2.765

2022影响因子

(CJCR)

  • 中文核心
  • EI
  • 中国科技核心
  • Scopus
  • CSCD
  • 英国科学文摘

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于二维结构熵的CBTC系统信息安全风险评估方法

董慧宇 唐涛 王洪伟

董慧宇, 唐涛, 王洪伟. 基于二维结构熵的CBTC系统信息安全风险评估方法. 自动化学报, 2019, 45(1): 153-162. doi: 10.16383/j.aas.c180374
引用本文: 董慧宇, 唐涛, 王洪伟. 基于二维结构熵的CBTC系统信息安全风险评估方法. 自动化学报, 2019, 45(1): 153-162. doi: 10.16383/j.aas.c180374
DONG Hui-Yu, TANG Tao, WANG Hong-Wei. A 2D Structure Entropy-based Approach to Security Assessment of Communication-based Train Control System. ACTA AUTOMATICA SINICA, 2019, 45(1): 153-162. doi: 10.16383/j.aas.c180374
Citation: DONG Hui-Yu, TANG Tao, WANG Hong-Wei. A 2D Structure Entropy-based Approach to Security Assessment of Communication-based Train Control System. ACTA AUTOMATICA SINICA, 2019, 45(1): 153-162. doi: 10.16383/j.aas.c180374

基于二维结构熵的CBTC系统信息安全风险评估方法

doi: 10.16383/j.aas.c180374
基金项目: 

北京市自然科学基金 4164094

国家重点实验室项目 RCS2018K008

国家自然科学基金 201706280220

国家自然科学基金 61603031

国家自然科学基金 61790573

国家重点实验室项目 RCS2017ZZ003

北京市自然科学基金 L161006

详细信息
    作者简介:

    董慧宇 北京交通大学电子信息工程学院硕士研究生.2016年获得北京交通大学电子信息工程学院学士学位.主要研究方向为城市轨道交通列控系统信息安全.E-mail:16120213@bjtu.edu.cn

    唐涛 轨道交通控制与安全国家重点实验室教授.1991获得中国科学院博士学位.主要研究方向为基于通信的列车运行控制, 高速列车控制系统和智能交通系统.E-mail:ttang@bjtu.edu.cn

    通讯作者:

    王洪伟 国家轨道交通安全评估研究中心副教授.2014年获得北京交通大学博士学位.主要研究方向为基于通信的列车运行控制系统的车, 地通信技术和地铁系统中的协作调度方法.本文通信作者.E-mail:hwwang@bjtu.edu.cn

A 2D Structure Entropy-based Approach to Security Assessment of Communication-based Train Control System

Funds: 

Supported by Beijing Natural Science Foundation 4164094

State Key Laboratory RCS2018K008

National Natural Science Foundation of China 201706280220

National Natural Science Foundation of China 61603031

National Natural Science Foundation of China 61790573

State Key Laboratory RCS2017ZZ003

Supported by Beijing Natural Science Foundation L161006

More Information
    Author Bio:

    Master student at the School of Electronics and Information Engineering, Beijing Jiaotong University. She received her bachelor degree from Beijing Jiaotong University in 2016. Her research interest covers information security in communication-based train control systems

    Professor at the State Key Laboratory of Rail Traffic Control and Safety. He received his Ph. D. degree from Chinese Academy of Sciences in 1991. His research interest covers communication-based train control, high-speed train control systems, and intelligent transportation systems

    Corresponding author: WANG Hong-Wei Associate professor at the National Research Center of Railway Safety Assessment. He received his Ph. D. degree from Beijing Jiaotong University in 2014. His research interest covers train-ground communication technology in communication base train-ground communication systems and cooperative scheduling approaches in subway systems. Corresponding author of this paper
  • 摘要: 随着计算机技术、通信技术和控制技术在城市轨道交通列车运行控制系统中的应用,城市轨道交通的自动化和信息化程度不断提升.然而,基于通信的列车运行控制(Communication-based train control,CBTC)技术采用的通用计算机设备和通信技术带来的信息安全漏洞,给CBTC系统带来了日益严峻的信息安全风险,因此,对CBTC系统的信息安全风险进行量化、动态评估具有重要意义.本文根据设备及通信链路的差异性构建了CBTC网络拓扑模型,结合信息安全风险下线路列车运行性能变化导致的运能损失,采用综合表征信息域和物理域特征的二维结构信息熵对CBTC系统信息安全风险进行建模分析.最后,基于城市轨道交通列控系统半实物仿真平台对评估方法进行验证,表明所提方法对CBTC系统信息安全量化评估的有效性和准确性.
    1)  本文责任编委 吕宜生
  • 图  1  CBTC系统结构

    Fig.  1  CBTC systems

    图  2  CBTC系统故障时的列车性能变化

    Fig.  2  Train performance under failures of CBTC

    图  3  CBTC 系统测试床网络拓扑图

    Fig.  3  The network topology of the CBTC test-bed

    图  4  网络攻击过程

    Fig.  4  The process of the network attack

    图  5  节点脆弱性指数

    Fig.  5  Vulnerability indexes of nodes

    图  6  网络攻击下计算机网络二维结构熵的变化

    Fig.  6  Two-dimensional structure entropy of computer network under the cyber attack

