DOI QR코드

DOI QR Code

The development of industrial secure L2 switch and introduction example for management and security improvement of supervisory control network in purification plant

정수장 감시제어망의 관리와 보안개선을 위한 산업용 보안 L2스위치 개발 및 적용사례

  • Kim, Yunha (Changwon Office, K-water) ;
  • Yu, Chool (Jeongeup Office, K-water) ;
  • Oh, Eun (Management Information System Dept. K-water) ;
  • Kim, Chanmoon (Management Information System Dept. K-water) ;
  • Park, Ikdong (Technology Development Dept. HanDreamnet Corporation) ;
  • Kim, Yongseong (School of Bioconvergence, Kyungnam University) ;
  • Choi, Hyunju (Department of Mathematics Science and Computer(MSC), Kyungnam University)
  • 김윤하 (한국수자원공사 창원권지사) ;
  • 유철 (한국수자원공사 정읍권지사) ;
  • 오은 (한국수자원공사 정보관리처) ;
  • 김찬문 (한국수자원공사 정보관리처) ;
  • 박익동 (한드림넷 기술개발부) ;
  • 김용성 (경남대학교 바이오융합학부) ;
  • 최현주 (경남대학교 MSC교육부)
  • Received : 2019.07.09
  • Accepted : 2019.08.20
  • Published : 2019.10.15

Abstract

Recently, the advancement of information and communication technology(ICT) is expanding the connectivity through Internet of Things(IoT), and the media of connection is also expanding from wire/cable transmission to broadband wireless communication, which has significantly improved mobility. This hyperconnectivity has become a key element of the fourth industrial revolution, whereas the supervisory control network of purification plants in korea is operated as a communication network separated from the outside, thereby lagging in terms of connectivity. This is considered the best way to ensure security, and thus there is hardly any consideration of establishing alternatives to operate an efficient and stable communication network. Moreover, security for management of a commercialized communication network and network management solution may be accompanied by immense costs, making it more difficult to make new attempts. Therefore, to improve the conditions for the current supervisory control network of purification plants, this study developed a industrial security L2 switch that supports modbus TCP(Transmission Control Protocol) communication and encryption function of the transmission section. As a result, the communication security performance improved significantly, and the cost for implementing the network management system using Historical Trend and information of HMI(Human Machine Interface) could be reduced by approximately KRW 200 million. The results of this study may be applied to systems for gas, electricity and social safety nets that are infrastructure communication networks that are similar to purification plants.

Keywords

References

  1. Ahn, S.Y., Jeon, I.C., Kim, J.H., Lee, Y.T. and Choi, S.J. (2015). A study on internet emergency alert distribution system adaptive to the receiver characteristics, J. Broadcast Eng., 20(4), 598-605. https://doi.org/10.5909/JBE.2015.20.4.598
  2. Do, V.L., Fillatre, L., Nikiforov, I. and Willett, P. (2017). Security of SCADA systems against cyber-physical attacks, IEEE Aerosp. Electron. Syst. Mag., 32(5), 28-45. https://doi.org/10.1109/MAES.2017.160047
  3. Lee, H.H., Jang S.B., Hong, S.T. and Chun, M.G. (2014). Intelligent controller for constant control of residual chlorine in water treatment process, J. Korean Inst. Intell. Syst., 24(2), 147-154. https://doi.org/10.5391/JKIIS.2014.24.2.147
  4. Morgan, H. (2013). Cyber security risk management in the SCADA critical infrastructure environment, Eng. Manag. J., 25(2), 38-45. https://doi.org/10.1080/10429247.2013.11431973
  5. Oh, E. and Park, C.K. (2017). Development of customized wireless R.T.U(Remote Terminal Unit), J. Korean Inst. Commun. Inf. Sci., 42(12), 2402-2410. https://doi.org/10.7840/kics.2017.42.12.2402
  6. Park, E.C. and Choi, H.J. (2018a). A study on operation efficacy and security improvement through structural modification of CCTV network for bansong water purification plant, J. Korean Soc. Water Wastewater, 32(2), 193-200. https://doi.org/10.11001/jksww.2018.32.2.193
  7. Park, E.C. and Choi, H.J. (2018b). The case study on wireless lan design technique for bansong purification plant using network integrated management system and security switch, J. Korean Soc. Water Wastewater, 32(4), 309-315. https://doi.org/10.11001/jksww.2018.32.4.309
  8. Park, N.S., Lee, Y.J., Chae, S.H. and Yoon, S.M. (2015). A study on the statistical predictability of drinking water qualities for contamination warning system, J. Korean Soc. Water Wastewater, 29(4), 469-479. https://doi.org/10.11001/jksww.2015.29.4.469
  9. Puliafito, A. and Tomarchio, O. (2000). Using mobile agents to implement flexible network management strategies, Comput. Commun., 23(8), 708-719. https://doi.org/10.1016/S0140-3664(99)00231-5
  10. Ralston, P.A.S., Graham, J.H. and Hieb, J.L. (2007). Cyber security risk assessment for SCADA and DCS networks, ISA Trans., 46(4), 583-594. https://doi.org/10.1016/j.isatra.2007.04.003
  11. Rothenberg, E.C. and Roos, A.A. (2008). A review of policy-based resource and admission control functions in evolving access and next generation networks, J. Netw. Syst. Manage., 16, 14-45. https://doi.org/10.1007/s10922-007-9096-3