基于二维结构熵的CBTC系统信息安全风险评估方法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:A 2D Structure Entropy-based Approach to Security Assessment of Communication-based Train Control System
  • 作者:董慧宇 ; 唐涛 ; 王洪伟
  • 英文作者:DONG Hui-Yu;TANG Tao;WANG Hong-Wei;School of Electronics and Information Engineering,Beijing Jiaotong University;State Key Laboratory of Rail Traffic Control and Safety;National Research Center of Railway Safety Assessment;
  • 关键词:基于通信的列车运行控制 ; 信息安全风险评估 ; 结构信息熵 ; 列车运行性能 ; 半实物仿真平台
  • 英文关键词:Communication-based train control(CBTC);;security risks assessment;;structural information entropy;;train operation performance;;hardware-in-the-loop simulation platform
  • 中文刊名:MOTO
  • 英文刊名:Acta Automatica Sinica
  • 机构:北京交通大学电子信息工程学院;轨道交通控制与安全国家重点实验室;国家轨道交通安全评估研究中心;
  • 出版日期:2018-11-21 10:46
  • 出版单位:自动化学报
  • 年:2019
  • 期:v.45
  • 基金:北京市自然科学基金(L161006,4164094);; 国家自然科学基金(61603031,61790575,61790573);; 国家重点实验室项目(RCS2018K008,RCS2017ZZ003)资助~~
  • 语种:中文;
  • 页:MOTO201901013
  • 页数:10
  • CN:01
  • ISSN:11-2109/TP
  • 分类号:155-164
摘要
随着计算机技术、通信技术和控制技术在城市轨道交通列车运行控制系统中的应用,城市轨道交通的自动化和信息化程度不断提升.然而,基于通信的列车运行控制(Communication-based train control, CBTC)技术采用的通用计算机设备和通信技术带来的信息安全漏洞,给CBTC系统带来了日益严峻的信息安全风险,因此,对CBTC系统的信息安全风险进行量化、动态评估具有重要意义.本文根据设备及通信链路的差异性构建了CBTC网络拓扑模型,结合信息安全风险下线路列车运行性能变化导致的运能损失,采用综合表征信息域和物理域特征的二维结构信息熵对CBTC系统信息安全风险进行建模分析.最后,基于城市轨道交通列控系统半实物仿真平台对评估方法进行验证,表明所提方法对CBTC系统信息安全量化评估的有效性和准确性.
        With the wide application of computer, communication and control technologies in train operation control system, the degree of automation and informatization of urban rail transit is continuously improved. However, universal computer equipment and communication technologies adopted by the method of CBTC(communication-based train control) bring serious security risks to the CBTC system. In view of this, it is of great significance to quantify and dynamically evaluate the information security risks of CBTC system. In this paper, a topology model of CBTC networks is built according to the characteristics of equipment and communication links. Combining the capacity loss from performance changes of train control under security risks, the 2D structural information entropy is constructed, which can comprehensively characterize the cyber space and physical space features, to model and evaluate the information security risks of CBTC system. Finally, with a hardware-in-the-loop simulation platform for urban rail transit CBTC security, the effectiveness and accuracy of the proposed approach are verified.
引文
1 Zhang Xiao,Ding Zhi,Wu Yun-Shuang,Xie Zong-Xing.Analysis on present situation and prospects of city rail traffic development.Modern City,2014,9(2):17-19(张霄,丁智,吴云双,谢宗星.城市轨道交通发展现状及前景浅析.现代城市,2014,9(2):17-19)
    2 Zheng Ying.Study on CBTC based on wireless communication.Communications Technology,2011,44(12):137-138,141(郑莹.基于无线通信的CBTC研究综述.通信技术,2011,44(12):137-138,141)
    3 Hong Xiang.Challenges and countermeasures for information security of rail transportation automation(excerpt).Automation Panorama,2015,(2):26(洪翔.轨道交通自动化信息安全面临的挑战与应对(节选).自动化博览,2015,(2):26)
    4 Chen Deng-Ke.Network safety analysis of urban rail transit signaling system.Railway Signalling and Communication Engineering,2012,9(5):41-43(陈登科.城市轨道交通信号系统网络安全分析.铁路通信信号工程技术,2012,9(5):41-43)
    5 Bloomfield R,Bendele M,Bishop P,Stroud R,Tonks S.The risk assessment of ERTMS-based railway systems from a cyber security perspective:methodology and lessons learned.In:Proceedings of the 1st International Conference on Reliability,Safety,and Security of Railway Systems.Modelling,Analysis,Verification,and Certification.Paris,France:Springer,2016.3-19
    6 Kuang Xiang-Qi.Research on Risk Assessment Method of Information Security in Communication-Based Train Control Systems[Master thesis],Beijing Jiaotong University,China,2017.(邝香琦.CBTC系统信息安全风险评估方法研究[硕士学位论文],北京交通大学,中国,2017.)
    7 Craven P V,Craven S.Security of ATCS wireless railway communications.In:Proceedings of the 2005 ASME/IEEEJoint Rail Conference.Pueblo,CO,USA:IEEE,2005.227-238
    8 Yu Shu-Ya.Research on Information Security Detection Technology of Urban Rail Transit Control System[Master thesis],Beijing Jiaotong University,China,2017.(郁舒雅.城市轨道交通列控系统信息安全检测技术研究[硕士学位论文],北京交通大学,中国,2017.)
