Show simple item record

dc.creatorNuñez Alvarez, José R.
dc.creatorZamora Pérez, Yelena
dc.creatorBenitez Pina, Israel Francisco
dc.creatorNORIEGA ANGARITA, ELIANA MARIA
dc.date.accessioned2020-11-13T16:01:10Z
dc.date.available2020-11-13T16:01:10Z
dc.date.issued2020
dc.identifier.issn20888708
dc.identifier.urihttps://hdl.handle.net/11323/7303
dc.description.abstractCurrently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all the information that is stored in the servers of the industrial network of the Hermanos Díaz Refinery in Santiago de Cuba, Cuba. In addition, the characteristics, configurations, methods, and rules of DMZs and firewalls are shown, select the configuration with three multi-legged firewalls as the most appropriate for our application, since it allows efficient exchange of data guaranteeing security and avoiding the violation of the control system. Finally, the simulation of the proposed network is carried out.spa
dc.format.mimetypeapplication/pdfspa
dc.language.isoengspa
dc.publisherCorporación Universidad de la Costaspa
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.sourceInternational Journal of Electrical and Computer Engineeringspa
dc.subjectControl systemspa
dc.subjectDemilitarized networkspa
dc.subjectElectrical networkspa
dc.subjectFirewallsspa
dc.subjectIndustrial networkspa
dc.titleDemilitarized network to secure the data stored in industrial networksspa
dc.typePreprintspa
dcterms.references[1] A. Loulijat, et al., “DFIG use with combined strategy in case of failure of wind farm,” International Journal of Electrical and Computer Engineering, vol. 10, no. 3, pp. 2221-2234, 2019.spa
dcterms.references[2] S. Maity, et al., “Formal integrated network security analysis tool: Formal query-based network security configuration analysis,” IET Networks, vol. 4, no. 2, pp. 137-147, 2015.spa
dcterms.references[3] K. Dadheech, et al., “De-Militarized Zone: A Next Level to Network Security,” in Proceedings of the International Conference on Inventive Communication and Computational Technologies (ICICCT 2018), pp. 595-600, 2018.spa
dcterms.references[4] M. G. I. Cedeño, et al., “Sizing of a networked self-consumption system at the Technical University of Manabí, Ecuador,” in CISCI 2019 Decima Octava Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, Decimo Sexto Simposium Iberoamericano en Edu., Cibernetica e Informatica-Memorias, vol. 1, pp. 6-11, 2019.spa
dcterms.references[5] Y. Li, et al., “Complex networks in advanced manufacturing systems,” Journal of Manufacturing Systems, vol. 43, no. 3, pp. 409-421, 2017.spa
dcterms.references[6] V. Varadharajan, et al., “A policy-based security architecture for software-defined networks,” IEEE Transaction on Information Forensics and Security, vol. 14, no. 4, pp. 897-912, 2019.spa
dcterms.references[7] I. Ahmad, et al., “Security in Software Defined Networks: A Survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 4, pp. 2317-2346, 2015.spa
dcterms.references[8] Z. Chen, et al., “Collaborative network security in multi-tenant data center for cloud computing,” Tsinghua Science and Technology, vol. 19, no. 1, pp. 82-94, 2014.spa
dcterms.references[9] J. García, et al., “Reconfigurable distributed network control system for industrial plant automation,” IEEE Transaction on Industrial Electronics, vol. 51, no. 6, pp. 1168-1180, 2004.spa
dcterms.references[10] P. Tenti and T. Caldognetto, “Optimal control of Local Area Energy Networks (E-LAN),” Sustainable Energy, Grids and Networks, vol. 14, pp. 12-24, 2018.spa
dcterms.references[11] J. Neeli and N. K. Cauvery, “Trust-based secure routing against lethal behavior of nodes in wireless adhoc network,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1592-1598, 2020.spa
dcterms.references[12] J. R. Núñez A., et al., “Metodología de diagnóstico de fallos para sistemas fotovoltaicos de conexión a red,” Revista Iberoamericana de Automática e Informática Industrial, vol. 17, no. 1, p. 94, 2020.spa
dcterms.references[13] J. Aguilar, et al., “Sistemas MultiAgentes y sus Aplicaciones en Automatizací on Industrial,” Universidad de Los Andes, Merida, Venezuela, 2013.spa
