Search papers, labs, and topics across Lattice.
This paper introduces SWICS, a virtual testbed for simulating industrial control systems (ICS) within realistic 5G environments, to evaluate the security implications of transitioning ICS from wired to 5G communication. The study reveals that while 5G networks can achieve resilience comparable to wired systems under optimal conditions, degraded channel conditions can amplify traditional attacks and undermine traffic-pattern-based detection. Furthermore, the research demonstrates inherent security limitations of 5G channels for ICS due to vulnerabilities to eavesdropping and jamming.
Degraded 5G channel conditions can turn garden-variety ICS attacks into system-destabilizing events, while also neutering common traffic-analysis-based defenses.
Traditionally, industrial control systems (ICS) were designed without security in mind, prioritizing availability and real-time communication. As these systems increasingly become targets of powerful adversaries, security can no longer be neglected. Driven by flexibility and automation needs, ICS are transitioning from wired to 5G communication, introducing new attack surfaces and a less reliable communication medium, thereby exacerbating existing security challenges. Given their critical role in society, a comprehensive evaluation of their security is imperative. To this end, we introduce SWICS, a fully virtual testbed simulating an ICS in a realistic 5G environment, and study how this transition affects security under varying channel conditions. Our results show three key findings: under optimal channel conditions, industrial 5G networks can achieve resilience comparable to wired systems, while degraded channel conditions can amplify traditional attacks, threaten system stability, and undermine detection mechanisms based on predictable traffic patterns. We further demonstrate the inherent limits of securing 5G channels for ICS through eavesdropping and jamming on the open-air interface. Our work highlights the interplay between security and 5G channel conditions, showing that traditional security controls may no longer be sufficient and motivating further research.