A schedule randomization policy to mitigate timing attacks in WirelessHART networks

Industrial control systems consist of large-scale wireless sensor-actuator networks (WSAN) that control the physical plant. The communications between the sensors and the actuators need to be reliable and guaranteed within strict deadlines for safe operation of all the system components in industria...

Full description

Saved in:
Bibliographic Details
Main Authors: Samaddar, Ankita, Easwaran, Arvind, Tan, Rui
Other Authors: School of Computer Science and Engineering
Format: Article
Language:English
Published: 2022
Subjects:
Online Access:https://hdl.handle.net/10356/160961
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-160961
record_format dspace
spelling sg-ntu-dr.10356-1609612022-08-08T08:43:11Z A schedule randomization policy to mitigate timing attacks in WirelessHART networks Samaddar, Ankita Easwaran, Arvind Tan, Rui School of Computer Science and Engineering Engineering::Computer science and engineering Schedule Randomization Industrial control systems consist of large-scale wireless sensor-actuator networks (WSAN) that control the physical plant. The communications between the sensors and the actuators need to be reliable and guaranteed within strict deadlines for safe operation of all the system components in industrial setups. WirelessHART is the most suitable and widely adopted WSAN standard that serves as the medium of communication in industries. To satisfy deadlines of real-time flows in WirelessHART networks, the centralized network manager decides the communication schedule during network initialization. The same schedule repeats every hyperperiod. The repetitive nature of the communication slots over every hyperperiod makes the system vulnerable to timing attacks which can eventually disrupt the safety of the system. To mitigate such attacks, we propose SlotSwapper, a moving target defense mechanism that randomizes the communication slots over a hyperperiod schedule without violating the feasibility constraints of real-time flows in WirelessHART networks. We show that SlotSwapper is optimal for single-channel WirelessHART network with real-time harmonic flows. We extensively evaluated our algorithm with 4800 flow sets over 100 Tmote sky motes in Cooja simulator. We use Prediction Probability of slots of a schedule to measure the security provided by SlotSwapper. We use Kullback–Leibler divergence to measure the divergence of our solution w.r.t. a truly random solution. Nanyang Technological University National Research Foundation (NRF) This work was partially funded by the Delta-NTU Corporate Laboratory for Cyber-Physical Systems with funding support from Delta Electronics Inc. and the National Research Foundation (NRF), Singapore under the Corp Lab@University Scheme. 2022-08-08T08:43:11Z 2022-08-08T08:43:11Z 2020 Journal Article Samaddar, A., Easwaran, A. & Tan, R. (2020). A schedule randomization policy to mitigate timing attacks in WirelessHART networks. Real-Time Systems, 56(4), 452-489. https://dx.doi.org/10.1007/s11241-020-09354-z 0922-6443 https://hdl.handle.net/10356/160961 10.1007/s11241-020-09354-z 2-s2.0-85089964671 4 56 452 489 en Real-Time Systems © 2020 Springer Science+Business Media, LLC, part of Springer Nature. All rights reserved.
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
Schedule
Randomization
spellingShingle Engineering::Computer science and engineering
Schedule
Randomization
Samaddar, Ankita
Easwaran, Arvind
Tan, Rui
A schedule randomization policy to mitigate timing attacks in WirelessHART networks
description Industrial control systems consist of large-scale wireless sensor-actuator networks (WSAN) that control the physical plant. The communications between the sensors and the actuators need to be reliable and guaranteed within strict deadlines for safe operation of all the system components in industrial setups. WirelessHART is the most suitable and widely adopted WSAN standard that serves as the medium of communication in industries. To satisfy deadlines of real-time flows in WirelessHART networks, the centralized network manager decides the communication schedule during network initialization. The same schedule repeats every hyperperiod. The repetitive nature of the communication slots over every hyperperiod makes the system vulnerable to timing attacks which can eventually disrupt the safety of the system. To mitigate such attacks, we propose SlotSwapper, a moving target defense mechanism that randomizes the communication slots over a hyperperiod schedule without violating the feasibility constraints of real-time flows in WirelessHART networks. We show that SlotSwapper is optimal for single-channel WirelessHART network with real-time harmonic flows. We extensively evaluated our algorithm with 4800 flow sets over 100 Tmote sky motes in Cooja simulator. We use Prediction Probability of slots of a schedule to measure the security provided by SlotSwapper. We use Kullback–Leibler divergence to measure the divergence of our solution w.r.t. a truly random solution.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Samaddar, Ankita
Easwaran, Arvind
Tan, Rui
format Article
author Samaddar, Ankita
Easwaran, Arvind
Tan, Rui
author_sort Samaddar, Ankita
title A schedule randomization policy to mitigate timing attacks in WirelessHART networks
title_short A schedule randomization policy to mitigate timing attacks in WirelessHART networks
title_full A schedule randomization policy to mitigate timing attacks in WirelessHART networks
title_fullStr A schedule randomization policy to mitigate timing attacks in WirelessHART networks
title_full_unstemmed A schedule randomization policy to mitigate timing attacks in WirelessHART networks
title_sort schedule randomization policy to mitigate timing attacks in wirelesshart networks
publishDate 2022
url https://hdl.handle.net/10356/160961
_version_ 1743119482413383680