Tamper Event Detection on Distributed Devices in Critical Infrastructure
نویسندگان
چکیده
Utilities are currently installing a number of resource-constrained embedded devices at the remote endpoints of their SCADA (Supervisory Control and Data Acquisition) networks as part of their smart grid rollout. These devices present a security risk for utilities: They are deployed in many different places and environments; they have very little physical security; and they have direct access back to control centers and other infrastructure. Therefore, these devices present an easy opportunity for attackers to infiltrate and damage a utility’s SCADA network, and protecting these networks is critical. While a large body of work exists in both the physical tampering and SCADA protection spheres, current schemes cannot be applied here: They are either not designed to protect both a device and the network it lives on, not flexible enough to handle the various tamper events that these remote devices face, or not lightweight enough to operate under the inherent constraints of a SCADA network. In this paper, we introduce T.E.D.D.I. (Tamper Event Detection on Distributed Infrastructure), a distributed, sensor-based tamper protection architecture that we are building to protect remotely-deployed devices. This architecture will allow for a flexible, policy-centric response to tamper events, incorporate external context data into T.E.D.D.I.’s decision-making process, and adhere to the many constraints imposed on SCADA systems. We also discuss the current state of T.E.D.D.I., its various components, and our plans for constructing and validating the final system.
منابع مشابه
IOT: Using Channel State Information for Tamper Detection in the Internet of Things
The Internet of Things (IoT) is increasingly used for critical applications and securing the IoT has become a major concern. Among other issues it is important to ensure that tampering with IoT devices is detected. Many IoT devices use WiFi for communication and Channel State Information (CSI) based tamper detection is a valid option. Each 802.11n WiFi frame contains a preamble which allows a r...
متن کاملIslanding Detection Method of Distributed Generation Based on Wavenet
Due to the increasing need to distributed energy resources in power systems, their problems should be studied. One of the main problem of distributed energy resources is unplanned islanding. The unplanned islanding has some dangers to the power systems and the repairman which are works with the incorrect devices. In this paper, a passive local method is proposed. The proposed method is based on...
متن کاملBandwidth Efficient Tamper Detection for Distributed Java Systems
The benefits of distributed computation present complex security considerations beyond those associated with the traditional computing paradigm. This paper describes a bandwidth efficient approach to authenticate distributed Java code. Our system utilizes steganographic techniques to embed a cryptographic checksum as a tamper detection mark into Java class files. The properties of this mark mak...
متن کاملLimitations Regarding Certificate Handling on Smart Cards
A public-key infrastructure (PKI) typically requires use of tamper-proof devices that can perform crypto computations and store highly sensitive data like private keys. Smart cards are the low cost devices that satisfy these requirements and, as a result, they can boost the wide deployment of a PKI. Yet certain limitations exist regarding the handling of certificates, one of the supporting mech...
متن کاملVoltage Sag in Distribution Systems- A review and comparative study (Reasons, Characteristics, Compensations and Detection)
By quick technological advancements in industrial control processes, major industries demand higher power quality. According to IEEE 1159-1995 standard, any problems in voltage, current or frequency that lead to the error or malfunctions in electrical equipment are considered as a power quality problem. Among the power quality phenomena, voltage sag has been an important problem for power sys...
متن کامل