Abstract
The current train systems are heavily computerized which makes them highly prone to cyberattacks. Many functions in the trains are controlled by programmable logic controllers (PLCs) which make them an attractive target of attacks. By compromising the train’s PLCs, attackers can cause trains to operate in an unsafe environment and even lead to a fatal accident. In this paper, we investigated the current PLC redundancy framework in train systems which only resolves the issue of availability of the PLC while overlooking the integrity of the data being synchronized between PLCs. We proposed a new PLC redundancy framework encompassing of isolation and recovery mechanisms which are able to provide both availability and integrity. We developed a proof of concept and demonstrated its viability on our laboratory training skid.
Similar content being viewed by others
Notes
Disgruntled worker who is fired by the company.
References
Adepu, S., Brasser, F., Garcia, L., Rodler, M., Davi, L., Sadeghi, A.-R., Zonouz, S.: Control behavior integrity for distributed cyber-physical systems. In: 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), pp. 30–40. IEEE (2020)
Adepu, S., Mathur, A.: Assessing the effectiveness of attack detection at a hackfest on industrial control systems. IEEE Trans. Sustain. Comput. (2018)
Alcaraz, C.: Cloud-assisted dynamic resilience for cyber-physical control systems. IEEE Wirel. Commun. 25(1), 76–82 (2018)
Alcaraz, C., Wolthusen, S.: Recovery of structural controllability for control systems. In: International Conference on Critical Infrastructure Protection, pp. 47–63. Springer, Berlin (2014)
Antrobus, R., Green, B., Frey, S.A.F., Rashid, A.: The forgotten i in iiot: A vulnerability scanner for industrial internet of things (2019)
Azzouni, G.H.: Contact shoe assembly for a train, 23 Sept 1997. US Patent 5,669,472
Bellare, M.: New proofs for NMAC and HMAC: Security without collision-resistance. In: Annual International Cryptology Conference, pp. 602–619. Springer, Berlin (2006)
Bishop, M.: Computer Security: Art and Science, pp. 4–12. Addison Wesley Professional, Westford (2003)
Cazorla, L., Alcaraz, C., Lopez, J.: Cyber stealth attacks in critical information infrastructures. IEEE Syst. J. 12(2), 1778–1792 (2016)
Chen, Y., Poskitt, C.M., Sun, J., Adepu, S., Zhang, F.: Learning-guided network fuzzing for testing cyber-physical system defences. In: 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), pp. 962–973. IEEE (2019)
Dablain, K.: Cyber Threats Against Critical Infrastructures in Railroads. PhD thesis, Utica College (2017)
Das, T.K., Adepu, S., Zhou, J.: Anomaly detection in industrial control systems using logical analysis of data. Comput. Secur. 96, 101935 (2020)
Feng, S., Tesi, P.: Resilient control under denial-of-service: robust design. Automatica 79, 42–51 (2017)
Garcia, L., Brasser, F., Cintuglu, M.H., Sadeghi, A.-R., Mohammed, O.A., Zonouz, S.A.: Hey, my malware knows physics! attacking plcs with physical model aware rootkit. In: NDSS (2017)
Ghaeini, H.R., Chan, M., Bahmani, R., Brasser, F., Garcia, L., Zhou, J., Sadeghi, A.-R., Tippenhauer, N.O., Zonouz, S.: Patt: physics-based attestation of control systems. In: 22nd International Symposium on (\(\{\)RAID\(\}\)), pp. 165–180 (2019)
Giraldo, J., Urbina, D., Cardenas, A., Valente, J., Faisal, M., Ruths, J., Tippenhauer, N.O., Sandberg, H., Candell, R.: A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. (CSUR) 51(4), 76 (2018)
Govil, N., Agrawal, A., Tippenhauer, N.O.: On ladder logic bombs in industrial control systems. In: Sokratis K, Katsikas and Frédéric, Cuppens and Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis (eds) Computer Security, pp. 110–126. Springer, Berlin (2017)
Han, Y., Etigowni, S., Liu, H., Zonouz, S., Petropulu, A.: Watch me, but don’t touch me! contactless control flow monitoring via electromagnetic emanations. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1095–1108. ACM (2017)
Hunker, J., Probst, C.W.: Insiders and insider threats—an overview of definitions and mitigation techniques. JoWUA 2(1), 4–27 (2011)
Jin, C., Yang, Z., van Dijk, M., Zhou, J.: Proof of aliveness. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 1–16 (2019)
Johnson, B., Caban, D., Krotofil, M., Scali, D., Brubaker, N., Glyer, C.: Attackers deploy new ICS attack framework “triton” and cause operational disruption to critical infrastructure. Threat Res. Blog (2017)
Johnson, R.E.: Survey of scada security challenges and potential attack vectors. In: 2010 International Conference for Internet Technology and Secured Transactions, pp. 1–5. IEEE (2010)
Kahtan, H., Bakar, N.A., Nordin, R.: Dependability attributes for increased security in component-based software development. JCS 10(7), 1298–1306 (2014)
Kim, T., Zeldovich, N.: Practical and effective sandboxing for non-root users. In: Presented as part of the 2013 \(\{\)USENIX\(\}\) Annual Technical Conference (\(\{\)USENIX\(\}\)\(\{\)ATC\(\}\) 13), pp. 139–144 (2013)
