A Novel Asset Authentication Scheme for Cyber Physical Systems

被引:0
作者
Vuppala, Satyanarayana [1 ]
Mady, Alie El-Din [1 ]
Mehta, Deepak [1 ]
机构
[1] United Technol Res Ctr, Cork, Ireland
来源
2019 GLOBAL IOT SUMMIT (GIOTS) | 2019年
基金
欧盟地平线“2020”;
关键词
Authentication; cyber-physical system; environment; fingerprints;
D O I
10.1109/giots.2019.8766413
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cyber physical assets are being widely deployed. An asset could be a device or object in Cyber physical system (CPS). Many of them are subjected to compromise due to insecure implementations and configuration. Existing authentication techniques are not effective in detecting compromised assets given the massive scale of deployment. In this paper, we present a system for detecting compromised CPS assets effectively. In contrast to prior work, we propose an asset authentication framework that uses device-specific and network information with weight vectors, called slanted fingerprints, to validate assets. In particular, we perform asset fingerprinting with environmental effects to detect the cyber-physical emulation attacks on authentication. The framework tracks the effect of changes in the physical environment on fingerprints and uses unique CPS environmental effects features to detect both cyber-physical emulation and advanced stealthy attacks.
引用
收藏
页数:5
相关论文
共 14 条
  • [1] Dabbagh Y. S., 2018, ARXIV180500969
  • [2] TOWARD MASSIVE MACHINE TYPE CELLULAR COMM UNICATIONS
    Dawy, Zaher
    Saad, Walid
    Ghosh, Arunabha
    Andrews, Jeffrey G.
    Yaacoub, Elias
    [J]. IEEE WIRELESS COMMUNICATIONS, 2017, 24 (01) : 120 - 128
  • [3] Edwards S., 2016, TECH REP RAPIDITY NE
  • [4] Haider S., 2015, CIRCUIT CELLAR M MAR
  • [5] DIVERGENCE AND BHATTACHARYYA DISTANCE MEASURES IN SIGNAL SELECTION
    KAILATH, T
    [J]. IEEE TRANSACTIONS ON COMMUNICATION TECHNOLOGY, 1967, CO15 (01): : 52 - &
  • [6] Matrix Completion From a Few Entries
    Keshavan, Raghunandan H.
    Montanari, Andrea
    Oh, Sewoong
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (06) : 2980 - 2998
  • [7] Remote physical device fingerprinting
    Kohno, T
    Broido, A
    Claffy, KC
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (02) : 93 - 108
  • [8] DDoS in the IoT: Mirai and Other Botnets
    Kolias, Constantinos
    Kambourakis, Georgios
    Stavrou, Angelos
    Voas, Jeffrey
    [J]. COMPUTER, 2017, 50 (07) : 80 - 84
  • [9] Mady A., 2016, IEEE 3 WORLD FOR INT, P1
  • [10] Mehta D., P 10 INT C ADV CIRC