Research Article
BibTex RIS Cite

Endüstriyel Kontrol Sistemlerinin Siber Güvenliğinde Yeni Bir Yaklaşım: Li-Fi

Year 2022, , 895 - 902, 01.06.2022
https://doi.org/10.2339/politeknik.976886

Abstract

Özellikle akıllı şebekelerde kritik altyapıların kontrolünde kullanılan Endüstriyel Kontrol Sistemleri, üretkenlik, ekonomi ve hız gibi insan hayatını kolaylaştıran faktörler nedeniyle izole bir ağ mimarisinden kablolu ve kablosuz dış ağlara hızlı bir geçiş yapmıştır. Bu geçişle birlikte endüstriyel kontrol sistemlerine özgü protokoller yetersiz kalmış ve hibrit protokoller kullanılmaya başlanmıştır. Sonuç olarak, endüstriyel kontrol sistemlerine özgü zafiyetlerin yanı sıra internete ve yeni protokoller özgü zafiyetler, kontrol sistemlerini tehdit etmeye başlamıştır. Bu çalışmada, sahte veri enjeksiyonu saldırısının gerçekleştirildiği akıllı şehirler ve ağ altyapıları için çözüm önerisi olarak ışık bağlantısı (Li-Fi) iletim altyapısının veri iletiminde kullanılabilirliği araştırılmıştır. Bu çalışmanın, endüstriyel kontrol sistemleri güvenliği kapsamında diğer çalışmalara önemli katkılar sağlayacağı düşünülmektedir.

References

  • [1] Üstünsoy F., Sayan H. H., “Sample laboratory work for energy management with SCADA supported by PLC”, Journal of Polytechnic, 21(4): 1007-1014, (2018).
  • [2] Yılmaz E. N., Gönen S., “Attack detection/prevention system against cyber attack in industrial control systems”, Computers & Security, 77: 94-105, (2018).
  • [3] Li Y., Wang Y., “False data injection attacks with incomplete network topology information in smart grid”, IEEE Access, 7: 3656-3664, (2018).
  • [4] Myers D., Suriadi S., Radke K., Foo E., “Anomaly detection for industrial control systems using process mining”, Computers & Security, 78: 103-125, (2018).
  • [5] Yılmaz E. N., Sayan H. H., Üstünsoy F., Gönen S., Karacayılmaz G., “Cyber security analysis of DoS and MitM attacks against PLCs used in smart grids”, 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG), Istanbul, Turkey, 36-40, (2019).
  • [6] Ayyash M., Elgala H., Khreishah A., Jungnickel V., Little T., Shao S., Rahaim M., Schulz D., Hilt J., Freund R., “Coexistence of WiFi and Li-Fi toward 5G: concepts, opportunities, and challenges”, IEEE Communications Magazine, 54(2): 64-71, (2016).
  • [7] Kaur R., Walia H., “Review on light fidelity (Li-Fi)-an advancement of wireless network”, I.J. Wireless and Microwave Technologies, 7(3): 25-35, (2017).
  • [8] Jennifer L. J., Jayanthy S., Sujitha J., “Li-Fi Technology based Fleet Vanguard and Security”, Indian Journal of Science and Technology, 9(11): 1-5, (2016).
  • [9] Pawar S., Kinny T., Puthuva F., Komban A., Belekar D., “Data Communication using visible light”, International Journal of Students Research in Technology & Management, 3(5): 358-362, (2015).
  • [10] Gupta A., Garg P., Sharma N., “Hybrid LiFi- WiFi indoor broadcasting system”, 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC ‘17), Montreal, QC, Canada, 1-6, (2017).
  • [11] Perwej Y., “The next generation of wireless communication using Li-Fi (light fidelity) technology”, Journal of Computer Networks, 4(1): 20-29, (2017).
  • [12] Jha P. K., Mishra N., Kumar D. S., “Challenges and potentials for visible light communications: State of the art”, International Conference on Positron Annihilation (1849), Kerala, India, 1-7, (2017).
  • [13] Classen J., Chen J., Steinmetzer D., Hollick M., Knightly E., “The spy next door: Eavesdropping on high throughput visible light communications”, In Proceedings of the 2nd International Workshop on Visible Light Communications Systems, 9-14, (2015).
  • [14] Yucebas D., Yuksel H., “Power analysis based side-channel attack on visible light communication”, PhysicalCommunication, 31: 196-202, (2018).
  • [15] Kulkarni S., Darekar A., Joshi P., “A survey on Li-Fi technology”, International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET ‘16), Chennai, India, 1624-1625, (2016).
  • [16] Ebrahim K. J., Al-Omary A., “Sandstorm effect on visible light communication”, 9th IEEE-GCC Conference and Exhibition (GCCCE), Manama, Bahrain, 1-7, (2017).
  • [17] Wang Q., Liverman S., Chu Y., Borah A., Wang S., Nguyen T., Natarajan A., Wang A. X., “WiFO: A Hybrid WiFi Free-Space Optical Communication Networks of Femtocells”, 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM '17), Miami, FL, USA, 35–42, (2017).
  • [18] Irshad M., Liu W., Wang L., Shah S. B. H., Sohail M. N.,Uba M. M., “Li-local: green communication modulations for indoor localization”, 2nd International Conference on Future Networks and Distributed Systems (ICFNDS ‘18), Amman, Jordan, 1-6, (2018).
  • [19] Wang Y., Haas H., “A Comparison of Load Balancing Techniques for Hybrid LiFi/RF Networks”, 4th ACM Workshop on Visible Light Communication Systems (VLCS '17), Snowbird, UT, USA, 43–47, (2017).
  • [20]Kuppusamy P., Muthuraj S., Gopinath S., “Survey and challenges of Li-Fi with comparison of Wi-Fi”, International Conference on Wireless Communications, Signal Processing and Networking (WISPNET), Chennai, India, 896-899, (2016).
  • [21] Haas H., “Li-Fi: Conceptions, misconceptions and opportunities”, IEEE Photonics Conference (IPC), Waikoloa, HI, USA, 680-681, (2016).
  • [22] Sindiren E., Ciylan B., “Application model for privileged account access control system in enterprise networks”, Computers & Security, 83: 52-67, (2019).
  • [23] Alaswad A. O., Montaser A. H., Mohamad F. E., “Vulnerabilities of Biometric Authentication Threats and Countermeasures”, International Journal of Information & Computation Technology, 4(10): 947-58, (2014).
  • [24] Wang Y., Shen J., Guo X., Dong W., “Research on RFID attack methods”, In 2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE), IEEE, Shenyang, China, 433-437, (2020).
  • [25] Zhang J., Tan X., Wang X., Yan A., Qin Z., “T2FA: Transparent two-factor authentication”, IEEE Access, 6: 32677-32686, (2018).
  • [26] Komarova A., Menshchikov A., Negols A., Korobeynikov A., Gatchin Y., Tishukova N., “Comparison of Authentication Methods on Web Resources”, International Conference on Intelligent Information Technologies for Industry, Springer, Cham, Varna, Bulgaria, 104-113, (2017).
  • [27] Marin-Garcia I., Guerra V., Perez-Jimenez R., “Study and validation of eavesdropping scenarios over a visible light communication channel”, Sensors, 17(11): 1-18, (2017).
  • [28] Afzal M. A., He D., Zhu Z., Yang Y., “Performance Evaluation of Wi-Fi Bluetooth Low Energy & Li-Fi Technology in Indoor Positioning”, 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), IEEE, Shanghai, China, 1-5, (2018).
  • [29] Sharma P. K., Ryu J. H., Park K. Y., Park J. H., Park J. H., “Li-Fi based on security cloud framework for future IT environment”, Human-centric Computing and Information Sciences, 8(1): 1-13, (2018).
  • [30] Ramadhani E., G. Mahardika P., “The technology of LiFi: A brief introduction”, In IOP Conference Series: Materials Science and Engineering, (Vol. 325, No. 1, p. 012013), IOP Publishing, Yogyakarta, Indonesia, 1-10, (2018).

A New Approach in Cyber Security of Industrial Control Systems: Li-Fi

Year 2022, , 895 - 902, 01.06.2022
https://doi.org/10.2339/politeknik.976886

Abstract

Industrial Control Systems used in the control of critical infrastructures, especially in smart grids, have made a rapid transition from an isolated network architecture to wired and wireless external networks due to the factors that facilitate human life such as productivity, economy and speed. With this transition, industrial control systems specific protocols have become insufficient and hybrid protocols have started to be used. As a result, the vulnerabilities specific to the internet and new protocols besides the vulnerabilities specific to industrial control systems have started to threaten control systems. In this study, the usability of the Light Fidelity (Li-Fi) transmission infrastructure in data transmission was investigated as a solution proposal for the smart city / network infrastructure where attack of False Data Injection carried out. This study will make important contributions to the studies carried out for industrial control systems security.

References

  • [1] Üstünsoy F., Sayan H. H., “Sample laboratory work for energy management with SCADA supported by PLC”, Journal of Polytechnic, 21(4): 1007-1014, (2018).
  • [2] Yılmaz E. N., Gönen S., “Attack detection/prevention system against cyber attack in industrial control systems”, Computers & Security, 77: 94-105, (2018).
  • [3] Li Y., Wang Y., “False data injection attacks with incomplete network topology information in smart grid”, IEEE Access, 7: 3656-3664, (2018).
  • [4] Myers D., Suriadi S., Radke K., Foo E., “Anomaly detection for industrial control systems using process mining”, Computers & Security, 78: 103-125, (2018).
  • [5] Yılmaz E. N., Sayan H. H., Üstünsoy F., Gönen S., Karacayılmaz G., “Cyber security analysis of DoS and MitM attacks against PLCs used in smart grids”, 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG), Istanbul, Turkey, 36-40, (2019).
  • [6] Ayyash M., Elgala H., Khreishah A., Jungnickel V., Little T., Shao S., Rahaim M., Schulz D., Hilt J., Freund R., “Coexistence of WiFi and Li-Fi toward 5G: concepts, opportunities, and challenges”, IEEE Communications Magazine, 54(2): 64-71, (2016).
  • [7] Kaur R., Walia H., “Review on light fidelity (Li-Fi)-an advancement of wireless network”, I.J. Wireless and Microwave Technologies, 7(3): 25-35, (2017).
  • [8] Jennifer L. J., Jayanthy S., Sujitha J., “Li-Fi Technology based Fleet Vanguard and Security”, Indian Journal of Science and Technology, 9(11): 1-5, (2016).
  • [9] Pawar S., Kinny T., Puthuva F., Komban A., Belekar D., “Data Communication using visible light”, International Journal of Students Research in Technology & Management, 3(5): 358-362, (2015).
  • [10] Gupta A., Garg P., Sharma N., “Hybrid LiFi- WiFi indoor broadcasting system”, 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC ‘17), Montreal, QC, Canada, 1-6, (2017).
  • [11] Perwej Y., “The next generation of wireless communication using Li-Fi (light fidelity) technology”, Journal of Computer Networks, 4(1): 20-29, (2017).
  • [12] Jha P. K., Mishra N., Kumar D. S., “Challenges and potentials for visible light communications: State of the art”, International Conference on Positron Annihilation (1849), Kerala, India, 1-7, (2017).
  • [13] Classen J., Chen J., Steinmetzer D., Hollick M., Knightly E., “The spy next door: Eavesdropping on high throughput visible light communications”, In Proceedings of the 2nd International Workshop on Visible Light Communications Systems, 9-14, (2015).
  • [14] Yucebas D., Yuksel H., “Power analysis based side-channel attack on visible light communication”, PhysicalCommunication, 31: 196-202, (2018).
  • [15] Kulkarni S., Darekar A., Joshi P., “A survey on Li-Fi technology”, International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET ‘16), Chennai, India, 1624-1625, (2016).
  • [16] Ebrahim K. J., Al-Omary A., “Sandstorm effect on visible light communication”, 9th IEEE-GCC Conference and Exhibition (GCCCE), Manama, Bahrain, 1-7, (2017).
  • [17] Wang Q., Liverman S., Chu Y., Borah A., Wang S., Nguyen T., Natarajan A., Wang A. X., “WiFO: A Hybrid WiFi Free-Space Optical Communication Networks of Femtocells”, 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM '17), Miami, FL, USA, 35–42, (2017).
  • [18] Irshad M., Liu W., Wang L., Shah S. B. H., Sohail M. N.,Uba M. M., “Li-local: green communication modulations for indoor localization”, 2nd International Conference on Future Networks and Distributed Systems (ICFNDS ‘18), Amman, Jordan, 1-6, (2018).
  • [19] Wang Y., Haas H., “A Comparison of Load Balancing Techniques for Hybrid LiFi/RF Networks”, 4th ACM Workshop on Visible Light Communication Systems (VLCS '17), Snowbird, UT, USA, 43–47, (2017).
  • [20]Kuppusamy P., Muthuraj S., Gopinath S., “Survey and challenges of Li-Fi with comparison of Wi-Fi”, International Conference on Wireless Communications, Signal Processing and Networking (WISPNET), Chennai, India, 896-899, (2016).
  • [21] Haas H., “Li-Fi: Conceptions, misconceptions and opportunities”, IEEE Photonics Conference (IPC), Waikoloa, HI, USA, 680-681, (2016).
  • [22] Sindiren E., Ciylan B., “Application model for privileged account access control system in enterprise networks”, Computers & Security, 83: 52-67, (2019).
  • [23] Alaswad A. O., Montaser A. H., Mohamad F. E., “Vulnerabilities of Biometric Authentication Threats and Countermeasures”, International Journal of Information & Computation Technology, 4(10): 947-58, (2014).
  • [24] Wang Y., Shen J., Guo X., Dong W., “Research on RFID attack methods”, In 2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE), IEEE, Shenyang, China, 433-437, (2020).
  • [25] Zhang J., Tan X., Wang X., Yan A., Qin Z., “T2FA: Transparent two-factor authentication”, IEEE Access, 6: 32677-32686, (2018).
  • [26] Komarova A., Menshchikov A., Negols A., Korobeynikov A., Gatchin Y., Tishukova N., “Comparison of Authentication Methods on Web Resources”, International Conference on Intelligent Information Technologies for Industry, Springer, Cham, Varna, Bulgaria, 104-113, (2017).
  • [27] Marin-Garcia I., Guerra V., Perez-Jimenez R., “Study and validation of eavesdropping scenarios over a visible light communication channel”, Sensors, 17(11): 1-18, (2017).
  • [28] Afzal M. A., He D., Zhu Z., Yang Y., “Performance Evaluation of Wi-Fi Bluetooth Low Energy & Li-Fi Technology in Indoor Positioning”, 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), IEEE, Shanghai, China, 1-5, (2018).
  • [29] Sharma P. K., Ryu J. H., Park K. Y., Park J. H., Park J. H., “Li-Fi based on security cloud framework for future IT environment”, Human-centric Computing and Information Sciences, 8(1): 1-13, (2018).
  • [30] Ramadhani E., G. Mahardika P., “The technology of LiFi: A brief introduction”, In IOP Conference Series: Materials Science and Engineering, (Vol. 325, No. 1, p. 012013), IOP Publishing, Yogyakarta, Indonesia, 1-10, (2018).
There are 30 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Research Article
Authors

