Design and implementation of cybersecurity testbed for industrial IoT systems

In the era of Industry 4.0, information and communication technology (ICT) has been applied to various critical infrastructures, such as power plants, smart factories, and financial networks, to ensure and automate industrial systems. In particular, in the field of power control systems, ICT technology such as industrial internet of things (IoT) is applied for efficient remote measurement. Therefore, legacy systems that were previously operated as standalone now have contact points with the external networks. In this trend, security vulnerabilities from legacy ICT have been inherited by power control systems. Therefore, various security technologies are being researched and developed to cope with cyber vulnerabilities and threats. However, it is risky to apply novel security technologies that are not verified as secure, to power control systems, the availability of which must be guaranteed to provide electricity consistently. Thus, verifying the effectiveness and stability of new security technologies is necessary to apply the technologies to power control systems. In this paper, we analyze the configuration and characteristics of the power control systems network, which is an area where industrial IoT technology is applied. We also build a testbed environment that can verify the security technology and conduct experiments to confirm the security technology for the power control system and the suitability of the testbed. The proposed testbed will be able to stably incorporate new security technologies into the critical industrial infrastructure. Further, it is also expected that the security and stability of the system will be enhanced.

[1]  Tapio Frantti,et al.  Situational Awareness for security adaptation in Industrial Control Systems , 2015, 2015 Seventh International Conference on Ubiquitous and Future Networks.

[2]  Nishant Kumar,et al.  Review on security and privacy concerns in Internet of Things , 2017, 2017 International Conference on IoT and Application (ICIOT).

[3]  Dayne Robinson,et al.  A cyber-defensive industrial control system with redundancy and intrusion detection , 2017, 2017 North American Power Symposium (NAPS).

[4]  Jacek Jarmakiewicz,et al.  Development of cyber security testbed for critical infrastructure , 2015, 2015 International Conference on Military Communications and Information Systems (ICMCIS).

[5]  Dongho Kang,et al.  A design of unidirectional security gateway for enforcement reliability and security of transmission data in industrial control systems , 2016, 2016 18th International Conference on Advanced Communication Technology (ICACT).

[6]  Victor A. Skormin,et al.  ICS security testbed with delay attack case study , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[7]  G. Manimaran,et al.  Detection of cyber intrusions using network-based multicast messages for substation automation , 2014, ISGT 2014.

[8]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[9]  Taeshik Shon,et al.  Grammar-based adaptive fuzzing: Evaluation on SCADA modbus protocol , 2016, 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[10]  Salim Hariri,et al.  A testbed for analyzing security of SCADA control systems (TASSCS) , 2011, ISGT 2011.

[11]  Wei Gao,et al.  On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.

[12]  Ahmed Serhrouchni,et al.  Taxonomy of attacks on industrial control protocols , 2015, 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS).

[13]  Stamatis Karnouskos,et al.  Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[14]  Md Zakirul Alam Bhuiyan,et al.  Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments , 2018, IEEE Internet of Things Journal.

[15]  Seokjun Lee,et al.  Packet Diversity-Based Anomaly Detection System with OCSVM and Representative Model , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[16]  Jongwan Kim,et al.  User privacy-enhanced security architecture for home area network of Smartgrid , 2016, Multimedia Tools and Applications.

[17]  Mohamed Wahbi,et al.  Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges , 2016, 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS).

[18]  Sungho Jeon,et al.  Burst-based Anomaly Detection on the DNP3 Protocol ⁄ , 2013 .

[19]  Taeshik Shon,et al.  Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture , 2016, Future Gener. Comput. Syst..

[20]  Aiko Pras,et al.  Towards periodicity based anomaly detection in SCADA networks , 2012, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012).

[21]  Zia Saquib,et al.  A testbed for SCADA cyber security and intrusion detection , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).

[22]  Matthias Niedermaier,et al.  PropFuzz — An IT-security fuzzing framework for proprietary ICS protocols , 2017, 2017 International Conference on Applied Electronics (AE).

[23]  Mercy Bere,et al.  Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS) , 2015, 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC).