13.07.2015 Views

white paper on industrial automation security in fieldbus and

white paper on industrial automation security in fieldbus and

white paper on industrial automation security in fieldbus and

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1WHITE PAPER ON INDUSTRIAL AUTOMATIONSECURITY IN FIELDBUS AND FIELD DEVICELEVELAuthors:Magnus Sundell, Vac<strong>on</strong> Plc, magnus.sundell{at}vac<strong>on</strong>.comJanne Kuivala<strong>in</strong>en, Vac<strong>on</strong> Plc, janne.kuivala<strong>in</strong>en{at}vac<strong>on</strong>.comJuhani Mäkelä, Nixu Ltd, juhani.makela{at}nixu.comArthur Gervais, Nixu Ltd, arthur.gervais{at}nixu.comJouko Orava, Vac<strong>on</strong> Plc, jouko.orava{at}vac<strong>on</strong>.comMikko H. Hyppönen, F-Secure Corporati<strong>on</strong>, mikko.hypp<strong>on</strong>en{at}f-secure.com


2AbstractThere has been a lot of discussi<strong>on</strong> about malware <strong>and</strong> <strong>security</strong> <strong>in</strong> <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> systems afterStuxnet. This <str<strong>on</strong>g>white</str<strong>on</strong>g> <str<strong>on</strong>g>paper</str<strong>on</strong>g> is based <strong>on</strong> material from the public doma<strong>in</strong> <strong>and</strong> focuses <strong>on</strong> present<strong>in</strong>g ageneric overview about <strong>security</strong> <strong>in</strong> <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> <strong>on</strong> the <strong>fieldbus</strong> <strong>and</strong> device level.The level of st<strong>and</strong>ardizati<strong>on</strong> <strong>in</strong> the <strong>in</strong>formati<strong>on</strong> <strong>security</strong> field is presented, compar<strong>in</strong>g the status of ICTsystems’ <strong>security</strong> st<strong>and</strong>ardizati<strong>on</strong> to that of <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong>.Security aspects of traditi<strong>on</strong>al <strong>fieldbus</strong>es, Ethernet-based networks <strong>and</strong> wireless communicati<strong>on</strong>technologies are presented. Challenges regard<strong>in</strong>g data <strong>security</strong> <strong>in</strong> the field of <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> arediscussed. The properties of <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> devices are described with a focus <strong>on</strong> <strong>security</strong>,tamper<strong>in</strong>g possibilities, <strong>and</strong> risk mitigati<strong>on</strong> methods.Index terms – <strong>security</strong>, <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong>, <strong>fieldbus</strong>, <strong><strong>in</strong>dustrial</strong> Ethernet, wireless communicati<strong>on</strong>,embedded devices, st<strong>and</strong>ardizati<strong>on</strong>, Stuxnet


3Table of C<strong>on</strong>tents1 Introducti<strong>on</strong> <strong>and</strong> scope ..................................................................................................................... 61.1 Industrial automati<strong>on</strong> systems overview ................................................................................... 61.2 Types of malware ..................................................................................................................... 61.3 Current malware status c<strong>on</strong>cern<strong>in</strong>g the <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> sector .......................................... 71.4 St<strong>and</strong>ardizati<strong>on</strong> <strong>and</strong> related organizati<strong>on</strong>s ................................................................................. 81.4.1 ICT <strong>security</strong> st<strong>and</strong>ards ...................................................................................................... 81.4.2 Industrial automati<strong>on</strong> st<strong>and</strong>ards ........................................................................................ 91.4.3 Other <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> <strong>security</strong> related organizati<strong>on</strong>s <strong>and</strong> st<strong>and</strong>ards ......................... 111.4.4 St<strong>and</strong>ardizati<strong>on</strong> summary ............................................................................................... 112 Generic <strong>security</strong> c<strong>on</strong>siderati<strong>on</strong>s ...................................................................................................... 112.1 Attacks <strong>and</strong> scenarios ............................................................................................................. 122.2 Security program .................................................................................................................... 123 Security <strong>in</strong> communicati<strong>on</strong> between devices .................................................................................. 133.1 Purpose of communicati<strong>on</strong> ..................................................................................................... 133.2 Security threats <strong>and</strong> issues ...................................................................................................... 143.2.1 Rec<strong>on</strong>naissance activity .................................................................................................. 153.2.2 Attacks <strong>on</strong> communicati<strong>on</strong> ............................................................................................. 163.3 Traditi<strong>on</strong>al <strong>fieldbus</strong>es ............................................................................................................. 173.3.1 Modbus RTU.................................................................................................................. 183.3.2 PROFIBUS DP............................................................................................................... 193.3.3 CANopen ....................................................................................................................... 223.3.4 DeviceNet ...................................................................................................................... 233.4 Ethernet networks .................................................................................................................. 233.4.1 Ethernet physical layer ................................................................................................... 233.4.2 Ethernet data l<strong>in</strong>k layer ................................................................................................... 24


