SCADA Cybersecurity Awareness and Teaching with
Hardware-In-The-Loop Platforms


Maxime Puys1+, Pierre-Henri Thevenon1, Stéphane Mocanu2, Mathieu Gallissot1, and Camille Sivelle1

1Univ. Grenoble Alpes, CEA, LETI, DSYS, F-38000, Grenoble, France
{Maxime.Puys, Pierre-Henri.Thevenon, Mathieu.Gallissot, Camille Sivelle}@cea.fr

2Laboratoire d’Informatique de Grenoble, Univ. Grenoble Alpes, CNRS, Inria, Grenoble-INP,
Grenoble
, France
 Stephane.Mocanu@imag.fr

 

Abstract

This article deals with SCADA cybersecurity awareness and teaching. We present two twin demonstrators based on the same technology: (i) WonderICS, an Advanced Persistent Threat (APT) demonstrator used for awareness demonstrations and (ii) G-ICS, a flexible lab used for students training and pentesting. Both are based on a common Hardware-In-the-Loop (HIL) technology which combines simulation, emulation and real devices to reproduce realistic industrial environments. Our solution simulates the physical process alongside real sensors and actuators, which are then connected with real industrial control devices using open-source electronic interface boards. Moreover, an innovative firmware emulation platform allows to run real devices’ firmwares taken from vendors’ websites without the need of the actual physical devices. After describing the architecture and implementation inner workings of our HIL platform, we explain what are the attack scenarios implemented on both platforms. These attacks scenarios allow us to conduct both demonstrations and teaching. We show how they are carried out and the feedback they get.

Keywords: SCADA; Cybersecurity, Simulation, Emulation, Testbeds

 

+: Corresponding author: Maxime PUYS
FCEA-Leti, 17 rue des Martyrs, 38054 GRENOBLE CEDEX 9, France
 

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
Vol. 13, No. 1, pp. 4-32, March 2022 [
pdf]

 

Received: December 17, 2021; Accepted: February 10, 2022; Published: March 31, 2022

DOI: 10.22667/JOWUA.2022.03.31.004