Online Distributed Schedule Randomization to Mitigate Timing Attacks in Industrial Control Systems

نویسندگان

چکیده

Industrial control systems (ICSs) consist of a large number applications that are associated with periodic real-time flows hard deadlines. To facilitate large-scale integration, remote and co-ordination, wireless sensor actuator networks (WSANs) form the main communication framework in most ICSs. Among existing WSAN protocols, WirelessHART is suitable protocol for The communications network time-division multiple access (TDMA) based. satisfy deadlines flows, schedule pre-computed. same repeated over every hyperperiod, i.e. , lowest common periods flows. However, malicious attacker can exploit repetitive behavior flow schedules to launch timing attacks, e.g., selective jamming attacks. mitigate we propose an online distributed randomization strategy randomizes time-slots at each device without violating deadlines, while ensuring closed-loop stability. increase extent further, reduce energy consumption system, incorporate period adaptation adjusts transmission depending on stability loops runtime. We use Kullback-Leibler divergence Prediction Probability slots as two metrics evaluate performance our proposed strategy. compare offline centralized Experimental results show generated by \(10\% \) - \(15\% more diverse \(5\% less predictable average compared when base keys vary between 4 6 12 32 respectively under all slot utilization (number occupied hyperperiod). On incorporating adaptation, reduces \(46\% power average.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

Algorithmic Attacks and Timing Leaks in Distributed Systems

An important class of remotely applicable security attacks concerns time. You can attack somebody by making their algorithms run in their worst-case behavior rather than common-case behavior. Likewise, the processing time can disclose a secret. If an attacker can observe the time it takes for somebody to process a request, an attacker may learn something about the internal state. The first part...

متن کامل

Run-Time Randomization to Mitigate Tampering

The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical ...

متن کامل

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Runtime and control-flow attacks (such as code injection or return-oriented programming) constitute one of the most severe threats to software programs. These attacks are prevalent and have been recently applied to smartphone applications as well, of which hundreds of thousands are downloaded by users every day. While a framework for control-flow integrity (CFI) enforcement, an approach to proh...

متن کامل

Formal Modelling of Industrial Distributed Control Systems

Industrial Process Measurement and Control Systems (IPMCS) are used in most of the industrial sectors to achieve production improvement, process optimisation and time and cost reduction. Integration, reuse, flexibility and optimisation are demanded to adapt to a rapidly changing and competitive market. There is also a growing requirement that all software tools that support the different phases...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions in Embedded Computing Systems

سال: 2023

ISSN: ['1539-9087', '1558-3465']

DOI: https://doi.org/10.1145/3624584