43.4.3 Internet Protocol ............................................................................................................. 243.4.4 Transport layer ............................................................................................................... 253.4.5 Network c<strong>on</strong>figurati<strong>on</strong> .................................................................................................... 253.4.6 Network topology ........................................................................................................... 263.4.7 Industrial Ethernet protocols ........................................................................................... 273.5 Recommendati<strong>on</strong>s for enhanc<strong>in</strong>g <strong>security</strong> ............................................................................... 314 Security <strong>in</strong> field devices ................................................................................................................. 324.1 Security threats <strong>and</strong> issues ...................................................................................................... 324.1.1 Informati<strong>on</strong> leakage ........................................................................................................ 324.1.2 Tamper<strong>in</strong>g risks .............................................................................................................. 324.2 Simple field devices ............................................................................................................... 334.3 Embedded devices with real-time operat<strong>in</strong>g systems ............................................................... 334.4 Embedded devices with general-purpose operat<strong>in</strong>g systems .................................................... 344.4.1 Operat<strong>in</strong>g system vulnerabilities ..................................................................................... 344.4.2 Open-source systems ...................................................................................................... 344.4.3 General-purpose operat<strong>in</strong>g systems ................................................................................. 344.5 Recommendati<strong>on</strong>s for enhanc<strong>in</strong>g <strong>security</strong> <strong>in</strong> devices .............................................................. 354.5.1 Debugg<strong>in</strong>g <strong>in</strong>terfaces ...................................................................................................... 354.5.2 Communicati<strong>on</strong> <strong>in</strong>terfaces .............................................................................................. 354.5.3 Firmware protecti<strong>on</strong> ....................................................................................................... 364.5.4 Device parameters <strong>and</strong> c<strong>on</strong>figurati<strong>on</strong> .............................................................................. 374.5.5 Firmware updat<strong>in</strong>g ......................................................................................................... 374.5.6 Superfluous <strong>in</strong>formati<strong>on</strong> ................................................................................................. 375 Security <strong>in</strong> wireless communicati<strong>on</strong>s.............................................................................................. 385.1 Security of wireless technology .............................................................................................. 385.1.1 IEEE 802.15.4 ................................................................................................................ 395.1.2 Wireless LAN ................................................................................................................ 39


55.1.3 Bluetooth........................................................................................................................ 395.2 Recommendati<strong>on</strong>s for improv<strong>in</strong>g wireless network <strong>security</strong>.................................................... 406 Summary ....................................................................................................................................... 417 References ..................................................................................................................................... 42


