使用物理设备指纹保护工业控制系统

Tsion Yimer, Md Tanvir Arafin, K. Kornegay
{"title":"使用物理设备指纹保护工业控制系统","authors":"Tsion Yimer, Md Tanvir Arafin, K. Kornegay","doi":"10.1109/IOTSMS52051.2020.9340160","DOIUrl":null,"url":null,"abstract":"The advent of the Internet-of-Things (IoT) has introduced new connectivity modalities, communication protocols, and optimized architectures to coordinate Things on a network. BACnet MS/TP is a protocol that has the potential to deliver a reliable IoT back-end for industrial systems. However, conventional security threats can severely affect trust between the nodes in the network, leading to critical infrastructure failures. Hence, we analyze the opportunities and challenges for hardware solutions in securing BACnet controllers in this work. First, we look into the security threats and develop practical attack models. Then, we demonstrate how we model clocks in the network for fingerprinting. Next, we propose a distributed security monitor for deployment across the BACnet MS/TP nodes. We also illustrate how clock fingerprinting data can enable the security monitor to prevent intrusion and tampering. Finally, we experimentally verify our attacker model, attack scenarios, and the effectiveness of hardware-oriented security solutions for intrusion prevention and tampering on an industrial standard BACnet MS/TP network.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Securing Industrial Control Systems Using Physical Device Fingerprinting\",\"authors\":\"Tsion Yimer, Md Tanvir Arafin, K. Kornegay\",\"doi\":\"10.1109/IOTSMS52051.2020.9340160\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The advent of the Internet-of-Things (IoT) has introduced new connectivity modalities, communication protocols, and optimized architectures to coordinate Things on a network. BACnet MS/TP is a protocol that has the potential to deliver a reliable IoT back-end for industrial systems. However, conventional security threats can severely affect trust between the nodes in the network, leading to critical infrastructure failures. Hence, we analyze the opportunities and challenges for hardware solutions in securing BACnet controllers in this work. First, we look into the security threats and develop practical attack models. Then, we demonstrate how we model clocks in the network for fingerprinting. Next, we propose a distributed security monitor for deployment across the BACnet MS/TP nodes. We also illustrate how clock fingerprinting data can enable the security monitor to prevent intrusion and tampering. Finally, we experimentally verify our attacker model, attack scenarios, and the effectiveness of hardware-oriented security solutions for intrusion prevention and tampering on an industrial standard BACnet MS/TP network.\",\"PeriodicalId\":147136,\"journal\":{\"name\":\"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)\",\"volume\":\"82 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IOTSMS52051.2020.9340160\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IOTSMS52051.2020.9340160","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

物联网(IoT)的出现引入了新的连接模式、通信协议和优化的架构来协调网络上的事物。BACnet MS/TP是一种有潜力为工业系统提供可靠的物联网后端协议。然而,传统的安全威胁会严重影响网络中节点之间的信任,导致关键的基础设施故障。因此,我们分析了在这项工作中保护BACnet控制器的硬件解决方案的机遇和挑战。首先,我们研究安全威胁并开发实用的攻击模型。然后,我们将演示如何在网络中建模用于指纹识别的时钟。接下来,我们提出一个分布式安全监视器,用于跨BACnet MS/TP节点的部署。我们还说明了时钟指纹数据如何使安全监视器能够防止入侵和篡改。最后,我们在工业标准BACnet MS/TP网络上实验验证了我们的攻击者模型、攻击场景以及面向硬件的入侵防御和篡改安全解决方案的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Securing Industrial Control Systems Using Physical Device Fingerprinting
The advent of the Internet-of-Things (IoT) has introduced new connectivity modalities, communication protocols, and optimized architectures to coordinate Things on a network. BACnet MS/TP is a protocol that has the potential to deliver a reliable IoT back-end for industrial systems. However, conventional security threats can severely affect trust between the nodes in the network, leading to critical infrastructure failures. Hence, we analyze the opportunities and challenges for hardware solutions in securing BACnet controllers in this work. First, we look into the security threats and develop practical attack models. Then, we demonstrate how we model clocks in the network for fingerprinting. Next, we propose a distributed security monitor for deployment across the BACnet MS/TP nodes. We also illustrate how clock fingerprinting data can enable the security monitor to prevent intrusion and tampering. Finally, we experimentally verify our attacker model, attack scenarios, and the effectiveness of hardware-oriented security solutions for intrusion prevention and tampering on an industrial standard BACnet MS/TP network.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Evaluation of Objective Function Descriptions And Optimization Methodologies For Task Allocation In A Dynamic Fog Environment A Data Generator for Cloud-Edge Vehicle Communication in Multi Domain Cellular Networks Methodological approach for creating an IoT manufacturing application IOTSMS 2020 Organizers and Sponsors BA-TLS: Blockchain Authentication for Transport Layer Security in Internet of Things
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1