Loading...
private.me Docs
Get xSense
PRIVATE.ME PLATFORM

xSense: ICS/SCADA Sensor Integrity

XorIDA splits each SCADA sensor reading across independent verifier nodes, making Stuxnet-style sensor manipulation detectable and information-theoretically impossible to forge.

Government COMING SOON XorIDA Powered
Section 01

The Problem

SCADA and ICS sensors are single points of failure. Stuxnet demonstrated that attackers can manipulate sensor readings to mask physical sabotage of critical infrastructure processes.

Industrial Control Systems (ICS) and SCADA networks manage power grids, water treatment plants, oil pipelines, and manufacturing processes. These systems rely on sensor readings that travel through single communication channels to Human-Machine Interfaces (HMIs). An attacker who compromises the channel — or the sensor controller — can feed operators false readings.

Stuxnet proved this attack is not theoretical. The malware intercepted centrifuge speed sensors and replayed normal readings while the centrifuges were spinning to destruction. Operators saw nothing wrong until physical damage occurred. The fundamental flaw is that sensor integrity depends on a single trust path.

The Old Way

ICS SENSOR PLC / RTU HMI (Operator) STUXNET-STYLE SENSOR REPLAY Single trust path = single point of manipulation
Section 02

The PRIVATE.ME Solution

XorIDA splits each sensor reading across independent verifier nodes on separate network segments. No single compromised node can forge a valid reading. Typed integrity alerts catch tampering in real time.

Each sensor reading is split into N shares distributed to independent verifier nodes on isolated network segments. The verifier nodes operate on separate hardware, separate networks, and ideally separate physical locations. An attacker would need to simultaneously compromise K independent nodes to forge a reading.

Every share carries HMAC-SHA256 integrity verification. When the control system reconstructs a reading, it first verifies every share. A Stuxnet-style replay attack would fail because the replayed share would not match the HMAC of the current timestamp and sequence number. Typed alerts (TAMPER_DETECTED, REPLAY_DETECTED, SEQUENCE_GAP) immediately notify operators.

The New Way

ICS SENSOR XorIDA SPLIT VERIFIER A (Net 1) VERIFIER B (Net 2) VERIFIER C (Net 3) VERIFIED HMI READING
Section 03

How It Works

A four-stage pipeline: sensor reading capture, XorIDA split with sequence numbering, multi-network verifier distribution, and HMAC-verified threshold reconstruction with typed alerts.

1. CAPTURE Sensor Reading 2. SPLIT XorIDA + Sequence 3. DISTRIBUTE N Verifier Nodes 4. DETECT Typed Alerts ANTI-REPLAY Each reading includes monotonic sequence number and NTP timestamp. HMAC covers sequence + timestamp + reading payload. Replayed shares fail because sequence number does not match expected value. TYPED ALERTS TAMPER_DETECTED — HMAC mismatch REPLAY_DETECTED — stale sequence SEQUENCE_GAP — missing readings NODE_OFFLINE — verifier unreachable Each alert includes affected node ID.
Key Security Properties
Anti-replay: Monotonic sequence numbers and timestamps in HMAC prevent Stuxnet-style replay attacks. A replayed reading from an earlier timestamp is instantly detectable.

Network isolation: Verifier nodes on separate network segments ensure that compromising one OT network does not grant access to all shares.

Typed alerting: Machine-readable alert types (TAMPER_DETECTED, REPLAY_DETECTED, SEQUENCE_GAP) enable automated incident response without operator interpretation.
Section 04

Use Cases

Energy
Power Grid Monitoring

Split grid sensor readings across independent verifier nodes. Detect manipulation of voltage, frequency, and load readings that could mask grid instability or enable cascading failures.

Grid Security
💧
Water
Water Treatment Systems

Protect chemical dosing and pH sensor readings from manipulation. Tampered water treatment readings could mask contamination that endangers public health.

Public Safety
🛢
Oil & Gas
Oil Pipeline SCADA

Split pressure, flow rate, and temperature readings across verifier nodes. Detect manipulation that could mask pipeline overpressure or leak conditions.