7however they quite often c<strong>on</strong>sume b<strong>and</strong>width<strong>and</strong> cause harm due to <strong>in</strong>creased network traffich<strong>in</strong>der<strong>in</strong>g important <strong>in</strong>formati<strong>on</strong> exchange.Worms with payload (i.e. code designed toperform acti<strong>on</strong>s <strong>on</strong> the <strong>in</strong>fected system) cancause damage to the <strong>in</strong>fected mach<strong>in</strong>e <strong>and</strong> itssystem.Viruses are also designed to self-replicate <strong>and</strong>spread to new mach<strong>in</strong>es. The F-Secureterm<strong>in</strong>ology [1] menti<strong>on</strong>s a key characteristic ofviruses be<strong>in</strong>g the replicati<strong>on</strong> mechanism. Theterm<strong>in</strong>ology further notes that viruses comm<strong>on</strong>ly<strong>in</strong>fect certa<strong>in</strong> files, such as EXE or COM files <strong>on</strong>PC systems, or the Master Boot Record of harddrives <strong>and</strong> similar.Trojan horses are, accord<strong>in</strong>g to the F-Secureterm<strong>in</strong>ology [1] a program which appears toperform some acti<strong>on</strong> which may be desired bythe user, but <strong>in</strong> reality performs some other(often undesired) acti<strong>on</strong> without the userknow<strong>in</strong>g. Essentially, the functi<strong>on</strong> of theprogram is to make the user allow it <strong>in</strong>side thesafe boundaries of the system, before silentlybeg<strong>in</strong>n<strong>in</strong>g to execute malicious acti<strong>on</strong>s.1.3 Current malware statusc<strong>on</strong>cern<strong>in</strong>g the <strong><strong>in</strong>dustrial</strong>automati<strong>on</strong> sectorFor more than 25 years malware has targeted theIT world. In the beg<strong>in</strong>n<strong>in</strong>g, malware was easy todetect s<strong>in</strong>ce it modified the visible c<strong>on</strong>tent of thescreen. Nowadays, malware tries to hide itself asmuch as possible which makes it difficult todetect. Furthermore, f<strong>in</strong>ancially motivatedcybercrim<strong>in</strong>als are exploit<strong>in</strong>g hundreds ofthous<strong>and</strong>s of PC’s <strong>in</strong> order to make m<strong>on</strong>ey. Untilrecently the <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> sector has notbeen touched by malware.Stuxnet, probably created <strong>in</strong> 2009, has shownlike no other former malware that <strong>security</strong> issuesdo not <strong>on</strong>ly reside <strong>in</strong> the regular IT-world, butalso <strong>in</strong> the <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> sector. S<strong>in</strong>cegeneral purpose operat<strong>in</strong>g systems like W<strong>in</strong>dowsare used <strong>in</strong> the scope of SCADA, vulnerabilitiesaffect<strong>in</strong>g the latter operat<strong>in</strong>g systems can alsoaffect the <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> sector.Stuxnet is a worm which is capable of spread<strong>in</strong>gvia USB-Sticks from W<strong>in</strong>dows mach<strong>in</strong>e toW<strong>in</strong>dows mach<strong>in</strong>e. Therefore, an <strong>in</strong>fectedmach<strong>in</strong>e does not necessarily need to bec<strong>on</strong>nected to the Internet. Stuxnet is us<strong>in</strong>g zerodayvulnerabilities (vulnerabilities which havenot been known) <strong>and</strong> therefore, it is verydifficult to protect aga<strong>in</strong>st Stuxnet <strong>in</strong>fecti<strong>on</strong>seven with an up-to-date <strong>and</strong> patched W<strong>in</strong>dowssystem.Once Stuxnet has successfully <strong>in</strong>stalled itself <strong>on</strong>a W<strong>in</strong>dows mach<strong>in</strong>e, it is capable of search<strong>in</strong>gfor automati<strong>on</strong> systems. Moreover, it is look<strong>in</strong>gfor Siemens’ Simatic factory systems, the socalled SCADA systems. If Stuxnet cannot f<strong>in</strong>dany SCADA systems, it will rema<strong>in</strong> silent <strong>and</strong>does not pursue any activity. On the other h<strong>and</strong>,if an automati<strong>on</strong> system is found <strong>and</strong> morespecifically high-frequency c<strong>on</strong>verter drives,Stuxnet tries to alter its functi<strong>on</strong><strong>in</strong>g.The reas<strong>on</strong> why Stuxnet is so special is that it isvery complex software <strong>and</strong> seems to be part of atargeted attack. Simply the size of the b<strong>in</strong>ary, 1.5Mb, is unusually big for malware. Furthermore,it employs 5 exploits, 4 of them be<strong>in</strong>g zero-dayvulnerabilities. A s<strong>in</strong>gle zero-day vulnerabilitycosts about $50 000 to $500 000, which makesStuxnet a very expensive malware. F<strong>in</strong>ally, <strong>in</strong>order to operate as silently as possible, Stuxnethas been signed with a stolen certificate.All these three facts already make it clear thatthis malware has been created by a highlysophisticated attacker with a c<strong>on</strong>siderableamount of resources. Stuxnet was found <strong>in</strong> June2010 <strong>and</strong> accord<strong>in</strong>g to different sources it wascreated dur<strong>in</strong>g 2009. This means those