    图  7  ZC故障后的列车运行速度图

    Fig.  7  The speed of a train within the range of a failed ZC sub-system

    图  8  网络攻击下列车性能

    Fig.  8  Operation performance of trains of CBTC test-bed under the cyber attack

    图  9  网络攻击下CBTC系统测试床的信息安全状态

    Fig.  9  Security of CBTC test-bed under the cyber attack

    表  1  通信链路的安全性

    Table  1  Security of communication links between equipments

    通信方式 通信协议 数据安全性 被截获的难易程度 综合评价 边权重
    RSSP-I 2 3 2.3 3
    有线 私有协议 3 3 3 1
    明文 1 4 1.9 5
    无线 RSSP-I 2 2 2 4
    私有协议 3 1 2.4 2
    下载: 导出CSV
  • [1] 张霄, 丁智, 吴云双, 谢宗星.城市轨道交通发展现状及前景浅析.现代城市, 2014, 9(2):17-19 http://d.old.wanfangdata.com.cn/Conference/9277207

    Zhang Xiao, Ding Zhi, Wu Yun-Shuang, Xie Zong-Xing. Analysis on present situation and prospects of city rail traffic development. Modern City, 2014, 9(2):17-19 http://d.old.wanfangdata.com.cn/Conference/9277207
    [2] 郑莹.基于无线通信的CBTC研究综述.通信技术, 2011, 44(12):137-138, 141 doi: 10.3969/j.issn.1002-0802.2011.12.046

    Zheng Ying. Study on CBTC based on wireless communication. Communications Technology, 2011, 44(12):137-138, 141 doi: 10.3969/j.issn.1002-0802.2011.12.046
    [3] 洪翔.轨道交通自动化信息安全面临的挑战与应对(节选).自动化博览, 2015, (2):26 http://d.old.wanfangdata.com.cn/Periodical/zdhbl2015020011

    Hong Xiang. Challenges and countermeasures for information security of rail transportation automation (excerpt). Automation Panorama, 2015, (2):26 http://d.old.wanfangdata.com.cn/Periodical/zdhbl2015020011
    [4] 陈登科.城市轨道交通信号系统网络安全分析.铁路通信信号工程技术, 2012, 9(5):41-43 doi: 10.3969/j.issn.1673-4440.2012.05.013

    Chen Deng-Ke. Network safety analysis of urban rail transit signaling system. Railway Signalling and Communication Engineering, 2012, 9(5):41-43 doi: 10.3969/j.issn.1673-4440.2012.05.013
    [5] Bloomfield R, Bendele M, Bishop P, Stroud R, Tonks S. The risk assessment of ERTMS-based railway systems from a cyber security perspective: methodology and lessons learned. In: Proceedings of the 1st International Conference on Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification. Paris, France: Springer, 2016. 3-19
    [6] 邝香琦. CBTC系统信息安全风险评估方法研究[硕士学位论文], 北京交通大学, 中国, 2017.

    Kuang Xiang-Qi. Research on Risk Assessment Method of Information Security in Communication-Based Train Control Systems[Master thesis], Beijing Jiaotong University, China, 2017.
    [7] Craven P V, Craven S. Security of ATCS wireless railway communications. In: Proceedings of the 2005 ASME/IEEE Joint Rail Conference. Pueblo, CO, USA: IEEE, 2005. 227238
    [8] 郁舒雅.城市轨道交通列控系统信息安全检测技术研究[硕士学位论文], 北京交通大学, 中国, 2017.

    Yu Shu-Ya. Research on Information Security Detection Technology of Urban Rail Transit Control System[Master thesis], Beijing Jiaotong University, China, 2017.
    [9] 包正堂.列控系统信息安全风险主动防御研究[硕士学位论文], 北京交通大学, 中国, 2017.

    Bao Zheng-Tang. Active Defense of Security Risk in Train Control System[Master thesis], Beijing Jiaotong University, China, 2017.
    [10] Chen B B, Schmittner C, Ma Z D, Temple W G, Dong X S, Jones D L, et al. Security analysis of urban railway systems: the need for a cyber-physical perspective. In: Proceedings of the 2015 SAFECOMP Workshops on Computer Safety, Reliability, and Security. Delft, The Netherlands: Springer, 2014. 277-290
    [11] 李文武, 游文霞, 王先培.电力系统信息安全研究综述.电力系统保护与控制, 2011, 39(10):140-147 http://d.old.wanfangdata.com.cn/Periodical/jdq201110026

    Li Wen-Wu, You Wen-Xia, Wang Xian-Pei. Survey of cyber security research in power system. Power System Protection and Control, 2011, 39(10):140-147 http://d.old.wanfangdata.com.cn/Periodical/jdq201110026
    [12] 詹全忠, 陈岚.浅谈水利网络与信息安全体系.水利信息化, 2010, (5):31-33 doi: 10.3969/j.issn.1674-9405.2010.05.007

