Skip to main content
Log in

Enabling isolation and recovery in PLC redundancy framework of metro train systems

  • regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The current train systems are heavily computerized which makes them highly prone to cyberattacks. Many functions in the trains are controlled by programmable logic controllers (PLCs) which make them an attractive target of attacks. By compromising the train’s PLCs, attackers can cause trains to operate in an unsafe environment and even lead to a fatal accident. In this paper, we investigated the current PLC redundancy framework in train systems which only resolves the issue of availability of the PLC while overlooking the integrity of the data being synchronized between PLCs. We proposed a new PLC redundancy framework encompassing of isolation and recovery mechanisms which are able to provide both availability and integrity. We developed a proof of concept and demonstrated its viability on our laboratory training skid.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. Disgruntled worker who is fired by the company.

References

  1. Adepu, S., Brasser, F., Garcia, L., Rodler, M., Davi, L., Sadeghi, A.-R., Zonouz, S.: Control behavior integrity for distributed cyber-physical systems. In: 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), pp. 30–40. IEEE (2020)

  2. Adepu, S., Mathur, A.: Assessing the effectiveness of attack detection at a hackfest on industrial control systems. IEEE Trans. Sustain. Comput. (2018)

  3. Alcaraz, C.: Cloud-assisted dynamic resilience for cyber-physical control systems. IEEE Wirel. Commun. 25(1), 76–82 (2018)

    Article  Google Scholar 

  4. Alcaraz, C., Wolthusen, S.: Recovery of structural controllability for control systems. In: International Conference on Critical Infrastructure Protection, pp. 47–63. Springer, Berlin (2014)

  5. Antrobus, R., Green, B., Frey, S.A.F., Rashid, A.: The forgotten i in iiot: A vulnerability scanner for industrial internet of things (2019)

  6. Azzouni, G.H.: Contact shoe assembly for a train, 23 Sept 1997. US Patent 5,669,472

  7. Bellare, M.: New proofs for NMAC and HMAC: Security without collision-resistance. In: Annual International Cryptology Conference, pp. 602–619. Springer, Berlin (2006)

  8. Bishop, M.: Computer Security: Art and Science, pp. 4–12. Addison Wesley Professional, Westford (2003)

    Google Scholar 

  9. Cazorla, L., Alcaraz, C., Lopez, J.: Cyber stealth attacks in critical information infrastructures. IEEE Syst. J. 12(2), 1778–1792 (2016)

    Article  Google Scholar 

  10. Chen, Y., Poskitt, C.M., Sun, J., Adepu, S., Zhang, F.: Learning-guided network fuzzing for testing cyber-physical system defences. In: 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), pp. 962–973. IEEE (2019)

  11. Dablain, K.: Cyber Threats Against Critical Infrastructures in Railroads. PhD thesis, Utica College (2017)

  12. Das, T.K., Adepu, S., Zhou, J.: Anomaly detection in industrial control systems using logical analysis of data. Comput. Secur. 96, 101935 (2020)

    Article  Google Scholar 

  13. Feng, S., Tesi, P.: Resilient control under denial-of-service: robust design. Automatica 79, 42–51 (2017)

    Article  MathSciNet  Google Scholar 

  14. Garcia, L., Brasser, F., Cintuglu, M.H., Sadeghi, A.-R., Mohammed, O.A., Zonouz, S.A.: Hey, my malware knows physics! attacking plcs with physical model aware rootkit. In: NDSS (2017)

  15. Ghaeini, H.R., Chan, M., Bahmani, R., Brasser, F., Garcia, L., Zhou, J., Sadeghi, A.-R., Tippenhauer, N.O., Zonouz, S.: Patt: physics-based attestation of control systems. In: 22nd International Symposium on (\(\{\)RAID\(\}\)), pp. 165–180 (2019)

  16. Giraldo, J., Urbina, D., Cardenas, A., Valente, J., Faisal, M., Ruths, J., Tippenhauer, N.O., Sandberg, H., Candell, R.: A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. (CSUR) 51(4), 76 (2018)

    Article  Google Scholar 

  17. Govil, N., Agrawal, A., Tippenhauer, N.O.: On ladder logic bombs in industrial control systems. In: Sokratis K, Katsikas and Frédéric, Cuppens and Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis (eds) Computer Security, pp. 110–126. Springer, Berlin (2017)

  18. Han, Y., Etigowni, S., Liu, H., Zonouz, S., Petropulu, A.: Watch me, but don’t touch me! contactless control flow monitoring via electromagnetic emanations. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1095–1108. ACM (2017)

  19. Hunker, J., Probst, C.W.: Insiders and insider threats—an overview of definitions and mitigation techniques. JoWUA 2(1), 4–27 (2011)

    Google Scholar 

  20. Jin, C., Yang, Z., van Dijk, M., Zhou, J.: Proof of aliveness. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 1–16 (2019)

  21. Johnson, B., Caban, D., Krotofil, M., Scali, D., Brubaker, N., Glyer, C.: Attackers deploy new ICS attack framework “triton” and cause operational disruption to critical infrastructure. Threat Res. Blog (2017)

  22. Johnson, R.E.: Survey of scada security challenges and potential attack vectors. In: 2010 International Conference for Internet Technology and Secured Transactions, pp. 1–5. IEEE (2010)

  23. Kahtan, H., Bakar, N.A., Nordin, R.: Dependability attributes for increased security in component-based software development. JCS 10(7), 1298–1306 (2014)

    Google Scholar 

  24. Kim, T., Zeldovich, N.: Practical and effective sandboxing for non-root users. In: Presented as part of the 2013 \(\{\)USENIX\(\}\) Annual Technical Conference (\(\{\)USENIX\(\}\)\(\{\)ATC\(\}\) 13), pp. 139–144 (2013)

