Systems and methods for control system security
Abstract
A resilient security agent determines a cyber and/or physical health of a control system by, inter alia, communicating cyber-physical key data through cyber-physical control paths of the system, and determining error introduced by the communication. The resilient security agent may be further configured to verify the integrity of acquired cyber-physical state information. The cyber health of the control system may be evaluated by comparing the acquired cyber state information to one or more cyber state profiles. The physical health of the control system may be evaluated by comparing the acquired physical state information to one or more physical state profiles.
- Inventors:
- Issue Date:
- Research Org.:
- Idaho National Lab. (INL), Idaho Falls, ID (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1805402
- Patent Number(s):
- 10896261
- Application Number:
- 16/204,983
- Assignee:
- Battelle Energy Alliance, LLC (Idaho Falls, ID); VIRGINIA COMMONWEALTH UNIVERSITY (Richmond, VA)
- DOE Contract Number:
- AC07-05ID14517
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 11/29/2018
- Country of Publication:
- United States
- Language:
- English
Citation Formats
Rieger, Craig G., McJunkin, Timothy R., Manic, Milos, and Amarasinghe, Kasun. Systems and methods for control system security. United States: N. p., 2021.
Web.
Rieger, Craig G., McJunkin, Timothy R., Manic, Milos, & Amarasinghe, Kasun. Systems and methods for control system security. United States.
Rieger, Craig G., McJunkin, Timothy R., Manic, Milos, and Amarasinghe, Kasun. Tue .
"Systems and methods for control system security". United States. https://www.osti.gov/servlets/purl/1805402.
@article{osti_1805402,
title = {Systems and methods for control system security},
author = {Rieger, Craig G. and McJunkin, Timothy R. and Manic, Milos and Amarasinghe, Kasun},
abstractNote = {A resilient security agent determines a cyber and/or physical health of a control system by, inter alia, communicating cyber-physical key data through cyber-physical control paths of the system, and determining error introduced by the communication. The resilient security agent may be further configured to verify the integrity of acquired cyber-physical state information. The cyber health of the control system may be evaluated by comparing the acquired cyber state information to one or more cyber state profiles. The physical health of the control system may be evaluated by comparing the acquired physical state information to one or more physical state profiles.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2021},
month = {1}
}