2020 4th Conference on Cloud and Internet of Things (CIoT) 2020
DOI: 10.1109/ciot50422.2020.9244205
|View full text |Cite
|
Sign up to set email alerts
|

Access Control Policies for Network Function Virtualization environments in Industrial Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…In [178], the authors summarized nearly 20 smart grid simulators (commercial and open source). The work [179] described an opensource smart grid simulator 29 . There are almost no network simulator for network slicing in smart grid or smart energy systems.…”
Section: Discussion and Remarks 1) Computational Complexity And Resou...mentioning
confidence: 99%
See 1 more Smart Citation
“…In [178], the authors summarized nearly 20 smart grid simulators (commercial and open source). The work [179] described an opensource smart grid simulator 29 . There are almost no network simulator for network slicing in smart grid or smart energy systems.…”
Section: Discussion and Remarks 1) Computational Complexity And Resou...mentioning
confidence: 99%
“…Although they are widely used in 5G network slicing, the performance of isolation is still a hot research topic and is being researched and improved [27]. Isolation can also be achieved through using different physical resources [28] or access control mechanisms [29], [30]. In 5G network slicing, according to the business needs, a network slice could be a slice of radio access network (RAN) resources only, a slice of core network resources only, or a slice of resources spanning RAN, core network, and transport networks.…”
Section: Related Work On Network Slicingmentioning
confidence: 99%
“…The approach considered a robust insider adversary model capable of compromising one or multiple VNFs within the Management and Orchestration (MANO) framework. Furthermore, Murillo et al [18] introduced a specialized access control framework for virtualized Industrial Control Systems (ICS). The framework incorporated an advanced policy language to clearly define the components, roles, and authorized operations within the ICS.…”
Section: Related Workmentioning
confidence: 99%
“…Prior investigations in the field of NFV resource sharing have notably neglected the examination of robust access control strategies, despite their pivotal significance. Other research on access control [15][16][17][18] primarily focuses on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Policy-Based Access Control (PBAC). To ensure precise subject identification and verification within the NFV system, trusted identity management and authentication mechanisms are commonly deployed.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, a preliminary security assessment was conducted for the new state replication model and architecture based on the identified requirements. The authors have conducted preliminary discussions on the intrusion detection, access control, and formal security analysis based on the proposed state replication scheme, but have not yet Murillo and Rueda [8] have deeply studied the application of digital twins in industrial control network security from the perspective of access control, proposed a lightweight access control framework for the digital twins of industrial control systems, provided a language for defining the access control policies for them, and implemented a proof of concept using OpenStack. The results indicate that the developed policy language can describe the components and relationships established in the digital twins of industrial control systems, and then use these relationships to define the access control rules.…”
Section: Researches Of Digital Twinmentioning
confidence: 99%