Phase II Amount
$1,149,925
Today, much of the United StatesÂ’ most critical infrastructure is at risk of cyberattack from the insertion of unauthorized, malicious devices into operational technology networks due to a lack of suitable commercially available protection solutions. Critical infrastructure networks help to monitor and control the cyber-physical systems that comprise energy distribution facilities, oil pipelines, steel mills, etc. throughout the country. It is paramount that operators maintain complete control of critical infrastructure networks to ensure proper system operation because a loss of control can result in serious damage and potentially lost lives. The technical approach developed in this effort provides device authentication that is completely passive to the network and transparent to devices. This means that there is no need for active probing/scanning, device modification through agent installation, or digital certificate deployment. It does this by exploiting the unique physical characteristics of a physical device that are imprinted onto its transmitted signal. This is similar to the way that fingerprints or other biometrics are used to authenticate humans. During Phase I, the technical feasibility of physical layer device authentication on wired networks was demonstrated through data collection, machine learning model experimentation, and prototype design. The experiments resulted in the development of a patent pending method of authenticating devices operating on wired networks which motivates the work proposed for Phase II. The Phase II effort is focused on the development of prototype devices that fill a gap in currently available device authentication solutions for critical infrastructure networks. These prototypes will use the previously developed novel machine learning technique to passively authenticate devices operating on operational technology networks without utilizing power/computational resources or requiring modification of the deployed devices. Energy production/distribution facilities, oil refineries, and many others operate large, secure facilities that strictly limit access to authorized personnel. In fact, organizations go to great lengths to authenticate the people within their facilities (badges, personal identification numbers, and/or biometrics) and those using devices on their networks (usernames/passwords, physical tokens, multi-factor authentication, etc.). However, there is much less emphasis placed on authenticating the devices operating within their facilities. The Physical layer Authentication of Wired Networks effort will provide a device authentication method that is passive, non-invasive, and capable of reducing the mean time to detect an unauthorized device by orders of magnitude.