dcterms.references[14] H. Hosseinian, et al., “Blockchain outlook for deployment of IoT in distribution networks and smart homes,” International Journal of Electrical and Computer Engineering, vol. 10, no. 3, pp. 2787-2796, 2020.spa
dcterms.references[15] D. Vuksanović, et al., “Industry 4.0: the Future Concepts and New Visions of Factory of the Future Development,” International Scientific Conference on Ictand E-Business Related Research (SINTEZA 2016), pp. 293-298, 2016.spa
dcterms.references[16] C. G. Machado, et al., “Sustainable manufacturing in Industry 4.0: an emerging research agenda,” International Journal of Production Research, vol. 58, no. 5, pp. 1462-1484, 2020.spa
dcterms.references[17] J. Zhang, et al., “Improved minimum entropy control for two-input and two-output networked control systems,” in 2016 UKACC International Conference on Control, UKACC Control 2016, 2016.spa
dcterms.references[18] M. E. M. B. Gaid, et al., “Optimal integrated control and scheduling of networked control systems with communication constraints: Application to a car suspension system,” IEEE Transactions on Control Systems Technology, vol. 14, no. 4, pp. 776-787, 2006.spa
dcterms.references[19] B. Rahmani and A. H. D. Markazi, “Variable selective control method for networked control systems,” IEEE Transactions on Control Systems Technology, vol. 21, no. 3, pp. 975-982, 2013.spa
dcterms.references[20] J. Nuñez, et al., “Tools for the Implementation of a SCADA System in a Desalination Process,” IEEE Latin America Transactions, vol. 17, no. 11, pp. 1858-1864, 2019.spa
dcterms.references[21] S. McLaughlin, et al., “The Cybersecurity Landscape in Industrial Control Systems,” Proceedings of the IEEE, vol. 104, no. 5, pp. 1039-1057, 2016.spa
dcterms.references[22] P. T. Tin, et al., “Hybrid protocol for wireless EH network over weibull fading channel: Performance analysis,” International Journal of Electrical and Computer Engineering, vol. 10, no. 1, pp. 1085-1091, 2020.spa
dcterms.references[23] K. Liu, et al., “Survey on time-delay approach to networked control,” Annual Reviews in Control, vol. 48, pp. 57-79, 2019.spa
dcterms.references[24] S. Amin, et al., “Security of interdependent and identical networked control systems,” Automatica, vol. 49, no. 1, pp. 186-192, 2013.spa
dcterms.references[25] E. Henriksson, et al., “Multiple-Loop Self-Triggered Model Predictive Control for Network Scheduling and Control,” IEEE Transactions on Control Systems Technology, vol. 23, no. 6, pp. 2167-2181, 2015.spa
dcterms.references[26] J. Ponniah, et al., “A clean slate approach to secure wireless networking,” Foundations and Trends in Networking, vol. 9, no. 1, pp. 1-105, 2015.spa
dcterms.references[27] J. Zhu, et al., “Review and big data perspectives on robust data mining approaches for industrial process modeling with outliers and missing data,” Annual Reviews in Control, vol. 46, pp. 107-133, 2018.spa
dcterms.references[28] A. Mungekar, et al., “Augmentation of a SCADA based firewall against foreign hacking devices,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1359-1366, 2020.spa
dcterms.references[29] C. Shen, et al., “Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks,” IEEE Wireless Communications, vol. 25, no. 6, pp. 26-31, 2018.spa
dcterms.references[30] Y. S. Jeong and J. H. Park, “Artificial intelligence for the fourth industrial revolution,” Journal of Information Processing Systems, vol. 14, no. 6, pp. 1301-1306, 2018.spa
dcterms.references[31] F. A. Budes, et al., “Energy, economic, and environmental evaluation of a proposed solar-wind power on-grid system using HOMER Pro®: A case study in Colombia,” Energies, vol. 13, no. 7, p. 1662, 2020spa
dc.source.urlhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85091185749&doi=10.11591%2fijece.v11i1.pp611-619&partnerID=40&md5=da7e96b150001ed80e1be1c6c44f5e2cspa
dc.rights.accessrightsinfo:eu-repo/semantics/closedAccessspa
dc.type.hasversioninfo:eu-repo/semantics/draftspa


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 International
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International