• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yang Ting, Zhang Jiayuan, Huang Zaiqi, Chen Yujie, Huang Chenglong, Zhou Wei, Liu Peng, Feng Tao, Zhang Yuqing. Survey of Industrial Control Systems Security[J]. Journal of Computer Research and Development, 2022, 59(5): 1035-1053. DOI: 10.7544/issn1000-1239.20211154
Citation: Yang Ting, Zhang Jiayuan, Huang Zaiqi, Chen Yujie, Huang Chenglong, Zhou Wei, Liu Peng, Feng Tao, Zhang Yuqing. Survey of Industrial Control Systems Security[J]. Journal of Computer Research and Development, 2022, 59(5): 1035-1053. DOI: 10.7544/issn1000-1239.20211154

Survey of Industrial Control Systems Security

Funds: This work was supported by the National Natural Science Foundation of China (U1836210) and the National Key Research & Development Program of China (2018YFB0804701).
More Information
  • Published Date: April 30, 2022
  • In addition to the application of manufacturing industries, industrial control systems are also widely used in critical infrastructure such as transportation, energy, and water treatment industries. Accelerated application of digital, network, and intelligent technologies in industrial control systems, more and more smart devices are connected to it, leading to severe challenges to its security. Therefore, the security of industrial control systems has attracted the attention of researchers. In order to let the researchers systematically understand the current research progress, we have researched the core database of Web of Science, EI database, the network and information security related papers of CCF recommended international academic conferences and other high-level research work in the past three years. First, the architecture of industrial control systems is introduced, then the security threats that ICS faces are introduced. Moreover, according to the architecture of the industrial control systems, we divide the security research work into three parts: the communication security of industrial control system and cloud, the communication security of human machine interface (HMI) to device, the security of device firmware and other security research issues, analyze them from the perspective of attack and defense. Finally, we put forward the main challenges that security research faces, identify open problems for future research directions.
  • Cited by

    Periodical cited type(7)

    1. 张淑芬,张宏扬,任志强,陈学斌. 联邦学习的公平性综述. 计算机应用. 2025(01): 1-14 .
    2. 朱智韬,司世景,王健宗,程宁,孔令炜,黄章成,肖京. 联邦学习的公平性研究综述. 大数据. 2024(01): 62-85 .
    3. 李锦辉,吴毓峰,余涛,潘振宁. 数据孤岛下基于联邦学习的用户电价响应刻画及其应用. 电力系统保护与控制. 2024(06): 164-176 .
    4. 刘新,刘冬兰,付婷,王勇,常英贤,姚洪磊,罗昕,王睿,张昊. 基于联邦学习的时间序列预测算法. 山东大学学报(工学版). 2024(03): 55-63 .
    5. 赵泽华,梁美玉,薛哲,李昂,张珉. 基于数据质量评估的高效强化联邦学习节点动态采样优化. 智能系统学报. 2024(06): 1552-1561 .
    6. 杨秀清,彭长根,刘海,丁红发,汤寒林. 基于数据质量评估的公平联邦学习方案. 计算机与数字工程. 2022(06): 1278-1285 .
    7. 黎志鹏. 高可靠的联邦学习在图神经网络上的聚合方法. 工业控制计算机. 2022(10): 85-87+90 .

    Other cited types(10)

Catalog

    Article views PDF downloads Cited by(17)
    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return