The presentation discusses the use of sensor noise as a fingerprint to authenticate sensors in ICS critical infrastructures without using cryptography. The fingerprint, together with process data, results in a more robust authentication method.
- Sensor noise can be used as a fingerprint to authenticate sensors in ICS critical infrastructures without using cryptography
- The fingerprint, together with process data, results in a more robust authentication method
- The technique has been tested on up to ten sensor types and up to sixty different sensors bridge types
- The physical fingerprint authentication technique is not perfect, but it can complement cryptography
- The technique can detect many attackers who are unaware of this method
- The technique can be used to authenticate sensor readings
- The technique can be used to detect some advanced attacks
- The temperature does not impact the fingerprint
- The fingerprint is stable even when the backup generator power source is used
- The technique requires a model of the system to build the fingerprint
The ultrasonic sensor sends a sound signal that bounces to measure distance. However, due to the construction of the sensors and physical conditions, not every bounce will result in the same measurement. This characteristic is present in all sensors, and it generates the noise that can be used as a fingerprint.