Chaotic Encryption Applied to Optical Ethernet in Industrial Control Systems

In the past decades, Ethernet has become an alternative technology for the field buses traditionally used in industrial control systems and distributed measurement systems. Among different transmission media in Ethernet standards, optical fiber provides the best bandwidth, excellent immunity to electromagnetic interference, and less signal loses than other wired media. Due to the absence of a standard that provides security at the physical layer of optical Ethernet links, the main motivation of this paper is to propose and implement the necessary modifications to introduce encryption in Ethernet 1000Base-X standard. This has consisted of symmetric streaming encryption of the 8b10b symbols flow at physical coding sublayer level, thanks to a keystream generator based on chaotic algorithm. The overall system has been implemented and tested in an field programmable gate array and Ethernet traffic has been encrypted and transmitted over an optical link. The experimental results show that it is possible to cipher traffic at this level and hide the complete Ethernet traffic pattern from passive eavesdroppers. In addition, no space overhead is introduced in data frames during encryption, achieving the maximum throughput.

[1]  Gaurav Bhatnagar,et al.  Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission , 2012, IEEE Transactions on Instrumentation and Measurement.

[2]  Hejiao Huang,et al.  2D Logistic-Sine-coupling map for image encryption , 2018, Signal Process..

[3]  Cuauhtemoc Mancillas-López,et al.  Hardware implementation of pseudo-random number generators based on chaotic maps , 2017 .

[4]  Carlos Sánchez-Azqueta,et al.  Physical Layer Encryption for Industrial Ethernet in Gigabit Optical Links , 2019, IEEE Transactions on Industrial Electronics.

[5]  Laurent Larger,et al.  Synchronisation and communication with regularly clocked optoelectronic discrete time chaos , 2008 .

[6]  Carlos Sánchez-Azqueta,et al.  Using a Chaotic Cipher to Encrypt Ethernet Traffic , 2018, 2018 IEEE International Symposium on Circuits and Systems (ISCAS).

[7]  Daniele Marioli,et al.  A New Instrument for Real-Time Ethernet Performance Measurement , 2008, IEEE Transactions on Instrumentation and Measurement.

[8]  Joseph Zambreno,et al.  A chaotic encryption scheme for real-time embedded systems: design and implementation , 2013, Telecommun. Syst..

[9]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[10]  Tsutomu Sasao,et al.  Fast Hardware Computation of x Mod z , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.

[11]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[12]  Carlos Sánchez-Azqueta,et al.  Fast and secure chaotic stream cipher with a MEMS-based seed generator , 2017, 2017 IEEE International Instrumentation and Measurement Technology Conference (I2MTC).

[13]  Carlos Sánchez-Azqueta,et al.  Application of a MEMS-Based TRNG in a Chaotic Stream Cipher , 2017, Sensors.

[14]  Matthew J. B. Robshaw,et al.  New Stream Cipher Designs: The eSTREAM Finalists , 2008 .

[15]  Jean-Dominique Decotignie,et al.  Ethernet-Based Real-Time and Industrial Communications , 2005, Proceedings of the IEEE.

[16]  Mohamed Hamdi,et al.  A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system , 2018, 2018 International Conference on Advanced Communication Technologies and Networking (CommNet).

[17]  J. Hizanidis,et al.  Enhancement of Chaos Encryption Potential by Combining All-Optical and Electrooptical Chaos Generators , 2010, IEEE Journal of Quantum Electronics.

[18]  Gerhard P. Hancke,et al.  Secure Internet access to gateway using secure socket layer , 2006, IEEE Transactions on Instrumentation and Measurement.

[19]  Habib Fathallah,et al.  Optical fiber tapping: Methods and precautions , 2011, 8th International Conference on High-capacity Optical Networks and Emerging Technologies.

[20]  P. Dabal,et al.  FPGA implementation of chaotic pseudo-random bit generators , 2012, Proceedings of the 19th International Conference Mixed Design of Integrated Circuits and Systems - MIXDES 2012.

[21]  Thilo Sauter,et al.  How to Access Factory Floor Information Using Internet Technologies and Gateways , 2011, IEEE Transactions on Industrial Informatics.

[22]  John Kelsey,et al.  Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .

[23]  Elaine B. Barker,et al.  Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .

[24]  Lena Wosinska,et al.  Vulnerabilities and security issues in optical networks , 2014, 2014 16th International Conference on Transparent Optical Networks (ICTON).

[25]  W. Kastner,et al.  The Evolution of Factory and Building Automation , 2011, IEEE Industrial Electronics Magazine.

[26]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[27]  Lihua Xie,et al.  Network delay analysis of EtherCAT and PROFINET IRT protocols , 2014, IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society.

[28]  Yicong Zhou,et al.  Medical image encryption using high-speed scrambling and pixel adaptive diffusion , 2018, Signal Process..

[29]  Alan V. Oppenheim,et al.  Circuit implementation of synchronized chaos with applications to communications. , 1993, Physical review letters.

[30]  Zsigmond Szilárd,et al.  Physical-layer security in evolving optical networks , 2016, IEEE Communications Magazine.

[31]  Tommaso Addabbo,et al.  Digitized Chaos for Pseudo-random Number Generation in Cryptography , 2011, Chaos-Based Cryptography.

[32]  A. Dandache,et al.  Real-time FPGA implementation of Lorenz's chaotic generator for ciphering telecommunications , 2009, 2009 Joint IEEE North-East Workshop on Circuits and Systems and TAISA Conference.

[33]  Jesus Lazaro,et al.  MACsec Layer 2 Security in HSR Rings in Substation Automation Systems , 2017 .

[34]  Dezheng Zhang,et al.  Cryptanalysis of Chaos-Based Cryptosystem from the Hardware Perspective , 2018, Int. J. Bifurc. Chaos.