Show simple item record

dc.creatorNuñez Alvarez, José R.
dc.creatorZamora Pérez, Yelena
dc.creatorBenitez Pina, Israel Francisco
dc.description.abstractCurrently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all the information that is stored in the servers of the industrial network of the Hermanos Díaz Refinery in Santiago de Cuba, Cuba. In addition, the characteristics, configurations, methods, and rules of DMZs and firewalls are shown, select the configuration with three multi-legged firewalls as the most appropriate for our application, since it allows efficient exchange of data guaranteeing security and avoiding the violation of the control system. Finally, the simulation of the proposed network is carried
dc.publisherCorporación Universidad de la Costaspa
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.sourceInternational Journal of Electrical and Computer Engineeringspa
dc.subjectControl systemspa
dc.subjectDemilitarized networkspa
dc.subjectElectrical networkspa
dc.subjectIndustrial networkspa
dc.titleDemilitarized network to secure the data stored in industrial networksspa
dcterms.references[1] A. Loulijat, et al., “DFIG use with combined strategy in case of failure of wind farm,” International Journal of Electrical and Computer Engineering, vol. 10, no. 3, pp. 2221-2234,
dcterms.references[2] S. Maity, et al., “Formal integrated network security analysis tool: Formal query-based network security configuration analysis,” IET Networks, vol. 4, no. 2, pp. 137-147,
dcterms.references[3] K. Dadheech, et al., “De-Militarized Zone: A Next Level to Network Security,” in Proceedings of the International Conference on Inventive Communication and Computational Technologies (ICICCT 2018), pp. 595-600,
dcterms.references[4] M. G. I. Cedeño, et al., “Sizing of a networked self-consumption system at the Technical University of Manabí, Ecuador,” in CISCI 2019 Decima Octava Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, Decimo Sexto Simposium Iberoamericano en Edu., Cibernetica e Informatica-Memorias, vol. 1, pp. 6-11,
dcterms.references[5] Y. Li, et al., “Complex networks in advanced manufacturing systems,” Journal of Manufacturing Systems, vol. 43, no. 3, pp. 409-421,
dcterms.references[6] V. Varadharajan, et al., “A policy-based security architecture for software-defined networks,” IEEE Transaction on Information Forensics and Security, vol. 14, no. 4, pp. 897-912,
dcterms.references[7] I. Ahmad, et al., “Security in Software Defined Networks: A Survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 4, pp. 2317-2346,
dcterms.references[8] Z. Chen, et al., “Collaborative network security in multi-tenant data center for cloud computing,” Tsinghua Science and Technology, vol. 19, no. 1, pp. 82-94,
dcterms.references[9] J. García, et al., “Reconfigurable distributed network control system for industrial plant automation,” IEEE Transaction on Industrial Electronics, vol. 51, no. 6, pp. 1168-1180,
dcterms.references[10] P. Tenti and T. Caldognetto, “Optimal control of Local Area Energy Networks (E-LAN),” Sustainable Energy, Grids and Networks, vol. 14, pp. 12-24,
dcterms.references[11] J. Neeli and N. K. Cauvery, “Trust-based secure routing against lethal behavior of nodes in wireless adhoc network,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1592-1598,
dcterms.references[12] J. R. Núñez A., et al., “Metodología de diagnóstico de fallos para sistemas fotovoltaicos de conexión a red,” Revista Iberoamericana de Automática e Informática Industrial, vol. 17, no. 1, p. 94,
dcterms.references[13] J. Aguilar, et al., “Sistemas MultiAgentes y sus Aplicaciones en Automatizací on Industrial,” Universidad de Los Andes, Merida, Venezuela,
dcterms.references[14] H. Hosseinian, et al., “Blockchain outlook for deployment of IoT in distribution networks and smart homes,” International Journal of Electrical and Computer Engineering, vol. 10, no. 3, pp. 2787-2796,
dcterms.references[15] D. Vuksanović, et al., “Industry 4.0: the Future Concepts and New Visions of Factory of the Future Development,” International Scientific Conference on Ictand E-Business Related Research (SINTEZA 2016), pp. 293-298,
dcterms.references[16] C. G. Machado, et al., “Sustainable manufacturing in Industry 4.0: an emerging research agenda,” International Journal of Production Research, vol. 58, no. 5, pp. 1462-1484,
dcterms.references[17] J. Zhang, et al., “Improved minimum entropy control for two-input and two-output networked control systems,” in 2016 UKACC International Conference on Control, UKACC Control 2016,
dcterms.references[18] M. E. M. B. Gaid, et al., “Optimal integrated control and scheduling of networked control systems with communication constraints: Application to a car suspension system,” IEEE Transactions on Control Systems Technology, vol. 14, no. 4, pp. 776-787,
dcterms.references[19] B. Rahmani and A. H. D. Markazi, “Variable selective control method for networked control systems,” IEEE Transactions on Control Systems Technology, vol. 21, no. 3, pp. 975-982,
dcterms.references[20] J. Nuñez, et al., “Tools for the Implementation of a SCADA System in a Desalination Process,” IEEE Latin America Transactions, vol. 17, no. 11, pp. 1858-1864,
dcterms.references[21] S. McLaughlin, et al., “The Cybersecurity Landscape in Industrial Control Systems,” Proceedings of the IEEE, vol. 104, no. 5, pp. 1039-1057,
dcterms.references[22] P. T. Tin, et al., “Hybrid protocol for wireless EH network over weibull fading channel: Performance analysis,” International Journal of Electrical and Computer Engineering, vol. 10, no. 1, pp. 1085-1091,
dcterms.references[23] K. Liu, et al., “Survey on time-delay approach to networked control,” Annual Reviews in Control, vol. 48, pp. 57-79,
dcterms.references[24] S. Amin, et al., “Security of interdependent and identical networked control systems,” Automatica, vol. 49, no. 1, pp. 186-192,
dcterms.references[25] E. Henriksson, et al., “Multiple-Loop Self-Triggered Model Predictive Control for Network Scheduling and Control,” IEEE Transactions on Control Systems Technology, vol. 23, no. 6, pp. 2167-2181,
dcterms.references[26] J. Ponniah, et al., “A clean slate approach to secure wireless networking,” Foundations and Trends in Networking, vol. 9, no. 1, pp. 1-105,
dcterms.references[27] J. Zhu, et al., “Review and big data perspectives on robust data mining approaches for industrial process modeling with outliers and missing data,” Annual Reviews in Control, vol. 46, pp. 107-133,
dcterms.references[28] A. Mungekar, et al., “Augmentation of a SCADA based firewall against foreign hacking devices,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1359-1366,
dcterms.references[29] C. Shen, et al., “Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks,” IEEE Wireless Communications, vol. 25, no. 6, pp. 26-31,
dcterms.references[30] Y. S. Jeong and J. H. Park, “Artificial intelligence for the fourth industrial revolution,” Journal of Information Processing Systems, vol. 14, no. 6, pp. 1301-1306,
dcterms.references[31] F. A. Budes, et al., “Energy, economic, and environmental evaluation of a proposed solar-wind power on-grid system using HOMER Pro®: A case study in Colombia,” Energies, vol. 13, no. 7, p. 1662, 2020spa

Files in this item


This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 International
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International