Abstract

Cyber-Physical Systems (CPSs) is the key-pillar technology for the implementation of the Industry 4.0 concept. In the industrial sector, a physical entity with internet-enabled capabilities is an example of a CPS. Considering the criticality of the processes controlled by CPS, only authorized entities should have access to those systems under certain conditions. Existing access control approaches implemented in the industrial sector mainly rely on the roles that subjects may have to facilitate the separation of duty concept. However, context information and its mutability over time were out of the scope of implemented access control mechanisms. In this chapter, we investigate the application of the advanced access control paradigm to enable continuous control of Industrial Control Systems (ICS) usage according to context-aware security policies. We provide a framework description along with its implementation in a simulation environment. Finally, the obtained results regarding the system’s performance are outlined along with a discussion for potential improvement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (Canada)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (Canada)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://opcfoundation.org/.

  2. 2.

    https://www.trendmicro.com/vinfo/us/security/definition/i.

  3. 3.

    https://opcfoundation.org/products/view/simatic-s7-1500-plc-family.

  4. 4.

    https://us.profinet.com/technology/profinet/.

  5. 5.

    https://github.com/open62541/open62541/wiki/List-of-Open-Source-OPC-UA-Implementations.

  6. 6.

    https://github.com/FreeOpcUa/python-opcua.

References

  1. Andreeva O, Gordeychik S, Gritsai G, Kochetova O, Potseluevskaya E, Sidorov SI, Timorin AA (2016) Industrial control systems vulnerabilities statistics. Kaspersky Lab, Report

    Google Scholar 

  2. Carniani E, D’Arenzo D, Lazouski A, Martinelli F, Mori P (2016) Usage control on cloud systems. Futur Gener Comput Syst 63:37–55

    Article  Google Scholar 

  3. Colombo AW, Bangemann T, Karnouskos S, Delsing J, Stluka P, Harrison R, Jammes F, Lastra JL et al (2014) Industrial cloud-based cyber-physical systems. IMC-AESOP Approach 22

    Google Scholar 

  4. Colombo M, Lazouski A, Martinelli F, Mori P (2010) A proposal on enhancing xacml with continuous usage control features. In: Grids, P2P and Services Computing. Springer, pp 133–146

    Google Scholar 

  5. Easttom C (2019) Computer security fundamentals. Pearson IT certification

    Google Scholar 

  6. ** X, Krishnan R, Sandhu R (2012) A unified attribute-based access control model covering dac, mac and rbac. In: IFIP annual conference on data and applications security and privacy. Springer, pp 41–55

    Google Scholar 

  7. Khaitan SK, McCalley JD (2014) Design techniques and applications of cyberphysical systems: a survey. IEEE Syst J 9(2):350–365

    Article  Google Scholar 

  8. La Marra A, Martinelli F, Mori P, Saracino A (2017) Implementing usage control in internet of things: a smart home use case. In: 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, pp 1056–1063

    Google Scholar 

  9. Latif H, Shao G, Starly B (2019) Integrating a dynamic simulator and advanced process control using the opc-ua standard. Procedia Manuf 34:813–819

    Article  Google Scholar 

  10. Lazouski A, Mancini G, Martinelli F, Mori P (2012) Usage control in cloud systems. In: 2012 international conference for internet technology and secured transactions. IEEE, pp 202–207

    Google Scholar 

  11. Lazouski A, Martinelli F, Mori P, Saracino A (2017) Stateful data usage control for android mobile devices. Int J Inf Secur 16(4):345–369

    Article  Google Scholar 

  12. Leitner SH, Mahnke W (2006) Opc ua-service-oriented architecture for industrial applications. ABB Corp Res Cent 48:61–66

    Google Scholar 

  13. Liang G, Weller SR, Zhao J, Luo F, Dong ZY (2016) The 2015 Ukraine blackout: implications for false data injection attacks. IEEE Trans Power Syst 32(4):3317–3318

    Article  Google Scholar 

  14. Libicki M (2015) The cyber war that wasn’t. Cyber war in perspective: Russian aggression against Ukraine, pp 49–50

    Google Scholar 

  15. Luiijf E (2016) Threats in industrial control systems. In: Cyber-security of SCADA and other industrial control systems. Springer, pp 69–93