8professi<strong>on</strong>al attackers are able to target <strong><strong>in</strong>dustrial</strong>automati<strong>on</strong> systems <strong>and</strong> rema<strong>in</strong> undetected formore than <strong>on</strong>e year. Furthermore, Stuxnet hasbeen <strong>in</strong>stalled <strong>on</strong> many computers worldwide.Would have been a targeted malware <strong>in</strong>stalled<strong>on</strong> 15 computers be detected anytime?On October 18 th of 2011 a new malware calledDuqu which is very similar to Stuxnet wasdiscovered. Compile times of this new malwarecould <strong>in</strong>dicate that it has been created <strong>in</strong> thebeg<strong>in</strong>n<strong>in</strong>g of 2010. Duqu’s <strong>in</strong>tenti<strong>on</strong> is not toalter any functi<strong>on</strong><strong>in</strong>g of <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong>systems, but rather to collect sensitive<strong>in</strong>formati<strong>on</strong> <strong>and</strong> send it to a remote server.Therefore, it can be c<strong>on</strong>sidered more as a k<strong>in</strong>d ofTrojan Spy.Although the maturity of malware <strong>and</strong> the rate ofoccurrence <strong>in</strong> the <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> sectorare still quite low it is foreseeable that attacksmay become more frequent <strong>and</strong> severe <strong>in</strong> thefuture. Potential scenarios might <strong>in</strong>cludev<strong>and</strong>alism or sabotag<strong>in</strong>g of <strong><strong>in</strong>dustrial</strong> plants,municipal services or critical <strong>in</strong>frastructure justfor fun (by everyday hackers) or possibly thehijack<strong>in</strong>g <strong>and</strong>/or blackmail<strong>in</strong>g of entire plants.In c<strong>on</strong>clusi<strong>on</strong>, there exist highly sophisticated<strong>and</strong> f<strong>in</strong>ancially well-established malwarecreators target<strong>in</strong>g <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> systems.Nevertheless, there are signs that v<strong>and</strong>alismcases are occurr<strong>in</strong>g <strong>in</strong> the <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong>sector, with similarities to v<strong>and</strong>alism caused byhackers <strong>in</strong> the ICT sector. Therefore it is crucialto analyze the risks <strong>and</strong> create appropriatedefenses.1.4 St<strong>and</strong>ardizati<strong>on</strong> <strong>and</strong> relatedorganizati<strong>on</strong>sGenerally, st<strong>and</strong>ardizati<strong>on</strong> aims to providecomm<strong>on</strong>ly approved methods <strong>and</strong> practices toenable transparency <strong>in</strong> def<strong>in</strong>ed areas. With thehelp of st<strong>and</strong>ardizati<strong>on</strong> people can do e.g.<strong>in</strong>ternet bank<strong>in</strong>g safely <strong>and</strong> securely or use theirmobile ph<strong>on</strong>es. Also <strong><strong>in</strong>dustrial</strong> st<strong>and</strong>ardsfacilitate global trade, protect human life (safety)<strong>and</strong> lately to drive more <strong>and</strong> more so called"green values". ICT has met the challenges of<strong>security</strong> for a relatively l<strong>on</strong>g period. This canalso be seen when st<strong>and</strong>ardizati<strong>on</strong> activities <strong>in</strong><strong>security</strong> sector are briefly <strong>in</strong>troduced.1.4.1 ICT <strong>security</strong> st<strong>and</strong>ardsInternati<strong>on</strong>al telecommunicati<strong>on</strong> uni<strong>on</strong> (ITU)has group “ITU-T Study Group 17 – Security”which operates <strong>and</strong> covers a wide spectrum ofapplicati<strong>on</strong> areas for <strong>security</strong>. It has publishedover seventy st<strong>and</strong>ards (ITU-TRecommendati<strong>on</strong>s) focus<strong>in</strong>g <strong>on</strong> <strong>security</strong>. Onekey reference is X.509 which has enabledelectr<strong>on</strong>ic authenticati<strong>on</strong> over public networksbe<strong>in</strong>g an enabler for the rise of e-bus<strong>in</strong>ess. SG17 is active <strong>in</strong> st<strong>and</strong>ard development <strong>and</strong> <strong>in</strong>coord<strong>in</strong>ati<strong>on</strong> between applicati<strong>on</strong>s specificgroups (e.g. SmartGrid <strong>security</strong>) <strong>and</strong> otherorganizati<strong>on</strong>s. ITU st<strong>and</strong>ards are typically anunderly<strong>in</strong>g technology <strong>in</strong> <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong><strong>security</strong> or are l<strong>in</strong>ked to <strong>in</strong>dustry requirementsvia other organizati<strong>on</strong>s. [2]St<strong>and</strong>ardizati<strong>on</strong> work <strong>in</strong> IT <strong>security</strong> is also d<strong>on</strong>eby the Internati<strong>on</strong>al Organizati<strong>on</strong> forSt<strong>and</strong>ardizati<strong>on</strong> (ISO). Committee ISO/IEC JTC1/SC 6 Telecommunicati<strong>on</strong>s <strong>and</strong> Informati<strong>on</strong>Exchange Between Systems is develop<strong>in</strong>gtelecommunicati<strong>on</strong> st<strong>and</strong>ardizati<strong>on</strong> for theexchange of <strong>in</strong>formati<strong>on</strong> between open systems.This st<strong>and</strong>ardizati<strong>on</strong> <strong>in</strong>cludes both the lowerlayers that, as well as the upper layers thatsupport the applicati<strong>on</strong> protocols <strong>and</strong> services. [3]Resp<strong>on</strong>sible technical committee for the <strong>security</strong>is JTC 1/SC 27 IT Security techniques. Thereare 98 published st<strong>and</strong>ards <strong>and</strong> all of them areISO/IEC versi<strong>on</strong>s. The corresp<strong>on</strong>d<strong>in</strong>g technicalcommittee <strong>in</strong> IEC organizati<strong>on</strong> is ISO/IEC JTC1/SC 27 IT <strong>security</strong> techniques.


