{"title":"基于国家秘密算法的工业控制嵌入式设备语义完整性测量","authors":"Xiao Zhang, Longyun Qi, Xiaolei Ma, Wei Liu, Lianwen Sun, Xiang Li, Binbin Duan, Siyuan Zhang, Xin Che","doi":"10.1109/ICCCWorkshops57813.2023.10233798","DOIUrl":null,"url":null,"abstract":"In the age of 6G and AI, industrial control embedded devices can understand and follow instructions automatically. The key is to properly understand the meaning of tasks rather than just focusing on tiny details. Semantic communication will be widely used in industries. These industrial control embedded devices are crucial for controlling and monitoring industrial processes and any tampering with them could lead to disastrous consequences. Thus, it becomes increasingly important to protect the integrity of these devices semantically. However, existing research in this field either focuses on specific devices or fails to utilize national secret algorithms. To address this issue, we propose an algorithm to measure the semantic integrity of key files that are essential for system startup and control programs based on national secret algorithms. The proposed algorithm uses a unique encryption method to protect key files from unauthorized access and tampering. To validate the effectiveness and applicability of the proposed algorithm, extensive tests were conducted. The test results show that the proposed algorithm is fast and efficient, making it suitable for measuring the integrity of industrial control devices. The development of this algorithm is a significant step towards securing industrial control devices.","PeriodicalId":201450,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Semantic Integrity Measurement of Industrial Control Embedded Devices Based on National Secret Algorithm\",\"authors\":\"Xiao Zhang, Longyun Qi, Xiaolei Ma, Wei Liu, Lianwen Sun, Xiang Li, Binbin Duan, Siyuan Zhang, Xin Che\",\"doi\":\"10.1109/ICCCWorkshops57813.2023.10233798\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the age of 6G and AI, industrial control embedded devices can understand and follow instructions automatically. The key is to properly understand the meaning of tasks rather than just focusing on tiny details. Semantic communication will be widely used in industries. These industrial control embedded devices are crucial for controlling and monitoring industrial processes and any tampering with them could lead to disastrous consequences. Thus, it becomes increasingly important to protect the integrity of these devices semantically. However, existing research in this field either focuses on specific devices or fails to utilize national secret algorithms. To address this issue, we propose an algorithm to measure the semantic integrity of key files that are essential for system startup and control programs based on national secret algorithms. The proposed algorithm uses a unique encryption method to protect key files from unauthorized access and tampering. To validate the effectiveness and applicability of the proposed algorithm, extensive tests were conducted. The test results show that the proposed algorithm is fast and efficient, making it suitable for measuring the integrity of industrial control devices. The development of this algorithm is a significant step towards securing industrial control devices.\",\"PeriodicalId\":201450,\"journal\":{\"name\":\"2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCWorkshops57813.2023.10233798\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCWorkshops57813.2023.10233798","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Semantic Integrity Measurement of Industrial Control Embedded Devices Based on National Secret Algorithm
In the age of 6G and AI, industrial control embedded devices can understand and follow instructions automatically. The key is to properly understand the meaning of tasks rather than just focusing on tiny details. Semantic communication will be widely used in industries. These industrial control embedded devices are crucial for controlling and monitoring industrial processes and any tampering with them could lead to disastrous consequences. Thus, it becomes increasingly important to protect the integrity of these devices semantically. However, existing research in this field either focuses on specific devices or fails to utilize national secret algorithms. To address this issue, we propose an algorithm to measure the semantic integrity of key files that are essential for system startup and control programs based on national secret algorithms. The proposed algorithm uses a unique encryption method to protect key files from unauthorized access and tampering. To validate the effectiveness and applicability of the proposed algorithm, extensive tests were conducted. The test results show that the proposed algorithm is fast and efficient, making it suitable for measuring the integrity of industrial control devices. The development of this algorithm is a significant step towards securing industrial control devices.