Visible to the public United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs

TitleUnited We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs
Publication TypeConference Paper
Year of Publication2019
AuthorsChatterjee, Urbi, Santikellur, Pranesh, Sadhukhan, Rajat, Govindan, Vidya, Mukhopadhyay, Debdeep, Chakraborty, Rajat Subhra
Conference Name2019 56th ACM/IEEE Design Automation Conference (DAC)
Date PublishedJune 2019
PublisherIEEE
ISBN Number978-1-4503-6725-7
Keywords(k, \$-threshold signature scheme, anomaly detection, BIOS Security, compromised state, control engineering computing, corrupted PLC, cyber security awareness week-2017 competition, digital signatures, electro-mechanical processes, finite state machine, finite state machines, group-signature, human factors, I-O Systems, i-o systems security, I/O pin configuration attack, input-output mechanism, IO pin configuration attack, l)-threshold signature scheme, Legacy PLC system, legacy PLCs, malicious code, malicious disruption, Malware, Metrics, OpenPLC software, particular state, Pins, PLCs, predefined states, programmable controllers, Protocols, Prototypes, pubcrawl, Pulse width modulation, pulse width modulation pins, PWM, Raspberry Pi, Registers, resilience, Resiliency, Scalability, security, signature shares, uncorrupted PLC
Abstract

This work proposes a scheme to detect, isolate and mitigate malicious disruption of electro-mechanical processes in legacy PLCs where each PLC works as a finite state machine (FSM) and goes through predefined states depending on the control flow of the programs and input-output mechanism. The scheme generates a group-signature for a particular state combining the signature shares from each of these PLCs using \$(k,\textbackslashtextbackslash l)\$-threshold signature scheme.If some of them are affected by the malicious code, signature can be verified by k out of l uncorrupted PLCs and can be used to detect the corrupted PLCs and the compromised state. We use OpenPLC software to simulate Legacy PLC system on Raspberry Pi and show I/O\$ pin configuration attack on digital and pulse width modulation (PWM) pins. We describe the protocol using a small prototype of five instances of legacy PLCs simultaneously running on OpenPLC software. We show that when our proposed protocol is deployed, the aforementioned attacks get successfully detected and the controller takes corrective measures. This work has been developed as a part of the problem statement given in the Cyber Security Awareness Week-2017 competition.

URLhttps://ieeexplore.ieee.org/document/8806979
Citation Keychatterjee_united_2019