Kong, F., Xu, M., Weimer, J., Sokolsky, O., Lee, I.: Cyber-physical system checkpointing and recovery. In: ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS), pp. 22–31. IEEE (2018)
Krawczyk, H., Bellare, M., Canetti, R.: HMAC: keyed-hashing for message authentication. RFC 2104, 1–11 (1997)
Lim, A.: LTA, SMRT identify cause of massive rail disruption on July 7 (2015). https://www.straitstimes.com/singapore/transport/lta-smrt-identify-cause-of-massive-rail-disruption-on-july-7. Accessed 3 Jan 2020
Lim, B., Chen, D., An, Y., Kalbarczyk, Z., Iyer, R.: Attack induced common-mode failures on PLC-based safety system in a nuclear power plant: practical experience report. In: 22nd PRDC, pp. 205–210. IEEE (2017)
Lim, H.W., Temple, W.G., Tran, B.A.N., Chen, B., Kalbarczyk, Z., Zhou, J.: Data integrity threats and countermeasures in railway spot transmission systems. ACM Trans. Cyber-Phys. Syst. 4(1), 1–26 (2019)
Lin, C.-T., Wu, S.-L., Lee, M.-L.: Cyber attack and defense on industry control systems. In: 2017 IEEE Conference on Dependable and Secure Computing, pp. 524–526. IEEE (2017)
Lopez, J., Rubio, J.E., Alcaraz, C.: A resilient architecture for the smart grid. IEEE Trans. Ind. Inform. 14(8), 3745–3753 (2018)
Lu, L., Zhang, Y., Do, T., Al-Kiswany, S., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H.: Physical disentanglement in a container-based file system. In: 11th \(\{\)USENIX\(\}\) Symposium on Operating Systems Design and Implementation (\(\{\)OSDI\(\}\) 14), pp. 81–96 (2014)
Maw, A., Adepu, S., Mathur, A.: ICS-BlockOpS: blockchain for operational data security in industrial control system. Pervasive Mob. Comput. 59, 101048 (2019)
Pessen, D.: Ladder-diagram design for programmable controllers. Automatica 25(3), 407–412 (1989)
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., Maneru-Marin, I.: PLC memory attack detection and response in a clean water supply system. Int. J. Crit. Infrastruct. Prot. 26, 100300 (2019)
Rocchetto, M., Tippenhauer, N.O.: On attacker models and profiles for cyber-physical systems. In: European Symposium on Research in Computer Security, pp. 427–449. Springer, Berlin (2016)
Ruscito, A.: Pycomm: a collection of modules used to communicate with PLCs. (2017) https://github.com/ruscito/pycomm. Accessed 8 Aug 2019
Senthivel, S., Dhungana, S., Yoo, H., Ahmed, I., Roussev, V.: Denial of engineering operations attacks in industrial control systems. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 319–329. ACM (2018)
Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: Using software-based attestation for verifying embedded systems in cars. In: Proceedings of the Embedded Security in Cars Workshop, vol. 4 (2004)
Tan, C.: SMRT fined record \$5.4 million for July 7 breakdown (2016). https://www.straitstimes.com/singapore/transport/smrt-fined-record-54-million-for-july-7-breakdown#:~:text=SINGAPORE%20-%20Rail%20operator%20SMRT%20Corp,West%20lines%20on%20July%207.&text=Investigations%20narrowed%20the%20root%20cause,and%20Raffles%20Place%20MRT%20stations. Accessed 3 Jan 2020
Umer, M.A., Mathur, A., Junejo, K.N., Adepu, S.: Integrating design and data centric approaches to generate invariants for distributed attack detection. In: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, pp. 131–136 (2017)
Xu, J., Zhou, J.: Virtually isolated network: a hybrid network to achieve high level security. In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 299–311. Springer, Berlin (2018)
Yang, Z., Jin, C., Tian, Y., Lai, J., Zhou, J.: LiS: lightweight signature schemes for continuous message authentication in cyber-physical systems. In: Proceedings of Asia Conference on Computer and Communications Security, pp. 719–731. ACM (2020)
Yavuz, A.A., Ozmen, M.O.: Ultra lightweight multiple-time digital signature for the internet of things devices. IEEE Trans. Serv. Comput. 1, (2019). https://doi.org/10.1109/TSC.2019.2928303
Zhou, L., Guo, H., Li, D., Wong, J. W., Zhou, J.: Mind the gap: security analysis of metro platform screen door system. In: SG-CRC, pp. 70–85. IoS Press (2017)
Acknowledgements
This work was supported by the National Research Foundation (NRF), Prime Minister’s Office, Singapore, under its National Cybersecurity R&D Programme (Award No. NRF2014NCR-NCR001-31) and administered by the National Cybersecurity R&D Directorate. Special thanks to SMRT Trains Ltd and its staff Kamsani Bin Sabri for providing domain knowledge and technical support.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethical approval
We did not use animals and Human participants in the study reported in this work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Josephlal, E.F.M., Adepu, S., Yang, Z. et al. Enabling isolation and recovery in PLC redundancy framework of metro train systems. Int. J. Inf. Secur. 20, 783–795 (2021). https://doi.org/10.1007/s10207-020-00529-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-020-00529-0