Pipeline Safety
🏭
Manufacturing
Manufacturing Process Control

Verify sensor integrity in automated manufacturing lines. Prevents quality control sabotage where manipulated readings pass defective products.

Quality Assurance
Section 05

Integration

Quick Start
import { splitSensorData, detectTamper } from '@private.me/scradasplit';

// Split sensor reading across 3 verifier nodes
const shares = await splitSensorData(
  sensorReading,
  ['verifier-net1', 'verifier-net2', 'verifier-net3']
);

// Detect tampering during reconstruction
const result = await detectTamper(collectedShares);
if (!result.ok) {
  // result.error.type: 'TAMPER_DETECTED' | 'REPLAY_DETECTED'
  alertOperator(result.error);
}
splitSensorData(reading: SensorReading, verifiers: string[]): Promise<ScadaShare[]>
Splits a SCADA sensor reading into N shares using XorIDA threshold sharing. Each share is tagged with verifier node ID, monotonic sequence number, NTP timestamp, and HMAC-SHA256. Returns an array of ScadaShare objects for distribution to independent verifier nodes.
detectTamper(shares: ScadaShare[]): Promise<Result<SensorReading, ScadaAlert>>
Verifies HMAC integrity, sequence ordering, and timestamp freshness of each share. Returns typed ScadaAlert on failure: TAMPER_DETECTED, REPLAY_DETECTED, SEQUENCE_GAP, or NODE_OFFLINE with affected node ID.
Section 06

Security Properties

PropertyMechanismGuarantee
ConfidentialityXorIDA K-of-N thresholdInformation-theoretic (unconditional)
IntegrityHMAC-SHA256 per shareTamper detection before reconstruction
Anti-ReplayMonotonic sequence + timestampStale readings rejected automatically
IsolationSeparate network segmentsNo single-network compromise
AlertingTyped alert systemMachine-readable incident response
<1ms
Typical payload
2-of-3
Default threshold
4
Typed alert categories
0 bits
Leaked from K-1 shares
VERIFIED BY XPROVE

Verifiable Data Protection

Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.

XPROVE AUDIT TRAIL
Every XorIDA split generates HMAC-SHA256 integrity tags. xProve chains these into a tamper-evident audit trail that proves data was handled correctly at every step. Upgrade to zero-knowledge proofs when regulators or counterparties need public verification.

Read the xProve white paper →
GET STARTED

Ready to deploy xSense?

Talk to Ren, our AI sales engineer, or book a live demo with our team.

Book a Demo

© 2026 StandardClouds Inc. dba PRIVATE.ME. All rights reserved.

VERIFIABLE WITHOUT CODE EXPOSURE

Ship Proofs, Not Source

xSense generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.

XPROVE CRYPTOGRAPHIC PROOF
Download proofs:

Verify proofs online →

Use Cases

🏛️
REGULATORY
FDA / SEC Submissions
Prove algorithm correctness for distributed systems without exposing trade secrets or IP.
Zero IP Exposure
🏦
FINANCIAL
Audit Without Access
External auditors verify secure operations without accessing source code or production systems.
FINRA / SOX Compliant
🛡️
DEFENSE
Classified Verification
Security clearance holders verify distributed systems correctness without clearance for source code.
CMMC / NIST Ready
🏢
ENTERPRISE
Procurement Due Diligence
Prove security + correctness during RFP evaluation without NDA or code escrow.
No NDA Required

Deployment Options

📦

SDK Integration

Embed directly in your application. Runs in your codebase with full programmatic control.

  • npm install @private.me/xsense
  • TypeScript/JavaScript SDK
  • Full source access
  • Enterprise support available
Get Started →
🏢

On-Premise Upon Request

Enterprise CLI for compliance, air-gap, or data residency requirements.

  • Complete data sovereignty
  • Air-gap capable deployment
  • Custom SLA + dedicated support
  • Professional services included
Request Quote →

Enterprise On-Premise Deployment

While xSense is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:

  • Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
  • Air-gapped environments — SCIF, classified networks, offline operations
  • Data residency requirements — EU GDPR, China data laws, government mandates
  • Custom integration needs — Embed in proprietary platforms, specialized workflows

Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.

Contact sales for assessment and pricing →