2021
DOI: 10.1155/2021/6691696
|View full text |Cite
|
Sign up to set email alerts
|

ICS Software Trust Measurement Method Based on Dynamic Length Trust Chain

Abstract: Aiming at the real-time requirements for industrial control systems, we proposed a corresponding trust chain method for industrial control system application software and a component analysis method based on security sensitivity weights. A dynamic length trust chain structure is also proposed in this paper. Based on this, the industrial control system software integrity measurement method is constructed. Aimed at the validity of the model, a simulation attack experiment was performed, and the performance of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 24 publications
0
11
0
Order By: Relevance
“…Therefore, this paper compares the proposed methods with other common security assessment methods. These methods include risk uncertainty assessment method based on information entropy [28], [30]- [32], risk weight method based on FAHP [24], [25], [56], risk level assessment method based on risk matrix [40], [41], and trust assessment method based on trust chain [42]- [44].…”
Section: B Methods Comparisonmentioning
confidence: 99%
See 4 more Smart Citations
“…Therefore, this paper compares the proposed methods with other common security assessment methods. These methods include risk uncertainty assessment method based on information entropy [28], [30]- [32], risk weight method based on FAHP [24], [25], [56], risk level assessment method based on risk matrix [40], [41], and trust assessment method based on trust chain [42]- [44].…”
Section: B Methods Comparisonmentioning
confidence: 99%
“…Therefore, this paper compares the proposed methods with other common security assessment methods. These methods include risk uncertainty assessment method based on information entropy [28]- [30], risk weight method based on FAHP [22], [23], [51], risk level assessment method based on risk matrix [38], [39], and trust assessment method based on trust chain [40]- [42]. In order to reasonably compare the characteristics of different methods, this paper makes a comparative analysis from the following 5 aspects around input, output and assessment process of each method.…”
Section: B Methods Comparisonmentioning
confidence: 99%
See 3 more Smart Citations