Message Authentication and Provenance Verification for Industrial Control Systems

Author:

Esiner Ertem1ORCID,Tefek Utku1ORCID,Mashima Daisuke1ORCID,Chen Binbin2ORCID,Kalbarczyk Zbigniew3ORCID,Nicol David M.3ORCID

Affiliation:

1. Advanced Digital Sciences Center, Singapore

2. Singapore University of Technology and Design, Singapore

3. University of Illinois Urbana Champaign, USA

Abstract

Successful attacks against industrial control systems (ICSs) often exploit insufficient checking mechanisms. While firewalls, intrusion detection systems, and similar appliances introduce essential checks, their efficacy depends on the attackers’ ability to bypass such middleboxes. We propose a provenance solution to enable the verification of an end-to-end message delivery path and the actions performed on a message. Fast and flexible provenance verification (F2-Pro) provides cryptographically verifiable evidence that a message has originated from a legitimate source and gone through the necessary checks before reaching its destination. F2-Prorelies on lightweight cryptographic primitives and flexibly supports various communication settings and protocols encountered in ICS thanks to its transparent, bump-in-the-wire design. We provide formal definitions and cryptographically prove F2-Pro’s security. For human interaction with ICS via a field service device, F2-Profeatures a multi-factor authentication mechanism that starts the provenance chain from a human user issuing commands. We compatibility tested F2-Proon a smart power grid testbed and reported a sub-millisecond latency overhead per communication hop using a modest ARM Cortex-A15 processor.

Publisher

Association for Computing Machinery (ACM)

Subject

Artificial Intelligence,Control and Optimization,Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction

Reference65 articles.

1. Ertem Esiner, Daisuke Mashima, Binbin Chen, Zbigniew Kalbarczyk, and David Nicol. 2019. F-Pro: A fast and flexible provenance-aware message authentication scheme for smart grid. In 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’19). IEEE, 1–7.

2. Symantec Security Response. 2014. ShellShock: All you need to know about the Bash Bug vulnerability. Retrieved June 8 2018 from https://www.symantec.com/connect/blogs/shellshock-all-you-need-know-about-bash-bug-vulnerability

3. Kim Zetter. 2016. Inside the Cunning Unprecedented Hack of Ukraine’s Power Grid. http://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/

4. The provenance of electronic data

5. Utku Tefek, Ertem Esiner, Daisuke Mashima, and Yih-Chun Hu. 2022. Analysis of message authentication solutions for IEC 61850 in substation automation systems. (Accepted for publication). In IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’22). 1–7.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3