kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security Analysis of a Beckhoff CX-9020 Programmable Logic Controller
KTH, School of Electrical Engineering and Computer Science (EECS).
2021 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

While ICS units like PLCs and RTUs have been around a long time, introducing them into new environments like smart cities solutions, introduces new challenges unique to those environments. The devices are continuously gathering sensor data such as temperature and pressure, to make decisions on how to control different units, as well as sending the data to a central system that can monitor all buildings. This report has evaluated an implementation of a Beckhoff CX-9020 PLC and a web- port SCADA system. The evaluation was performed using a method with a focus on IoT implementations. No new vulnerabilities were reported, but previously discovered vulnerabilities, and problems with the device’s security configurations were found to be present. It was concluded that most of the vulnerabilities could be fixed by either keeping the devices up to date or making sure the correct configurations are used. 

Abstract [sv]

Medans ICS enheter som PLCer och RTUer har använts länge, när man introducera dem till nya miljöer som smarta städer, så uppstår nya utmaningar unika till de miljöerna. Enheterna samlar kontinuerligt sensor data som temperatur och tryck, som används för att bestämma beteendet av andra enheter, samt skicka data till ett centralt system som övervakar alla byggnader. Den här rapporten har evaluerat en implementation av en Beckhoff CX-9020 PLC och ett webport SCADA system. Evalueringen utfördes med en metod som fokuserar på IoT implementationer. Inga nya svagheter rapporterades, men tidigare funna svagheter, och problem med enheternas säkerhets konfigurationer hittades. Slutsatsen var att många av systemets svagheter kunde lösas genom att antingen hålla systemet uppdaterat eller se till att allt var korrekt konfigurerat.

Place, publisher, year, edition, pages
2021. , p. 48
Series
TRITA-EECS-EX ; 2021:557
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:kth:diva-303563OAI: oai:DiVA.org:kth-303563DiVA, id: diva2:1603740
Subject / course
Computer Science
Educational program
Master of Science - Computer Science
Supervisors
Examiners
Available from: 2021-10-19 Created: 2021-10-18 Last updated: 2022-06-25Bibliographically approved

Open Access in DiVA

fulltext(1661 kB)942 downloads
File information
File name FULLTEXT01.pdfFile size 1661 kBChecksum SHA-512
5fcc2cc88ce528df7dd5957e56812d311ac4de13c71255681034d8e75d5861f0a3d1217b983bec05f327bb85abf5d065bdf0b4202dcf57f29f4a7dd08c24d2ef
Type fulltextMimetype application/pdf

By organisation
School of Electrical Engineering and Computer Science (EECS)
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 942 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 861 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf