摘要
随着计算机技术、通信技术和控制技术在城市轨道交通列车运行控制系统中的应用,城市轨道交通的自动化和信息化程度不断提升.然而,基于通信的列车运行控制(Communication-based train control, CBTC)技术采用的通用计算机设备和通信技术带来的信息安全漏洞,给CBTC系统带来了日益严峻的信息安全风险,因此,对CBTC系统的信息安全风险进行量化、动态评估具有重要意义.本文根据设备及通信链路的差异性构建了CBTC网络拓扑模型,结合信息安全风险下线路列车运行性能变化导致的运能损失,采用综合表征信息域和物理域特征的二维结构信息熵对CBTC系统信息安全风险进行建模分析.最后,基于城市轨道交通列控系统半实物仿真平台对评估方法进行验证,表明所提方法对CBTC系统信息安全量化评估的有效性和准确性.
With the wide application of computer, communication and control technologies in train operation control system, the degree of automation and informatization of urban rail transit is continuously improved. However, universal computer equipment and communication technologies adopted by the method of CBTC(communication-based train control) bring serious security risks to the CBTC system. In view of this, it is of great significance to quantify and dynamically evaluate the information security risks of CBTC system. In this paper, a topology model of CBTC networks is built according to the characteristics of equipment and communication links. Combining the capacity loss from performance changes of train control under security risks, the 2D structural information entropy is constructed, which can comprehensively characterize the cyber space and physical space features, to model and evaluate the information security risks of CBTC system. Finally, with a hardware-in-the-loop simulation platform for urban rail transit CBTC security, the effectiveness and accuracy of the proposed approach are verified.
引文
1 Zhang Xiao,Ding Zhi,Wu Yun-Shuang,Xie Zong-Xing.Analysis on present situation and prospects of city rail traffic development.Modern City,2014,9(2):17-19(张霄,丁智,吴云双,谢宗星.城市轨道交通发展现状及前景浅析.现代城市,2014,9(2):17-19)
2 Zheng Ying.Study on CBTC based on wireless communication.Communications Technology,2011,44(12):137-138,141(郑莹.基于无线通信的CBTC研究综述.通信技术,2011,44(12):137-138,141)
3 Hong Xiang.Challenges and countermeasures for information security of rail transportation automation(excerpt).Automation Panorama,2015,(2):26(洪翔.轨道交通自动化信息安全面临的挑战与应对(节选).自动化博览,2015,(2):26)
4 Chen Deng-Ke.Network safety analysis of urban rail transit signaling system.Railway Signalling and Communication Engineering,2012,9(5):41-43(陈登科.城市轨道交通信号系统网络安全分析.铁路通信信号工程技术,2012,9(5):41-43)
5 Bloomfield R,Bendele M,Bishop P,Stroud R,Tonks S.The risk assessment of ERTMS-based railway systems from a cyber security perspective:methodology and lessons learned.In:Proceedings of the 1st International Conference on Reliability,Safety,and Security of Railway Systems.Modelling,Analysis,Verification,and Certification.Paris,France:Springer,2016.3-19
6 Kuang Xiang-Qi.Research on Risk Assessment Method of Information Security in Communication-Based Train Control Systems[Master thesis],Beijing Jiaotong University,China,2017.(邝香琦.CBTC系统信息安全风险评估方法研究[硕士学位论文],北京交通大学,中国,2017.)
7 Craven P V,Craven S.Security of ATCS wireless railway communications.In:Proceedings of the 2005 ASME/IEEEJoint Rail Conference.Pueblo,CO,USA:IEEE,2005.227-238
8 Yu Shu-Ya.Research on Information Security Detection Technology of Urban Rail Transit Control System[Master thesis],Beijing Jiaotong University,China,2017.(郁舒雅.城市轨道交通列控系统信息安全检测技术研究[硕士学位论文],北京交通大学,中国,2017.)
9 Bao Zheng-Tang.Active Defense of Security Risk in Train Control System[Master thesis],Beijing Jiaotong University,China,2017.(包正堂.列控系统信息安全风险主动防御研究[硕士学位论文],北京交通大学,中国,2017.)
