Human voices are unique to the individual and current technology has been used to restrict access to authorized personnel using voices as authentication. Now by identifying the voices of devices on control networks a possible new defense would filter legitimate signals and attacks.
“We have developed fingerprinting techniques that work together to protect various operations of the power grid to prevent or minimize spoofing of packets that could be injected to produce false data or false control commands into the system. This is the first technique that can passively fingerprint different devices that are part of critical infrastructure networks. We believe it can be used to significantly improve the security of the grid and other networks.” -Raheem Beyah Georgia Institute of Technology
The security techniques take advantage of the individual physical properties of each unique device. Security devices listening to the grid would differentiate devices that were authenticated to the grid, and identify illegitimate “noise” within the system. Furthermore, the system can use simple physics to flush out spoofing attempts. Depending on the physical configuration of breakers and valves, opening and closing procedures take a minimum amount of time. If a device gets a signal to open or close too soon after the last signal security staff would be notified of a possible attack.
Because they also include devices with measurable physical properties, Beyah believes the approach could have broad application to securing industrial control systems used in manufacturing, oil and gas refining, wastewater treatment and other industries.
Click here for the full article from Control Engineering.