Online Distributed Schedule Randomization to Mitigate Timing Attacks in Industrial Control Systems
نویسندگان
چکیده
Industrial control systems (ICSs) consist of a large number applications that are associated with periodic real-time flows hard deadlines. To facilitate large-scale integration, remote and co-ordination, wireless sensor actuator networks (WSANs) form the main communication framework in most ICSs. Among existing WSAN protocols, WirelessHART is suitable protocol for The communications network time-division multiple access (TDMA) based. satisfy deadlines flows, schedule pre-computed. same repeated over every hyperperiod, i.e. , lowest common periods flows. However, malicious attacker can exploit repetitive behavior flow schedules to launch timing attacks, e.g., selective jamming attacks. mitigate we propose an online distributed randomization strategy randomizes time-slots at each device without violating deadlines, while ensuring closed-loop stability. increase extent further, reduce energy consumption system, incorporate period adaptation adjusts transmission depending on stability loops runtime. We use Kullback-Leibler divergence Prediction Probability slots as two metrics evaluate performance our proposed strategy. compare offline centralized Experimental results show generated by \(10\% \) - \(15\% more diverse \(5\% less predictable average compared when base keys vary between 4 6 12 32 respectively under all slot utilization (number occupied hyperperiod). On incorporating adaptation, reduces \(46\% power average.
منابع مشابه
Improving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملAlgorithmic Attacks and Timing Leaks in Distributed Systems
An important class of remotely applicable security attacks concerns time. You can attack somebody by making their algorithms run in their worst-case behavior rather than common-case behavior. Likewise, the processing time can disclose a secret. If an attacker can observe the time it takes for somebody to process a request, an attacker may learn something about the internal state. The first part...
متن کاملRun-Time Randomization to Mitigate Tampering
The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical ...
متن کاملMoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
Runtime and control-flow attacks (such as code injection or return-oriented programming) constitute one of the most severe threats to software programs. These attacks are prevalent and have been recently applied to smartphone applications as well, of which hundreds of thousands are downloaded by users every day. While a framework for control-flow integrity (CFI) enforcement, an approach to proh...
متن کاملFormal Modelling of Industrial Distributed Control Systems
Industrial Process Measurement and Control Systems (IPMCS) are used in most of the industrial sectors to achieve production improvement, process optimisation and time and cost reduction. Integration, reuse, flexibility and optimisation are demanded to adapt to a rapidly changing and competitive market. There is also a growing requirement that all software tools that support the different phases...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions in Embedded Computing Systems
سال: 2023
ISSN: ['1539-9087', '1558-3465']
DOI: https://doi.org/10.1145/3624584