| Acknowledgements | 6 |
|---|
| Contents | 8 |
|---|
| About the Authors | 10 |
|---|
| Chapter 1: Introduction and Preview | 21 |
|---|
| 1.1 The Structure and Functions of an ICS | 22 |
| 1.1.1 Key Segments of an ICS | 22 |
| 1.1.2 Safety and Reliability in ICS | 24 |
| 1.1.3 Security of ICS Field Network Components | 27 |
| 1.2 Preview of this Book | 28 |
| References | 33 |
| Chapter 2: Components of Industrial Control Systems | 34 |
|---|
| 2.1 Introduction | 34 |
| 2.2 Industrial Control System Functional Components | 35 |
| 2.2.1 Programmable Logic Controller | 35 |
| 2.2.2 Remote Terminal Unit | 36 |
| 2.2.3 Intelligent Electronic Device | 38 |
| 2.2.4 Engineering Workstation | 39 |
| 2.2.5 Human Machine Interface | 39 |
| 2.2.6 Data Historian | 40 |
| 2.2.7 Communications Gateways | 41 |
| 2.2.8 Front End Processor | 41 |
| 2.2.9 ICS Field Devices | 41 |
| 2.3 Types of ICS | 43 |
| 2.3.1 Process Control System | 43 |
| 2.3.2 Safety Instrumented System | 43 |
| 2.3.3 Distributed Control System | 43 |
| 2.3.4 Building Automation System | 44 |
| 2.3.5 Supervisory Control and Data Acquisition | 45 |
| 2.3.6 Energy Management System | 46 |
| 2.3.7 Other Type of ICSs | 46 |
| References | 46 |
| Chapter 3: Wireless Infrastructure in Industrial Control Systems | 48 |
|---|
| 3.1 Introduction | 48 |
| 3.2 Wireless Technologies for ICSs | 49 |
| 3.2.1 WirelessHART | 50 |
| 3.2.2 ISA 100.11a Standard | 52 |
| 3.2.3 Z-Wave | 53 |
| 3.2.4 Zigbee | 53 |
| 3.2.5 Bluetooth | 54 |
| 3.2.6 Microwave | 54 |
| 3.2.7 Satellite | 55 |
| 3.3 Cyber and Physical Threats to Wireless ICSs | 55 |
| 3.3.1 Generic Threat Model | 55 |
| 3.3.2 Specific Threats for Wireless ICS Technologies | 56 |
| 3.3.3 Desired Security Mechanisms | 58 |
| 3.3.4 Additional Security Mechanisms | 61 |
| 3.4 Integration of Wireless Technologies to an Existing ICS Infrastructure: Smart Grid and Micro-Grid Case | 62 |
| 3.4.1 FIU Smart Grid Testbed | 62 |
| 3.4.2 Test Case: Handling Islanding Situation via Wireless Communication | 64 |
| 3.5 Summary and Conclusions | 66 |
| References | 66 |
| Chapter 4: Operational Technology and Information Technology in Industrial Control Systems | 69 |
|---|
| 4.1 Introduction | 69 |
| 4.2 Difference Between IT and OT | 70 |
| 4.2.1 Operational | 70 |
| 4.2.1.1 Operational Objectives | 71 |
| Safety | 71 |
| Environmental | 72 |
| Societal Dependencies | 72 |
| Physical Infrastructure | 73 |
| 4.2.1.2 High Availability Requirements | 73 |
| 4.2.1.3 Geographic Location | 74 |
| 4.2.2 Technological | 75 |
| 4.2.2.1 Limited Support for Security Mechanisms | 75 |
| 4.2.2.2 Embedded Systems | 75 |
| 4.2.2.3 Network Protocols | 76 |
| 4.2.2.4 Real-Time Performance | 77 |
| 4.2.2.5 Legacy and Esoteric Technologies | 78 |
| 4.2.2.6 Cyber-Physical Risk Analysis | 78 |
| 4.2.3 Managerial | 79 |
| 4.2.3.1 Long Lifecycle | 79 |
| 4.2.3.2 Financial Investments | 80 |
|
|