使用独特的本地属性指纹,确保工业自动化和控制系统中WirelessHART设备的使用寿命

IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Matthew J. Maier , Hunter S. Hayden , Michael A. Temple , Matthew C. Fickus
{"title":"使用独特的本地属性指纹,确保工业自动化和控制系统中WirelessHART设备的使用寿命","authors":"Matthew J. Maier ,&nbsp;Hunter S. Hayden ,&nbsp;Michael A. Temple ,&nbsp;Matthew C. Fickus","doi":"10.1016/j.ijcip.2023.100641","DOIUrl":null,"url":null,"abstract":"<div><p><span>Distinct native attribute fingerprinting is considered as a means to ensure the longevity of WirelessHART communication devices used in industrial automation and control systems. The aim is for these devices to reach full life expectancy using a technical cradle-to-grave lifecycle protection strategy. The protection addressed here includes pre-deployment near-cradle counterfeit device detection using active fingerprinting<span> and operational mid-life rogue device detection using passive fingerprinting. The counterfeit and rogue device detection rates are estimated for 56 five-class </span></span>multiple discriminant analysis<span> models. Detection demonstrations include using three non-modeled devices to complete a total of 3 × 5 × 56 = 840 individual rogue and counterfeit device identity (ID) verification demonstrations. The device ID verification process uses binary accept/reject decisions with false positive outcomes used to estimate rogue and counterfeit device detection rates. For device ID verification using active fingerprints, the demonstrated counterfeit detection rate approached 99 % using only 15-of-99 available features—an approximate 85 % dimensional-reduction. Device ID verification using passive fingerprints was more challenging and the rogue detection rate approached 94 % using 120-of-243 available features—an approximate 50 % dimensional-reduction.. Collectively, the dimensionally-reduced implementations support efficiency improvement objectives required for providing near-cradle counterfeit device and mid-life operational rogue device detection in critical industrial automation and control systems.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"43 ","pages":"Article 100641"},"PeriodicalIF":4.1000,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Ensuring the longevity of WirelessHART devices in industrial automation and control systems using distinct native attribute fingerprinting\",\"authors\":\"Matthew J. Maier ,&nbsp;Hunter S. Hayden ,&nbsp;Michael A. Temple ,&nbsp;Matthew C. Fickus\",\"doi\":\"10.1016/j.ijcip.2023.100641\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p><span>Distinct native attribute fingerprinting is considered as a means to ensure the longevity of WirelessHART communication devices used in industrial automation and control systems. The aim is for these devices to reach full life expectancy using a technical cradle-to-grave lifecycle protection strategy. The protection addressed here includes pre-deployment near-cradle counterfeit device detection using active fingerprinting<span> and operational mid-life rogue device detection using passive fingerprinting. The counterfeit and rogue device detection rates are estimated for 56 five-class </span></span>multiple discriminant analysis<span> models. Detection demonstrations include using three non-modeled devices to complete a total of 3 × 5 × 56 = 840 individual rogue and counterfeit device identity (ID) verification demonstrations. The device ID verification process uses binary accept/reject decisions with false positive outcomes used to estimate rogue and counterfeit device detection rates. For device ID verification using active fingerprints, the demonstrated counterfeit detection rate approached 99 % using only 15-of-99 available features—an approximate 85 % dimensional-reduction. Device ID verification using passive fingerprints was more challenging and the rogue detection rate approached 94 % using 120-of-243 available features—an approximate 50 % dimensional-reduction.. Collectively, the dimensionally-reduced implementations support efficiency improvement objectives required for providing near-cradle counterfeit device and mid-life operational rogue device detection in critical industrial automation and control systems.</span></p></div>\",\"PeriodicalId\":49057,\"journal\":{\"name\":\"International Journal of Critical Infrastructure Protection\",\"volume\":\"43 \",\"pages\":\"Article 100641\"},\"PeriodicalIF\":4.1000,\"publicationDate\":\"2023-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Critical Infrastructure Protection\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1874548223000549\",\"RegionNum\":3,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Critical Infrastructure Protection","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1874548223000549","RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

