2015
DOI: 10.1016/j.ijcip.2015.02.001
|View full text |Cite
|
Sign up to set email alerts
|

Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(17 citation statements)
references
References 20 publications
0
17
0
Order By: Relevance
“…One PHY-based method supporting offensive, defensive, and exploitive network operations is Time Domain Distinct Native Attribute (TD-DNA) Fingerprinting which has been successfully used to discriminate IoT and IIoT communication devices and their operating states [9][10][11][12][13][14][15][16][17][18]. The TD-DNA fingerprinting methodology therein is well-suited for consideration here given 1) the observed ZigBee-like signal characteristics of WirelessHART signals, and 2) the ability to perform Dimensional Reduction Analysis (DRA) and identify the minimal subset of features required to achieve a given level of discrimination performance.…”
Section: Introductionmentioning
confidence: 99%
“…One PHY-based method supporting offensive, defensive, and exploitive network operations is Time Domain Distinct Native Attribute (TD-DNA) Fingerprinting which has been successfully used to discriminate IoT and IIoT communication devices and their operating states [9][10][11][12][13][14][15][16][17][18]. The TD-DNA fingerprinting methodology therein is well-suited for consideration here given 1) the observed ZigBee-like signal characteristics of WirelessHART signals, and 2) the ability to perform Dimensional Reduction Analysis (DRA) and identify the minimal subset of features required to achieve a given level of discrimination performance.…”
Section: Introductionmentioning
confidence: 99%
“…Low-cost, low-power Z-Wave devices are among the sub-internet WPAN support technologies that enable mesh networks comprised of smart devices [6], [7]. These networks support data collection and control [8] via Supervisory Control and Data Acquisition (SCADA) systems [9]. Mesh networks are used, for instance, in hospital [10] and electrical smartgrid [11] applications, both of which are CI elements within e-government and private sectors.…”
Section: Introductionmentioning
confidence: 99%
“…Device hardware ID and operating state discrimination for CI security applications has been reliably demonstrated using Physical (PHY) layer security enhancement [4], [9], [15]. As discussed in [16], PHY layer security involves either 1) adding physically traceable objects to devices [17] or 2) Radio Frequency Distinct Native Attribute (RF-DNA) fingerprinting based on PHY device emissions which overcome limitations of encryption key-based measures [18].…”
Section: Introductionmentioning
confidence: 99%
“…This GPIO trigger was separately probed in order to identify the boundaries of EM emission signals in order to extract the matchedfilter template trace. Stone et al continued to demonstrated that instead of using the time-domain signal as a feature vector, it is more effective to use Hilbert transformation of the EM emission signals [20]. The advantage of this approach is that, when calculating correlation of two signals, Hilbert-transformed vectors perform better than time-domain vectors for the same signalto-noise ratio (SNR) of signals.…”
Section: Related Workmentioning
confidence: 99%