NoiSense Print : detecting data integrity attacks on sensor measurements using hardware-based fingerprints

Ahmed, Chuadhry Mujeeb and Mathur, Aditya P. and Ochoa, Martín (2020) NoiSense Print : detecting data integrity attacks on sensor measurements using hardware-based fingerprints. ACM Transactions on Privacy and Security, 24 (1). 2. ISSN 2471-2566

[thumbnail of Ahmed-etal-ACM-TOPS-2020-NoiSense-Print-detecting-data-integrity-attacks-on-sensor-measurements]
Text (Ahmed-etal-ACM-TOPS-2020-NoiSense-Print-detecting-data-integrity-attacks-on-sensor-measurements)
Accepted Author Manuscript

Download (889kB)| Preview


    Fingerprinting of various physical and logical devices has been proposed for uniquely identifying users or devices of mainstream IT systems such as PCs, laptops, and smart phones. However, the application of such techniques in Industrial Control Systems (ICS) is less explored for reasons such as a lack of direct access to such systems and the cost of faithfully reproducing realistic threat scenarios. This work addresses the feasibility of using fingerprinting techniques in the context of realistic ICS related to water treatment and distribution systems. A model-free sensor fingerprinting scheme (NoiSense) and a model-based sensor fingerprinting scheme (NoisePrint) are proposed. Using extensive experimentation with sensors, it is shown that noise patterns due to microscopic imperfections in hardware manufacturing can uniquely identify sensors with accuracy as high as 97%. The proposed technique can be used to detect physical attacks, such as the replacement of legitimate sensors by faulty or manipulated sensors. For NoisePrint, a combined fingerprint for sensor and process noise is created. The difference (called residual), between expected and observed values, i.e., noise, is used to derive a model of the system. It was found that in steady state the residual vector is a function of process and sensor noise. Data from experiments reveals that a multitude of sensors can be uniquely identified with a minimum accuracy of 90% based on NoisePrint. Also proposed is a novel challenge-response protocol that exposes more powerful cyber-attacks, including replay attacks.