Serkan Gönen 0000-0002-1417-4461

Hasan Hüseyin Sayan 0000-0002-0692-172X

Gökçe Karacayılmaz 0000-0001-8529-1721

Erhan Sindiren 0000-0003-1138-1913

Furkan Üstünsoy 0000-0003-3087-895X

Harun Artuner 0000-0002-6044-379X

Ercan Nurcan Yılmaz 0000-0001-9859-1600

Mehmet Fatih Işık

Publication Date June 1, 2022
Submission Date July 31, 2021
Published in Issue Year 2022

Cite

APA Gönen, S., Sayan, H. H., Karacayılmaz, G., Sindiren, E., et al. (2022). A New Approach in Cyber Security of Industrial Control Systems: Li-Fi. Politeknik Dergisi, 25(2), 895-902. https://doi.org/10.2339/politeknik.976886
AMA Gönen S, Sayan HH, Karacayılmaz G, Sindiren E, Üstünsoy F, Artuner H, Yılmaz EN, Işık MF. A New Approach in Cyber Security of Industrial Control Systems: Li-Fi. Politeknik Dergisi. June 2022;25(2):895-902. doi:10.2339/politeknik.976886
Chicago Gönen, Serkan, Hasan Hüseyin Sayan, Gökçe Karacayılmaz, Erhan Sindiren, Furkan Üstünsoy, Harun Artuner, Ercan Nurcan Yılmaz, and Mehmet Fatih Işık. “A New Approach in Cyber Security of Industrial Control Systems: Li-Fi”. Politeknik Dergisi 25, no. 2 (June 2022): 895-902. https://doi.org/10.2339/politeknik.976886.
EndNote Gönen S, Sayan HH, Karacayılmaz G, Sindiren E, Üstünsoy F, Artuner H, Yılmaz EN, Işık MF (June 1, 2022) A New Approach in Cyber Security of Industrial Control Systems: Li-Fi. Politeknik Dergisi 25 2 895–902.
IEEE S. Gönen, H. H. Sayan, G. Karacayılmaz, E. Sindiren, F. Üstünsoy, H. Artuner, E. N. Yılmaz, and M. F. Işık, “A New Approach in Cyber Security of Industrial Control Systems: Li-Fi”, Politeknik Dergisi, vol. 25, no. 2, pp. 895–902, 2022, doi: 10.2339/politeknik.976886.
ISNAD Gönen, Serkan et al. “A New Approach in Cyber Security of Industrial Control Systems: Li-Fi”. Politeknik Dergisi 25/2 (June 2022), 895-902. https://doi.org/10.2339/politeknik.976886.
JAMA Gönen S, Sayan HH, Karacayılmaz G, Sindiren E, Üstünsoy F, Artuner H, Yılmaz EN, Işık MF. A New Approach in Cyber Security of Industrial Control Systems: Li-Fi. Politeknik Dergisi. 2022;25:895–902.
MLA Gönen, Serkan et al. “A New Approach in Cyber Security of Industrial Control Systems: Li-Fi”. Politeknik Dergisi, vol. 25, no. 2, 2022, pp. 895-02, doi:10.2339/politeknik.976886.
Vancouver Gönen S, Sayan HH, Karacayılmaz G, Sindiren E, Üstünsoy F, Artuner H, Yılmaz EN, Işık MF. A New Approach in Cyber Security of Industrial Control Systems: Li-Fi. Politeknik Dergisi. 2022;25(2):895-902.
 
TARANDIĞIMIZ DİZİNLER (ABSTRACTING / INDEXING)
181341319013191 13189 13187 13188 18016 

download Bu eser Creative Commons Atıf-AynıLisanslaPaylaş 4.0 Uluslararası ile lisanslanmıştır.