独特的本地属性指纹被认为是确保工业自动化和控制系统中使用的无线通信设备寿命的一种手段。目标是通过技术上的从摇篮到坟墓的生命周期保护策略,使这些设备达到全部预期寿命。这里讨论的保护包括使用主动指纹识别的部署前近摇篮假冒设备检测和使用被动指纹识别的运行中期流氓设备检测。估计了56个五类多元判别分析模型的假冒伪劣设备检出率。检测演示包括使用3台未建模的设备,共完成3 × 5 × 56 = 840个单独的流氓和假冒设备身份验证演示。设备ID验证过程使用二进制接受/拒绝决策,带有假阳性结果,用于估计流氓和假冒设备的检测率。对于使用主动指纹的设备ID验证,仅使用99个可用特征中的15个,所演示的伪造检测率接近99% -大约减少了85%的维度。使用被动指纹的设备ID验证更具挑战性,使用120 / 243个可用特征,流氓检测率接近94%——大约减少了50%。总的来说,尺寸减小的实现支持在关键的工业自动化和控制系统中提供近摇篮假冒设备和中期操作流氓设备检测所需的效率改进目标。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Ensuring the longevity of WirelessHART devices in industrial automation and control systems using distinct native attribute fingerprinting

Distinct native attribute fingerprinting is considered as a means to ensure the longevity of WirelessHART communication devices used in industrial automation and control systems. The aim is for these devices to reach full life expectancy using a technical cradle-to-grave lifecycle protection strategy. The protection addressed here includes pre-deployment near-cradle counterfeit device detection using active fingerprinting and operational mid-life rogue device detection using passive fingerprinting. The counterfeit and rogue device detection rates are estimated for 56 five-class multiple discriminant analysis models. Detection demonstrations include using three non-modeled devices to complete a total of 3 × 5 × 56 = 840 individual rogue and counterfeit device identity (ID) verification demonstrations. The device ID verification process uses binary accept/reject decisions with false positive outcomes used to estimate rogue and counterfeit device detection rates. For device ID verification using active fingerprints, the demonstrated counterfeit detection rate approached 99 % using only 15-of-99 available features—an approximate 85 % dimensional-reduction. Device ID verification using passive fingerprints was more challenging and the rogue detection rate approached 94 % using 120-of-243 available features—an approximate 50 % dimensional-reduction.. Collectively, the dimensionally-reduced implementations support efficiency improvement objectives required for providing near-cradle counterfeit device and mid-life operational rogue device detection in critical industrial automation and control systems.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Critical Infrastructure Protection
International Journal of Critical Infrastructure Protection COMPUTER SCIENCE, INFORMATION SYSTEMS-ENGINEERING, MULTIDISCIPLINARY
CiteScore
8.90
自引率
5.60%
发文量
46
审稿时长
>12 weeks
期刊介绍: The International Journal of Critical Infrastructure Protection (IJCIP) was launched in 2008, with the primary aim of publishing scholarly papers of the highest quality in all areas of critical infrastructure protection. Of particular interest are articles that weave science, technology, law and policy to craft sophisticated yet practical solutions for securing assets in the various critical infrastructure sectors. These critical infrastructure sectors include: information technology, telecommunications, energy, banking and finance, transportation systems, chemicals, critical manufacturing, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, nuclear reactors, materials and waste, postal and shipping, and government facilities. Protecting and ensuring the continuity of operation of critical infrastructure assets are vital to national security, public health and safety, economic vitality, and societal wellbeing. The scope of the journal includes, but is not limited to: 1. Analysis of security challenges that are unique or common to the various infrastructure sectors. 2. Identification of core security principles and techniques that can be applied to critical infrastructure protection. 3. Elucidation of the dependencies and interdependencies existing between infrastructure sectors and techniques for mitigating the devastating effects of cascading failures. 4. Creation of sophisticated, yet practical, solutions, for critical infrastructure protection that involve mathematical, scientific and engineering techniques, economic and social science methods, and/or legal and public policy constructs.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信