2023
DOI: 10.1051/sands/2023001
|View full text |Cite
|
Sign up to set email alerts
|

Protection architecture of endogenous safety and security for industrial control systems

Abstract: According to the essential characteristic of industrial control system (ICS), the endogenous safety and security (ESS) can be achieved by merging cyber security (CS) into functional safety (FS), the basic principles and functional requirements as well as protection architecture (TEMt) of ESS are proposed, the successful experience of electric power control system is introduced.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
(12 reference statements)
0
2
0
Order By: Relevance
“…Industrial control systems adopt a similar concept: parallel redundant mimicry (this is similar to the DHR architecture). The system resilience is enhanced, introducing four protection dimensions, Technology, Emergency, Management, and Time (TEMt) in [17]. The internal structure of the basic framework of the zero-trust system is restructured in [18] through the lens of the DHR architecture, termed ZETSA.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Industrial control systems adopt a similar concept: parallel redundant mimicry (this is similar to the DHR architecture). The system resilience is enhanced, introducing four protection dimensions, Technology, Emergency, Management, and Time (TEMt) in [17]. The internal structure of the basic framework of the zero-trust system is restructured in [18] through the lens of the DHR architecture, termed ZETSA.…”
Section: Related Workmentioning
confidence: 99%
“…From this perspective, the DHR architecture system is a specified multi-heterogeneous system. Due to the superiority, the ESS theory along with the DHR architecture have been introduced to the fields of wireless communications systems [14], sixth-generation mobile communication (6G) networks [15], embedded systems [16], industrial control systems [17], zero trust systems [18], etc.…”
Section: Introductionmentioning
confidence: 99%