Visible to the public Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate Sensors in CPS

TitleNoise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate Sensors in CPS
Publication TypeConference Paper
Year of Publication2018
AuthorsAhmed, Chuadhry Mujeeb, Zhou, Jianying, Mathur, Aditya P.
Conference NameProceedings of the 34th Annual Computer Security Applications Conference
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6569-7
Keywordsactuator security, Attacks on Sensors, authentication, composability, CPS/ICS Security, cyber physical systems, Device Fingerprinting, Human Behavior, Metrics, physical attacks, pubcrawl, Resiliency, security, sensor fingerprinting, Sensors and Actuators
AbstractA novel scheme is proposed to authenticate sensors and detect data integrity attacks in a Cyber Physical System (CPS). The proposed technique uses the hardware characteristics of a sensor and physics of a process to create unique patterns (herein termed as fingerprints) for each sensor. The sensor fingerprint is a function of sensor and process noise embedded in sensor measurements. Uniqueness in the noise appears due to manufacturing imperfections of a sensor and due to unique features of a physical process. To create a sensor's fingerprint a system-model based approach is used. A noise-based fingerprint is created during the normal operation of the system. It is shown that under data injection attacks on sensors, noise pattern deviations from the fingerprinted pattern enable the proposed scheme to detect attacks. Experiments are performed on a dataset from a real-world water treatment (SWaT) facility. A class of stealthy attacks is designed against the proposed scheme and extensive security analysis is carried out. Results show that a range of sensors can be uniquely identified with an accuracy as high as 98%. Extensive sensor identification experiments are carried out on a set of sensors in SWaT testbed. The proposed scheme is tested on a variety of attack scenarios from the reference literature which are detected with high accuracy
URLhttp://doi.acm.org/10.1145/3274694.3274748
DOI10.1145/3274694.3274748
Citation Keyahmed_noise_2018