9The first st<strong>and</strong>ard has been published as early as1998. The focus is <strong>on</strong> protecti<strong>on</strong> of <strong>in</strong>formati<strong>on</strong><strong>and</strong> ICT. This <strong>in</strong>cludes generic methods,techniques <strong>and</strong> guidel<strong>in</strong>es to address both<strong>security</strong> <strong>and</strong> privacy aspects. [4]1.4.2 Industrial automati<strong>on</strong>st<strong>and</strong>ardsIndustrial <strong>security</strong> st<strong>and</strong>ardizati<strong>on</strong> work underthe Internati<strong>on</strong>al Electrotechnical Commissi<strong>on</strong>(IEC) is a relatively new area, when compared toIT activities under ISO. Usage of st<strong>and</strong>ard ITtechnologies <strong>and</strong> open systems <strong>in</strong> processc<strong>on</strong>trol has <strong>in</strong>creased the risk of <strong>security</strong> threats<strong>in</strong> the <strong>in</strong>dustry. C<strong>on</strong>nectivity to bus<strong>in</strong>ess/ITnetworks is also more <strong>and</strong> more comm<strong>on</strong> today.Also cyber attacks are more <strong>and</strong> more advancedtoday. This all means that there is a clear needfor <strong>in</strong>dustry specific st<strong>and</strong>ards/ specificati<strong>on</strong>s<strong>and</strong> references.Technical committee IEC/TC65 [5] <strong>and</strong> its foursub-committees prepare st<strong>and</strong>ards for <strong><strong>in</strong>dustrial</strong>automati<strong>on</strong> as well as process <strong>in</strong>dustry specificst<strong>and</strong>ards <strong>in</strong>clud<strong>in</strong>g <strong>security</strong> aspects. TC65 haspublished four generic <strong>security</strong> st<strong>and</strong>ards to thisday <strong>and</strong> there are six st<strong>and</strong>ards underc<strong>on</strong>structi<strong>on</strong> work. The focus of these st<strong>and</strong>ardsis <strong>on</strong> the network <strong>and</strong> system level.


