A Reflection-Based Channel Fingerprint to Locate Physically Intrusive Devices in ICS
Pengfei Liu,Yang Liu,Xiangming Wang,Yuanyi Bao,Dong Yang,Wenqing Wang,Tong Wu,Zhuo Lv,Ting Liu
DOI: https://doi.org/10.1109/tii.2022.3198676
IF: 12.3
2023-03-29
IEEE Transactions on Industrial Informatics
Abstract:It is hard to conduct cyberattacks in industrial control systems (ICSs) because most underlying networks of ICS like the field bus network are isolated from the internet. However, attackers can physically connect the intrusive device into the target network to launch various attacks, which bypasses the security protection mechanisms between the ICS and the internet. Currently, no effective measures could defend against such unauthorized physical access attacks. In this article, a reflection-based channel fingerprint is proposed to detect and locate these physically intrusive devices in the field bus network. We theoretically analyze the signal reflection characteristics and utilize inevitable changes in the channel fingerprint to detect the intrusive device. Besides, the detected anomaly features could be used to accurately estimate the intrusive device's location. In the end, the proposed method's effectiveness is validated through extensive simulation experiments.
automation & control systems,computer science, interdisciplinary applications,engineering, industrial