    Google Scholar 

  16. OPC Foundation (2017) OPC UA Part 3—security model release 1.04 specification. https://opcfoundation.org/developer-tools/specifications-unified-architecture/part-3-address-space-model/

  17. OPC Foundation (2018) OPC UA Part 1—address space model release 1.04 specification. https://opcfoundation.org/developer-tools/specifications-unified-architecture/part-1-overview-and-concepts/

  18. OPC Foundation (2018) OPC UA Part 2—security model release 1.04 specification. https://opcfoundation.org/developer-tools/specifications-unified-architecture/part-2-security-model/

  19. OPC Foundation (2018) OPC UA Part 5—information model release 1.04 specification. https://opcfoundation.org/developer-tools/specifications-unified-architecture/part-5-information-model/

  20. Park J, Sandhu R (2002) Towards usage control models: beyond traditional access control. In: Proceedings of the seventh ACM symposium on access control models and technologies. ACM, pp 57–64

    Google Scholar 

  21. Park J, Sandhu R (2004) The ucon abc usage control model. ACM Trans Inf Syst Secur (TISSEC) 7(1):128–174

    Article  Google Scholar 

  22. Probst CW, Hunker J, Bishop M, Gollmann D (2010) Insider threats in cyber security, vol 49. Springer

    Google Scholar 

  23. Rissanen E, Oasis extensible access control markup language (xacml) version 3.0. OASIS Comm Specification 1

    Google Scholar 

  24. Robert M, Lee Michael J, Assante TC (2016) Analysis of the cyber attack on the Ukrainian power grid: defense use case. https://ics.sans.org/duc5

  25. Sandhu R (2000) Engineering authority and trust in cyberspace: the om-am and rbac way. In: Proceedings of the fifth ACM workshop on Role-based access control. ACM, pp 111–119

    Google Scholar 

  26. Sandhu R, Ranganathan K, Zhang X (2006) Secure information sharing enabled by trusted computing and pei models. In: Proceedings of the 2006 ACM symposium on information, computer and communications security. ACM, pp 2–12

    Google Scholar 

  27. Sandhu RS (1993) Lattice-based access control models. Computer 26(11):9–19

    Article  Google Scholar 

  28. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38–47

    Article  Google Scholar 

  29. Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40–48

    Article  Google Scholar 

  30. Schleipen M, Selyansky E, Henssen R, Bischoff T (2015) Multi-level user and role concept for a secure plug-and-work based on opc ua and automationml. In: 2015 IEEE 20th conference on emerging technologies & factory automation (ETFA). IEEE, pp 1–4

    Google Scholar 

  31. Wang Y, Liu J, Yang C, Zhou L, Li S, Xu Z (2018) Access control attacks on plc vulnerabilities. J Comput Commun 6(11):311–325

    Article  Google Scholar 

  32. Watson V, Sassmannshausen J, Waedt K (2019) Secure granular interoperability with opc ua. In: INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik–Informatik für Gesellschaft (Workshop-Beiträge). Gesellschaft für Informatik eV

    Google Scholar 

  33. Wolf WH (2009) Cyber-physical systems. IEEE Comput 42(3):88–89

    Article  Google Scholar 

  34. Wu D, Rosen DW, Wang L, Schaefer D (2015) Cloud-based design and manufacturing: a new paradigm in digital manufacturing and design innovation. Comput-Aided Des 59:1–14

    Article  Google Scholar 

  35. Xu Y, Yang Y, Li T, Ju J, Wang Q (2017) Review on cyber vulnerabilities of communication protocols in industrial control systems. In: 2017 IEEE conference on energy internet and energy system integration (EI2). IEEE, pp 1–6

    Google Scholar 

Download references

Acknowledgements

This contribution was partially supported by the EU H2020 funded project SPARTA, ga n. 830892, EU H2020 founded project NeCS, ga n. 675320 and EU H2020 founded project E-CORRIDOR, ga n. 883135

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oleksii Osliak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Osliak, O., Mori, P., Saracino, A. (2023). Usage Control for Industrial Control System. In: Dimitrakos, T., Lopez, J., Martinelli, F. (eds) Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-16088-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-16088-2_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-16087-5

  • Online ISBN: 978-3-031-16088-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation