Message Authentication and Provenance Verification for Industrial Control Systems

نویسندگان

چکیده

Successful attacks against industrial control systems (ICS) often exploit insufficient checking mechanisms. While firewalls, intrusion detection systems, and similar appliances introduce essential checks, their efficacy depends on the attackers’ ability to bypass such middleboxes. We propose a provenance solution enable verification of end-to-end message delivery path actions performed message. Fast flexible (F2-Pro) provides cryptographically verifiable evidence that has originated from legitimate source gone through necessary checks before reaching its destination. F2-Pro relies lightweight cryptographic primitives flexibly supports various communication settings protocols encountered in ICS thanks transparent, bump-in-the-wire design. provide formal definitions prove ’s security. For human interaction with via field service device, features multi-factor authentication mechanism starts chain user issuing commands. compatibility tested smart power grid testbed reported sub-millisecond latency overhead per hop using modest ARM Cortex-A15 processor.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Static Provenance Verification for Message Passing Programs

Provenance information records the source and ownership history of an object. We study the problem of provenance tracking in concurrent programs, in which several principals execute concurrent processes and exchange messages over unbounded but unordered channels. The provenance of a message, roughly, is a function of the sequence of principals that have transmitted the message in the past. The ...

متن کامل

Modular Verification of Function Block Based Industrial Control Systems

IEC 61131-3, the world-wide standard for industrial control programming, is increasingly being used in safety-related control applications. Control loops are built from components taken from domain-specific function block libraries. Code inspection and testing are the two predominant quality assurance techniques. For highly dependable control applications, however, these techniques are not suff...

متن کامل

Automated Verification of Function Block Based Industrial Control Systems

7 Abstract The international standard IEC 61131-3, which supports Brad Cox' concept of " Software-ICs " 9 for industrial control programming, is increasingly being used in safety-related application domains. They include safety-instrumented functions, such as burner management, emergency shut-11 down and gas leak detection, but also complex automation processes controlling, e.g., chemical produ...

متن کامل

Enhanced Automated Teller Machine Using Short Message Service Authentication Verification

The use of Automated Teller Machine (ATM) has become an important tool among commercial banks, customers of banks have come to depend on and trust the ATM conveniently meet their banking needs. Although the overwhelming advantages of ATM cannot be over-emphasized, its alarming fraud rate has become a bottleneck in it’s full adoption in Nigeria. This study examined the menace of ATM in the socie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Cyber-Physical Systems

سال: 2023

ISSN: ['2378-962X', '2378-9638']

DOI: https://doi.org/10.1145/3607194