Wireless communications at the model steel mill were provided by a small base station

Explore discuss data innovations to drive business efficiency forward.
Post Reply
rakhirhif8963
Posts: 533
Joined: Mon Dec 23, 2024 3:15 am

Wireless communications at the model steel mill were provided by a small base station

Post by rakhirhif8963 »

Enterprise network configuration
The industrial network architecture for the study was built on the basis of the fairly common Purdue model. A distinctive feature of our configuration was the internal MQTT server, which ensures the interaction of Industrial Internet of Things (IIoT) devices. In the near future, MQTT servers will become a mandatory component of industrial IoT gateways, which means that their weak points can be used by attackers to carry out attacks.

To audit the communication exchange between IIoT devices, a second, external MQTT server was included in the network, which saved information received from the internal server to the cloud.

To control the plant equipment, programmable latvia mobile database controllers (PLCs) were used, the data from which was transmitted to a control computer accessible via RDP or VNC.


Steel Mill Network Diagram
Steel Mill Network Diagram
Steel Mill Plant
A steel plant control system must control many different factors such as temperature, air flow and pressure in the furnaces, the composition of the ingredients needed to produce different alloys, etc.

Data from thermocouples, oxygen analyzers, and pressure sensors is fed to a PLC, which can control temperature, air flow, and pressure. The PLC transmits the received data to a control computer, whose operator monitors the state of the steelmaking complex.

If any of these values ​​are tampered with, especially the PLC values, the alloy may be ruined.

Possible attack vectors
The plant's campus network consists of various components, each of which can be attacked by potential attackers. To penetrate the core network, they will have to find a vulnerable device on which they can gain a foothold in order to intercept traffic and perform malicious actions.
Post Reply