10 Chen B B,Schmittner C,Ma Z D,Temple W G,Dong X S,Jones D L,et al.Security analysis of urban railway systems:the need for a cyber-physical perspective.In:Proceedings of the 2015 SAFECOMP Workshops on Computer Safety,Reliability,and Security.Delft,The Netherlands:Springer,2014.277-290
11 Li Wen-Wu,You Wen-Xia,Wang Xian-Pei.Survey of cyber security research in power system.Power System Protection and Control,2011,39(10):140-147(李文武,游文霞,王先培.电力系统信息安全研究综述.电力系统保护与控制,2011,39(10):140-147)
12 Zhan Quan-Zhong,Chen Lan.A brief discuss on water resources network and information security system.Water Resources Informatization,2010,(5):31-33(詹全忠,陈岚.浅谈水利网络与信息安全体系.水利信息化,2010,(5):31-33)
13 Hu Jiang,Sun Guo-Chen,Zhang Jia-Jun,Hou Qin-Mai.The status quo and information security supervision of NPPfrom stuxnet attacks.Chinese Journal of Nuclear Science and Engineering,2015,35(1):181-185(胡江,孙国臣,张加军,侯秦脉.由“震网”病毒事件浅议核电站信息安全现状及监管.核科学与工程,2015,35(1):181-185)
14 Mendes E.Introduction to Bayesian networks.Practitioner.s Knowledge Representation.Berlin,Heidelberg:Springer,2014.67-71
15 Xie P,Li J H,Ou X M,Liu P,Levy R.Using Bayesian networks for cyber security analysis.In:Proceedings of the2010 IEEE/IFIP International Conference on Dependable Systems and Networks(DSN).Chicago,IL,USA:IEEE,2010.211-220
16 Shin J,Son H,Ur R K,Heo G.Development of a cyber security risk model using bayesian networks.Reliability Engineering and System Safety,2015,134:208-217
17 Shin J,Son H,Heo G.Cyber security risk evaluation of a nuclear I&C using BN and ET.Nuclear Engineering and Technology,2016,49(3):517-524
18 Schneier B.Attack trees.Doctor Dobbs Journal,1999,24(12):21-29
19 Mauw S,Oostdijk M.Foundations of attack trees.Information Security and Cryptology-ICISC 2005.Berlin,Heidelberg:Springer,2006.186-198
20 Ten C W,Liu C C,Govindarasu M.Vulnerability assessment of cybersecurity for SCADA systems using attack trees.In:Proceedings of the 2007 IEEE Power Engineering Society General Meeting.Tampa,FL,USA:IEEE,2007.1-8
21 Murata T.Petri nets:properties,analysis and applications.Proceedings of the IEEE,1989,77(4):541-580
22 Chen T M,Sanchez-Aarnoutse J C,Buford J.Petri net modeling of cyber-physical attacks on smart grid.IEEE Transactions on Smart Grid,2011,2(4):741-749
23 El Bouchti A,Haqiq A.Modeling cyber-attack for SCADAsystems using CoPNet approach.In:Proceedings of the2012 IEEE International Conference on Complex Systems(ICCS).San Agadir,Morocco:IEEE,2012.1-6
24 Jensen K,Rozenberg G.High-Level Petri Nets:Theory and Application.Berlin,New York:Springer,1991.
25 Zhou S J,Qin Z G,Zhang F,Zhang X F,Chen W,Liu J D.Colored petri net based attack modeling.In:Proceedings of the 9th International Conference on Rough Sets,Fuzzy Sets,Data Mining,and Granular Computing.Chongqing,China:Springer,2003.715-718
26 Roy S,Ellis C,Shiva S,Dasgupta D,Shandilya V,Wu Q S.A survey of game theory as applied to network security.In:Proceedings of the 43rd Hawaii International Conference on System Sciences.Honolulu,HI,USA:IEEE,2010.1-10
27 Liang X N,Xiao Y.Game theory for network security.IEEECommunications Surveys and Tutorials,2013,15(1):472-486
28 Cui X L,Tan X B,Zhang Y,Xi H S.A Markov game theorybased risk assessment model for network information system.In:Proceedings of the 2008 International Conference on Computer Science and Software Engineering.Wuhan,China:IEEE,2008.1057-1061
29 Li A S,Pan Y C.Structural information and dynamical complexity of networks.IEEE Transactions on Information Theory,2016,62(6):3290-3339
30 Li A S,Hu Q F,Liu J,Pan Y C.Resistance and security index of networks:structural information perspective of network security.Scientific Reports,2016,6:Article No.26810
31 Shannon C E.A mathematical theory of communication.Bell System Technical Journal,1948,27(3):379-423
32 Anand K,Bianconi G.Entropy measures for networks:toward an information theory of complex topologies.Physical Review E:Covering Statistical,Nonlinear,and Soft Matter Physics,2009,80(4):Article No.045102
33 Dong H Y,Wang H W,Tang T.An attack tree-based approach for vulnerability assessment of communication-based train control systems.In:Proceedings of the 2017 Chinese Automation Congress(CAC).Ji nan,China:IEEE,2017.6407-6412