10Table 1. A list of published IEC st<strong>and</strong>ards <strong>on</strong> <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> <strong>security</strong> (status 11/2011).St<strong>and</strong>ardIEC/TS 62443-1-1 Ed1.0 (2009-07-30)Industrial communicati<strong>on</strong> networks -Network <strong>and</strong> system <strong>security</strong> - Part 1-1:Term<strong>in</strong>ology, c<strong>on</strong>cepts <strong>and</strong> modelsIEC 62443-2-1 Ed1.0 (2010-11-10)Industrial communicati<strong>on</strong> networks -Network <strong>and</strong> system <strong>security</strong> - Part 2-1:Establish<strong>in</strong>g an <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> <strong>and</strong>c<strong>on</strong>trol system <strong>security</strong> programIEC/PAS 62443-3 Ed1.0 (2008-01-22)Security for <strong><strong>in</strong>dustrial</strong> processmeasurement <strong>and</strong> c<strong>on</strong>trol - Network <strong>and</strong>system <strong>security</strong>IEC/TR 62443-3-1 Ed1.0 (2009-07-30)Industrial communicati<strong>on</strong> networks -Network <strong>and</strong> system <strong>security</strong> - Part 3-1:Security technologies for <strong><strong>in</strong>dustrial</strong>automati<strong>on</strong> <strong>and</strong> c<strong>on</strong>trol systemsIEC/TR 62541-2 Ed1.0 (2010-02) OPCUnified Architecture – Part 2: SecurityModelNotesTechnical specificati<strong>on</strong> def<strong>in</strong>es accord<strong>in</strong>g to its namedef<strong>in</strong>iti<strong>on</strong>s around the topicSt<strong>and</strong>ard has a c<strong>on</strong>cept for a cyber-<strong>security</strong> managementsystem (CSMS) for <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> <strong>and</strong> c<strong>on</strong>trolsystems (IACS) <strong>in</strong>clud<strong>in</strong>g risk analysis, address<strong>in</strong>g riskswith CSMS <strong>and</strong> m<strong>on</strong>itor<strong>in</strong>g <strong>and</strong> improv<strong>in</strong>g CSMS.ISO/IEC 17799 <strong>and</strong> ISO/IEC 27001 are corresp<strong>on</strong>d<strong>in</strong>gst<strong>and</strong>ards for bus<strong>in</strong>ess/<strong>in</strong>formati<strong>on</strong> technology systems.This st<strong>and</strong>ard has focus <strong>in</strong> specialties <strong>in</strong> IACS as failurescan have impacts <strong>on</strong> health, safety <strong>and</strong> envir<strong>on</strong>ment (HSE)This part is published as a publicly available specificati<strong>on</strong>/pre-st<strong>and</strong>ard for <strong><strong>in</strong>dustrial</strong> c<strong>on</strong>trol system (ICS) <strong>security</strong>policy.ICS requirements for plant operati<strong>on</strong> can differ frombus<strong>in</strong>ess/IT systems (e.g. resp<strong>on</strong>se times) <strong>and</strong> theseaspects are taken <strong>in</strong>to account when sett<strong>in</strong>g specificati<strong>on</strong>sfor <strong>in</strong>dustry.Technical report IEC/TR 62443-3-1 helps to evaluatetechnologies <strong>and</strong> countermeasures to build <strong>security</strong> forIACS. Topic is divided <strong>in</strong>to categories: authenticati<strong>on</strong>,access c<strong>on</strong>trol, data encrypti<strong>on</strong> & validati<strong>on</strong>, management,IACS SW <strong>and</strong> physical <strong>security</strong>. Different measures are<strong>in</strong>troduced, evaluated <strong>and</strong> recommended for each category.This st<strong>and</strong>ard also <strong>in</strong>cludes recommendati<strong>on</strong>s for devicelevel.OPC Unified Architecture (OPC UA) <strong>security</strong> model focus<strong>on</strong> secur<strong>in</strong>g the data exchange between applicati<strong>on</strong>s.Security model describes the <strong>security</strong> threats of thephysical, hardware <strong>and</strong> software envir<strong>on</strong>ments for OPCUA use.


