Model-Based Stealth Attack to Networked Control System Based on Real-Time Ethernet

In this article, industrial control systems include networked control systems (NCS), which use real-time Ethernet (RTE) protocols since many years, well before the time sensitive networking initiative debut. Today, ethernet-based control systems are used all across Industry 4.0, including in critica...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on industrial electronics (1982) 2021-08, Vol.68 (8), p.7672-7683
Hauptverfasser: Ferrari, Paolo, Sisinni, Emiliano, Bellagente, Paolo, Rinaldi, Stefano, Pasetti, Marco, de Sa, Alan Oliveira, Machado, Raphael C. S., Carmo, Luiz F. R. da C., Casimiro, Antonio
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In this article, industrial control systems include networked control systems (NCS), which use real-time Ethernet (RTE) protocols since many years, well before the time sensitive networking initiative debut. Today, ethernet-based control systems are used all across Industry 4.0, including in critical applications, allowing for straight integration with information technology layers. Even if it is known that current RTE protocols do not have strong authentication or ciphering options, it is still very challenging to perform undetected cyber-attacks to these protocols while the NSC is in operation, in particular because such attacks must comply with very strict and small temporal constraints. In this article, a model-based attack is proposed for service degradation of NCS. The attack is carried out in real-time and it can remain undetected for the entire plant life. The attack can be applied to any RTE protocols and, without loss of generality, a detailed analysis of stealth techniques is provided for a specific real use case based on PROFINET. The experimental results demonstrate the feasibility of the proposed attack and its high effectiveness. The article also points out some possible future investigation directions in order to mitigate the attack.
ISSN:0278-0046
1557-9948
1557-9948
DOI:10.1109/TIE.2020.3001850