  25. Kong, F., Xu, M., Weimer, J., Sokolsky, O., Lee, I.: Cyber-physical system checkpointing and recovery. In: ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS), pp. 22–31. IEEE (2018)

  26. Krawczyk, H., Bellare, M., Canetti, R.: HMAC: keyed-hashing for message authentication. RFC 2104, 1–11 (1997)

    Google Scholar 

  27. Lim, A.: LTA, SMRT identify cause of massive rail disruption on July 7 (2015). https://www.straitstimes.com/singapore/transport/lta-smrt-identify-cause-of-massive-rail-disruption-on-july-7. Accessed 3 Jan 2020

  28. Lim, B., Chen, D., An, Y., Kalbarczyk, Z., Iyer, R.: Attack induced common-mode failures on PLC-based safety system in a nuclear power plant: practical experience report. In: 22nd PRDC, pp. 205–210. IEEE (2017)

  29. Lim, H.W., Temple, W.G., Tran, B.A.N., Chen, B., Kalbarczyk, Z., Zhou, J.: Data integrity threats and countermeasures in railway spot transmission systems. ACM Trans. Cyber-Phys. Syst. 4(1), 1–26 (2019)

    Article  Google Scholar 

  30. Lin, C.-T., Wu, S.-L., Lee, M.-L.: Cyber attack and defense on industry control systems. In: 2017 IEEE Conference on Dependable and Secure Computing, pp. 524–526. IEEE (2017)

  31. Lopez, J., Rubio, J.E., Alcaraz, C.: A resilient architecture for the smart grid. IEEE Trans. Ind. Inform. 14(8), 3745–3753 (2018)

    Article  Google Scholar 

  32. Lu, L., Zhang, Y., Do, T., Al-Kiswany, S., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H.: Physical disentanglement in a container-based file system. In: 11th \(\{\)USENIX\(\}\) Symposium on Operating Systems Design and Implementation (\(\{\)OSDI\(\}\) 14), pp. 81–96 (2014)

  33. Maw, A., Adepu, S., Mathur, A.: ICS-BlockOpS: blockchain for operational data security in industrial control system. Pervasive Mob. Comput. 59, 101048 (2019)

    Article  Google Scholar 

  34. Pessen, D.: Ladder-diagram design for programmable controllers. Automatica 25(3), 407–412 (1989)

    Article  Google Scholar 

  35. Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., Maneru-Marin, I.: PLC memory attack detection and response in a clean water supply system. Int. J. Crit. Infrastruct. Prot. 26, 100300 (2019)

    Article  Google Scholar 

  36. Rocchetto, M., Tippenhauer, N.O.: On attacker models and profiles for cyber-physical systems. In: European Symposium on Research in Computer Security, pp. 427–449. Springer, Berlin (2016)

  37. Ruscito, A.: Pycomm: a collection of modules used to communicate with PLCs. (2017) https://github.com/ruscito/pycomm. Accessed 8 Aug 2019

  38. Senthivel, S., Dhungana, S., Yoo, H., Ahmed, I., Roussev, V.: Denial of engineering operations attacks in industrial control systems. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 319–329. ACM (2018)

  39. Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: Using software-based attestation for verifying embedded systems in cars. In: Proceedings of the Embedded Security in Cars Workshop, vol. 4 (2004)

  40. Tan, C.: SMRT fined record \$5.4 million for July 7 breakdown (2016). https://www.straitstimes.com/singapore/transport/smrt-fined-record-54-million-for-july-7-breakdown#:~:text=SINGAPORE%20-%20Rail%20operator%20SMRT%20Corp,West%20lines%20on%20July%207.&text=Investigations%20narrowed%20the%20root%20cause,and%20Raffles%20Place%20MRT%20stations. Accessed 3 Jan 2020

  41. Umer, M.A., Mathur, A., Junejo, K.N., Adepu, S.: Integrating design and data centric approaches to generate invariants for distributed attack detection. In: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, pp. 131–136 (2017)

  42. Xu, J., Zhou, J.: Virtually isolated network: a hybrid network to achieve high level security. In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 299–311. Springer, Berlin (2018)

  43. Yang, Z., Jin, C., Tian, Y., Lai, J., Zhou, J.: LiS: lightweight signature schemes for continuous message authentication in cyber-physical systems. In: Proceedings of Asia Conference on Computer and Communications Security, pp. 719–731. ACM (2020)

  44. Yavuz, A.A., Ozmen, M.O.: Ultra lightweight multiple-time digital signature for the internet of things devices. IEEE Trans. Serv. Comput. 1, (2019). https://doi.org/10.1109/TSC.2019.2928303

  45. Zhou, L., Guo, H., Li, D., Wong, J. W., Zhou, J.: Mind the gap: security analysis of metro platform screen door system. In: SG-CRC, pp. 70–85. IoS Press (2017)

Download references

Acknowledgements

This work was supported by the National Research Foundation (NRF), Prime Minister’s Office, Singapore, under its National Cybersecurity R&D Programme (Award No. NRF2014NCR-NCR001-31) and administered by the National Cybersecurity R&D Directorate. Special thanks to SMRT Trains Ltd and its staff Kamsani Bin Sabri for providing domain knowledge and technical support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yang.

Ethics declarations

Ethical approval

We did not use animals and Human participants in the study reported in this work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Josephlal, E.F.M., Adepu, S., Yang, Z. et al. Enabling isolation and recovery in PLC redundancy framework of metro train systems. Int. J. Inf. Secur. 20, 783–795 (2021). https://doi.org/10.1007/s10207-020-00529-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-020-00529-0

Keywords

Navigation