2019
DOI: 10.1007/s42452-019-0860-2
|View full text |Cite
|
Sign up to set email alerts
|

Programmable logic controllers based systems (PLC-BS): vulnerabilities and threats

Abstract: This paper provides a review of the state-of-the-art of major Programmable Logic Controller (PLC) based devices along with their security concerns. It discusses, mainly, the threats and vulnerabilities of PLCs and associated field devicesincluding local industrial networks. As PLC-BS are becoming more integrated and interconnected with other complex systems and open source solutions, they are becoming more vulnerable to critical threats and exploitations. Little attention and progress have been made in securin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 19 publications
(22 reference statements)
0
11
0
Order By: Relevance
“…The main assumption of the constructed stand was to ensure repeatable and stable values of the parameters important in microscopic thermography. The use of a PLC as an element for controlling and measuring the parameters inside the measuring chamber is another example of the unconventional application of the stand [ 28 , 29 , 30 , 31 ].…”
Section: Methodsmentioning
confidence: 99%
“…The main assumption of the constructed stand was to ensure repeatable and stable values of the parameters important in microscopic thermography. The use of a PLC as an element for controlling and measuring the parameters inside the measuring chamber is another example of the unconventional application of the stand [ 28 , 29 , 30 , 31 ].…”
Section: Methodsmentioning
confidence: 99%
“…Programmers may unknowingly create backdoors for potential adversaries, or inherit PLC programs with dormant threats due to a lack of professional knowledge and skills. Some common issues include the use of duplicated instructions, snooping, missing certain coils or outputs, and bypassing or denial of service [40], [41]. For instance, the ladder logic program itself is susceptible to malware insertion because it lacks proper authentication before being downloaded into PLCs.…”
Section: ) Vulnerabilities In Plc Programsmentioning
confidence: 99%
“…The control system based on PC and PLC is affected by the PLC program scan rate and other factors, which will lead to the instability of the system reliability and the real-time human-computer interaction (Bolton, 2015; Serhane et al , 2019; Gergely et al , 2010). Furthermore, it is difficult to use GPS as a positioning location to meet the requirements of positioning accuracy in applications.…”
Section: Comparative-analysis Of Various Indoor-orbital Electrical In...mentioning
confidence: 99%