    9 Bao Zheng-Tang.Active Defense of Security Risk in Train Control System[Master thesis],Beijing Jiaotong University,China,2017.(包正堂.列控系统信息安全风险主动防御研究[硕士学位论文],北京交通大学,中国,2017.)
    10 Chen B B,Schmittner C,Ma Z D,Temple W G,Dong X S,Jones D L,et al.Security analysis of urban railway systems:the need for a cyber-physical perspective.In:Proceedings of the 2015 SAFECOMP Workshops on Computer Safety,Reliability,and Security.Delft,The Netherlands:Springer,2014.277-290
    11 Li Wen-Wu,You Wen-Xia,Wang Xian-Pei.Survey of cyber security research in power system.Power System Protection and Control,2011,39(10):140-147(李文武,游文霞,王先培.电力系统信息安全研究综述.电力系统保护与控制,2011,39(10):140-147)
    12 Zhan Quan-Zhong,Chen Lan.A brief discuss on water resources network and information security system.Water Resources Informatization,2010,(5):31-33(詹全忠,陈岚.浅谈水利网络与信息安全体系.水利信息化,2010,(5):31-33)
    13 Hu Jiang,Sun Guo-Chen,Zhang Jia-Jun,Hou Qin-Mai.The status quo and information security supervision of NPPfrom stuxnet attacks.Chinese Journal of Nuclear Science and Engineering,2015,35(1):181-185(胡江,孙国臣,张加军,侯秦脉.由“震网”病毒事件浅议核电站信息安全现状及监管.核科学与工程,2015,35(1):181-185)
    14 Mendes E.Introduction to Bayesian networks.Practitioner.s Knowledge Representation.Berlin,Heidelberg:Springer,2014.67-71
    15 Xie P,Li J H,Ou X M,Liu P,Levy R.Using Bayesian networks for cyber security analysis.In:Proceedings of the2010 IEEE/IFIP International Conference on Dependable Systems and Networks(DSN).Chicago,IL,USA:IEEE,2010.211-220
    16 Shin J,Son H,Ur R K,Heo G.Development of a cyber security risk model using bayesian networks.Reliability Engineering and System Safety,2015,134:208-217
    17 Shin J,Son H,Heo G.Cyber security risk evaluation of a nuclear I&C using BN and ET.Nuclear Engineering and Technology,2016,49(3):517-524
    18 Schneier B.Attack trees.Doctor Dobbs Journal,1999,24(12):21-29
    19 Mauw S,Oostdijk M.Foundations of attack trees.Information Security and Cryptology-ICISC 2005.Berlin,Heidelberg:Springer,2006.186-198
    20 Ten C W,Liu C C,Govindarasu M.Vulnerability assessment of cybersecurity for SCADA systems using attack trees.In:Proceedings of the 2007 IEEE Power Engineering Society General Meeting.Tampa,FL,USA:IEEE,2007.1-8
    21 Murata T.Petri nets:properties,analysis and applications.Proceedings of the IEEE,1989,77(4):541-580
    22 Chen T M,Sanchez-Aarnoutse J C,Buford J.Petri net modeling of cyber-physical attacks on smart grid.IEEE Transactions on Smart Grid,2011,2(4):741-749
    23 El Bouchti A,Haqiq A.Modeling cyber-attack for SCADAsystems using CoPNet approach.In:Proceedings of the2012 IEEE International Conference on Complex Systems(ICCS).San Agadir,Morocco:IEEE,2012.1-6
    24 Jensen K,Rozenberg G.High-Level Petri Nets:Theory and Application.Berlin,New York:Springer,1991.
    25 Zhou S J,Qin Z G,Zhang F,Zhang X F,Chen W,Liu J D.Colored petri net based attack modeling.In:Proceedings of the 9th International Conference on Rough Sets,Fuzzy Sets,Data Mining,and Granular Computing.Chongqing,China:Springer,2003.715-718
    26 Roy S,Ellis C,Shiva S,Dasgupta D,Shandilya V,Wu Q S.A survey of game theory as applied to network security.In:Proceedings of the 43rd Hawaii International Conference on System Sciences.Honolulu,HI,USA:IEEE,2010.1-10
    27 Liang X N,Xiao Y.Game theory for network security.IEEECommunications Surveys and Tutorials,2013,15(1):472-486
    28 Cui X L,Tan X B,Zhang Y,Xi H S.A Markov game theorybased risk assessment model for network information system.In:Proceedings of the 2008 International Conference on Computer Science and Software Engineering.Wuhan,China:IEEE,2008.1057-1061
    29 Li A S,Pan Y C.Structural information and dynamical complexity of networks.IEEE Transactions on Information Theory,2016,62(6):3290-3339
    30 Li A S,Hu Q F,Liu J,Pan Y C.Resistance and security index of networks:structural information perspective of network security.Scientific Reports,2016,6:Article No.26810
    31 Shannon C E.A mathematical theory of communication.Bell System Technical Journal,1948,27(3):379-423
    32 Anand K,Bianconi G.Entropy measures for networks:toward an information theory of complex topologies.Physical Review E:Covering Statistical,Nonlinear,and Soft Matter Physics,2009,80(4):Article No.045102
    33 Dong H Y,Wang H W,Tang T.An attack tree-based approach for vulnerability assessment of communication-based train control systems.In:Proceedings of the 2017 Chinese Automation Congress(CAC).Ji nan,China:IEEE,2017.6407-6412

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700