    Zhan Quan-Zhong, Chen Lan. A brief discuss on water resources network and information security system. Water Resources Informatization, 2010, (5):31-33 doi: 10.3969/j.issn.1674-9405.2010.05.007
    [13] 胡江, 孙国臣, 张加军, 侯秦脉.由"震网"病毒事件浅议核电站信息安全现状及监管.核科学与工程, 2015, 35(1):181-185 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=hkxygc201501028

    Hu Jiang, Sun Guo-Chen, Zhang Jia-Jun, Hou Qin-Mai. The status quo and information security supervision of NPP from stuxnet attacks. Chinese Journal of Nuclear Science and Engineering, 2015, 35(1):181-185 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=hkxygc201501028
    [14] Mendes E. Introduction to Bayesian networks. Practitioner's Knowledge Representation. Berlin, Heidelberg: Springer, 2014. 67-71
    [15] Xie P, Li J H, Ou X M, Liu P, Levy R. Using Bayesian networks for cyber security analysis. In: Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Chicago, IL, USA: IEEE, 2010. 211-220
    [16] Shin J, Son H, Ur R K, Heo G. Development of a cyber security risk model using bayesian networks. Reliability Engineering and System Safety, 2015, 134:208-217 doi: 10.1016/j.ress.2014.10.006
    [17] Shin J, Son H, Heo G. Cyber security risk evaluation of a nuclear I & C using BN and ET. Nuclear Engineering and Technology, 2016, 49(3):517-524 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=17463e3b6050eaf5123530c8648a82cc
    [18] Schneier B. Attack trees. Doctor Dobbs Journal, 1999, 24(12):21-29 http://d.old.wanfangdata.com.cn/Periodical/zwxb200712012
    [19] Mauw S, Oostdijk M. Foundations of attack trees. Information Security and Cryptology-ICISC 2005. Berlin, Heidelberg: Springer, 2006. 186-198
    [20] Ten C W, Liu C C, Govindarasu M. Vulnerability assessment of cybersecurity for SCADA systems using attack trees. In: Proceedings of the 2007 IEEE Power Engineering Society General Meeting. Tampa, FL, USA: IEEE, 2007. 18
    [21] Murata T. Petri nets:properties, analysis and applications. Proceedings of the IEEE, 1989, 77(4):541-580 doi: 10.1109/5.24143
    [22] Chen T M, Sanchez-Aarnoutse J C, Buford J. Petri net modeling of cyber-physical attacks on smart grid. IEEE Transactions on Smart Grid, 2011, 2(4):741-749 doi: 10.1109/TSG.2011.2160000
    [23] El Bouchti A, Haqiq A. Modeling cyber-attack for SCADA systems using CoPNet approach. In: Proceedings of the 2012 IEEE International Conference on Complex Systems (ICCS). San Agadir, Morocco: IEEE, 2012. 1-6
    [24] Jensen K, Rozenberg G. High-Level Petri Nets: Theory and Application. Berlin, New York: Springer, 1991.
    [25] Zhou S J, Qin Z G, Zhang F, Zhang X F, Chen W, Liu J D. Colored petri net based attack modeling. In: Proceedings of the 9th International Conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing. Chongqing, China: Springer, 2003. 715-718
    [26] Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q S. A survey of game theory as applied to network security. In: Proceedings of the 43rd Hawaii International Conference on System Sciences. Honolulu, HI, USA: IEEE, 2010. 1-10
    [27] Liang X N, Xiao Y. Game theory for network security. IEEE Communications Surveys and Tutorials, 2013, 15(1):472486 http://d.old.wanfangdata.com.cn/OAPaper/oai_arXiv.org_1307.3136
    [28] Cui X L, Tan X B, Zhang Y, Xi H S. A Markov game theory-based risk assessment model for network information system. In: Proceedings of the 2008 International Conference on Computer Science and Software Engineering. Wuhan, China: IEEE, 2008. 1057-1061
    [29] Li A S, Pan Y C. Structural information and dynamical complexity of networks. IEEE Transactions on Information Theory, 2016, 62(6):3290-3339 doi: 10.1109/TIT.2016.2555904
    [30] Li A S, Hu Q F, Liu J, Pan Y C. Resistance and security index of networks: structural information perspective of network security. Scientific Reports, 2016, 6: Article No.26810
    [31] Shannon C E. A mathematical theory of communication. Bell System Technical Journal, 1948, 27(3):379-423 doi: 10.1002/bltj.1948.27.issue-3
    [32] Anand K, Bianconi G. Entropy measures for networks: toward an information theory of complex topologies. Physical Review E: Covering Statistical, Nonlinear, and Soft Matter Physics, 2009, 80(4): Article No.045102
    [33] Dong H Y, Wang H W, Tang T. An attack tree-based approach for vulnerability assessment of communication-based train control systems. In: Proceedings of the 2017 Chinese Automation Congress (CAC). Ji'nan, China: IEEE, 2017. 6407-6412
  • 加载中
图(9) / 表(1)
计量
  • 文章访问数:  1850
  • HTML全文浏览量:  355
  • PDF下载量:  651
  • 被引次数: 0
出版历程
  • 收稿日期:  2018-05-31
  • 录用日期:  2018-09-03
  • 刊出日期:  2019-01-20

目录

    /

    返回文章
    返回