Replay-Attack Detection and Prevention Mechanism in Industry 4.0 Landscape for Secure SECS/GEM Communications

被引:25
作者
Al-Shareeda, Mahmood A. A. [1 ]
Manickam, Selvakumar [1 ]
Laghari, Shams A. A. [1 ]
Jaisan, Ashish [1 ]
机构
[1] Univ Sains Malaysia, Natl Adv Ctr IPv6 NAv6, Gelugor 11800, Penang, Malaysia
关键词
SECS; GEM communications; Industry; 4; 0; landscape; replay attack; detection and prevention mechanism; CERTIFICATELESS SIGNATURE SCHEME; SERVICE ATTACK;
D O I
10.3390/su142315900
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Starting from the First Industrial Revolution to the current and Fourth Industrial Revolution (or Industry 4.0), various industrial machines are present in the market and manufacturing companies. As standardized protocols have become increasingly popular, more utilities are switching to Internet Protocol (IP)-based systems for wide-area communication. SECS/GEM is one of the standards that permit industries to collect information directly from the machines, either using RS323 or TCP/IP communication. TCP/IP communication is becoming more critical than ever, especially given our accelerated digital transformation and increasing reliance on communication technologies. The growth of IT is accelerating with cyberthreats as well. In contrast, security features in the SECS/GEM protocol may be neglected by some companies as it is only used in factories and not mostly used in the outside world. However, communication of SECS/GEM is highly susceptible to various cyberattacks. This paper analyzes the potential replay-attack cyberattacks that can occur on a SECS/GEM system. In replay attacks, this paper supposes an adversary that wants to damage an operation-based control system in an ongoing condition. The adversary has the ability to capture messages to watch and record their contents for a predetermined amount of time, record them, and then replay them while attacking in order to inject an exogenous control input undetected. The paper's objectives are to prove that SECS/GEM communication is vulnerable to cyberattack and design a detection mechanism to protect SECS/GEM communications from replay attacks. The methodology implements a simulation of the replay-attack mechanism on SECS/GEM communication. The results indicate that the design mechanism detected replay attacks against SECS/GEM communications and successfully prevented them.
引用
收藏
页数:15
相关论文
共 44 条
  • [31] Patel Chintan, 2020, Procedia Computer Science, V171, P1399, DOI 10.1016/j.procs.2020.04.150
  • [32] Prasad R., 2020, CYBER SECURITY LIFEL, P125, DOI [10.1007/978-3-030-31703-4_9, DOI 10.1007/978-3-030-31703-4_9]
  • [33] OPC UA versus ROS, DDS, and MQTT: Performance Evaluation of Industry 4.0 Protocols
    Profanter, Stefan
    Tekat, Ayhun
    Dorofeev, Kirill
    Rickert, Markus
    Knoll, Alois
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 955 - 962
  • [34] Semantic Interconnection Scheme for Industrial Wireless Sensor Networks and Industrial Internet with OPC UA Pub/Sub
    Pu, Chenggen
    Ding, Xiwu
    Wang, Ping
    Xie, Shunji
    Chen, Junhua
    [J]. SENSORS, 2022, 22 (20)
  • [35] Rahmandita A, 2018, INT CONF ICT SMART S, P1
  • [36] Security Analysis of the MQTT-SN Protocol for the Internet of Things
    Roldan-Gomez, Jose
    Carrillo-Mondejar, Javier
    Castelo Gomez, Juan Manuel
    Ruiz-Villafranca, Sergio
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [37] Rubow B., 2017, SECS GEM SECS GEM FE
  • [38] Analysis of a denial of service attack on TCP
    Schuba, CL
    Krsul, IV
    Kuhn, MG
    Spafford, EH
    Sundaram, A
    Zamboni, D
    [J]. 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 208 - 223
  • [39] Authentication of IoT Device and IoT Server Using Secure Vaults
    Shah, Trusit
    Venkatesan, S.
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 819 - 824
  • [40] Stoop Fabian, 2019, International Journal of Mechatronics and Manufacturing Systems, V12, P344