systems concern economic development,social stability and national security,and are an important part of national critical infrastructure.Industrial control system of information security as an important part of the industrial control field,profoundly influenced the industrial control network and the development of related industries,has a strong correlation industry penetration and industry.Since existing industrial control systems are mostly built without considering safety factors or without adequate consideration of safety factors,attacks and threats against industrial control systems are beginning to emerge.After the frequent disclosure of information security incidents of industrial control system,the information security of industrial control system increased significantly.Therefore,it is necessary to understand the security threat of industrial control system,deploy safe and reliable industrial control system,and study the safety defense technology of industrial control system.In this paper,based on the threat of access control in industrial control system,a trusted computing-based PLC identity authentication method is proposed.In view of the industrial control system initiating security threats,a terminal measurement technology solution based on trust chain transmission is proposed to ensure the safe operation of industrial control systems at different levels.Firstly,this paper analyzes the important significance of information security of industrial control system from the perspective of national strategy,thus understanding the major changes of industrial control brought by "China 2025 strategy".Then combined with the actual data research to master the development trends of the whole industry,it points out that the safety events of industrial control system are in a significant upward trend.Based on the research on the vulnerability information of industrial control system and the main means of attack,the principle of vulnerability attack was analyzed by PLC.Finally,the vulnerability of the Modbus TCP protocol is described and the information security features of industrial control system are summarized.Secondly,based on the research of the trusted platform module TPM,selection of industrial-grade chip ZYNQ,through the way of hardware and software collaborative design,using the hash algorithm to calibrate the system startup file after transplantation,and combined with the safety of the trusted computing authentication method to build reliable PLC access model.On the basis of study the process of trust chain,from the integrity measure arithmetic,integrity,storage,completeness and integrity verification report four aspects analyzes the trusted measurement mechanism,in view of the embedded Linux,build a credible based on terminal measurement process,ensure the safety of industrial control system..Finally,through constructing the industrial control system simulation environment,realization of trusted computing identity authentication and integrity in the process of terminal measurement technology in the PLC to start the measurement process,and the kernel forgery attack testing,to further illustrate the correctness of the design.
Keywords/Search Tags:Industrial control system, Trusted computing, TPM, ZYNQ, The chain of trust
PDF Full Text Request
Related items