10.1016/j.ijcip.2023.100641">
 

Ensuring the Longevity of WirelessHART Devices in Industrial Automation and Control Systems Using Distinct Native Attribute Fingerprinting

Document Type

Article

Publication Date

12-2023

Abstract

Distinct native attribute fingerprinting is considered as a means to ensure the longevity of WirelessHART communication devices used in industrial automation and control systems. The aim is for these devices to reach full life expectancy using a technical cradle-to-grave lifecycle protection strategy. The protection addressed here includes pre-deployment near-cradle counterfeit device detection using active fingerprinting and operational mid-life rogue device detection using passive fingerprinting. The counterfeit and rogue device detection rates are estimated for 56 five-class multiple discriminant analysis models. Detection demonstrations include using three non-modeled devices to complete a total of 3 × 5 × 56 = 840 individual rogue and counterfeit device identity (ID) verification demonstrations. The device ID verification process uses binary accept/reject decisions with false positive outcomes used to estimate rogue and counterfeit device detection rates. For device ID verification using active fingerprints, the demonstrated counterfeit detection rate approached 99 % using only 15-of-99 available features—an approximate 85 % dimensional-reduction. Device ID verification using passive fingerprints was more challenging and the rogue detection rate approached 94 % using 120-of-243 available features—an approximate 50 % dimensional-reduction. Collectively, the dimensionally-reduced implementations support efficiency improvement objectives required for providing near-cradle counterfeit device and mid-life operational rogue device detection in critical industrial automation and control systems.

Comments

This is a subscription-access article, available to readers with a subscription to International Journal of Critical Infrastructure Protection, using the DOI link below.

Current AFIT students, faculty, and staff may access the full article by clicking here.

Source Publication

International Journal of Critical Infrastructure Protection

This document is currently not available here.

Share

COinS