11Preparati<strong>on</strong> of <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> <strong>security</strong>IEC62443-st<strong>and</strong>ards is d<strong>on</strong>e based <strong>on</strong> theInternati<strong>on</strong>al Society of Automati<strong>on</strong> (ISA) work.ISA99 committee “Industrial Automati<strong>on</strong> <strong>and</strong>C<strong>on</strong>trol Systems Security” has orig<strong>in</strong>ally startedthis activity, which is now utilized by IEC. [6]A brief idea <strong>in</strong> this st<strong>and</strong>ardizati<strong>on</strong> is to divideprocess or plant <strong>in</strong> <strong>security</strong> z<strong>on</strong>es c<strong>on</strong>nected byc<strong>on</strong>duits <strong>and</strong> determ<strong>in</strong>e <strong>security</strong> by <strong>security</strong>assurance levels (SAL’s) (alike with safety<strong>in</strong>tegrity levels <strong>in</strong> functi<strong>on</strong>al safety). Detaileddef<strong>in</strong>iti<strong>on</strong> work based <strong>on</strong> this approach for the<strong>security</strong> system is <strong>on</strong>go<strong>in</strong>g.1.4.3 Other <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong><strong>security</strong> related organizati<strong>on</strong>s<strong>and</strong> st<strong>and</strong>ardsIEC technical committee TC 57 Power systemsmanagement <strong>and</strong> associated <strong>in</strong>formati<strong>on</strong>exchange is resp<strong>on</strong>sible for <strong>in</strong>ternati<strong>on</strong>alst<strong>and</strong>ards for power systems c<strong>on</strong>trol equipment<strong>and</strong> related systems <strong>and</strong> associated <strong>in</strong>formati<strong>on</strong>exchange. TC 57 launched the first st<strong>and</strong>ardabout data <strong>and</strong> communicati<strong>on</strong> <strong>security</strong> <strong>in</strong> 2003<strong>and</strong> there is a new series IEC 62351-1…8 for“Power systems management <strong>and</strong> associated<strong>in</strong>formati<strong>on</strong> exchange - Data <strong>and</strong>communicati<strong>on</strong>s <strong>security</strong>” available. Theavailability of electric power systems is vital fortoday’s <strong>in</strong>frastructure <strong>and</strong> as c<strong>on</strong>trol of thesesystems is based <strong>on</strong> digital communicati<strong>on</strong>stoday <strong>and</strong> they are geographically wide systems,the <strong>security</strong> challenge is addressed with <strong>in</strong>dustryspecific st<strong>and</strong>ard. Communicati<strong>on</strong>s protocols forsubstati<strong>on</strong> automati<strong>on</strong> like IEC 61850 are<strong>in</strong>cluded.ISO/IEC jo<strong>in</strong>t technical committee JTC 1 SC37is prepar<strong>in</strong>g st<strong>and</strong>ardizati<strong>on</strong> of generic biometrictechnologies perta<strong>in</strong><strong>in</strong>g to human be<strong>in</strong>gs tosupport <strong>in</strong>teroperability <strong>and</strong> data <strong>in</strong>terchangeam<strong>on</strong>g applicati<strong>on</strong>s <strong>and</strong> systems. Pers<strong>on</strong>alidentificati<strong>on</strong> & ID cards with biometrics <strong>and</strong>biometric data protecti<strong>on</strong>s techniques, biometric<strong>security</strong> test<strong>in</strong>g are excluded.The Internet Eng<strong>in</strong>eer<strong>in</strong>g Task Force (IETF,http://www.ietf.org) is a large open <strong>in</strong>ternati<strong>on</strong>alcommunity of network designers, operators,vendors, <strong>and</strong> researchers c<strong>on</strong>cerned with theevoluti<strong>on</strong> of the Internet architecture <strong>and</strong> thesmooth operati<strong>on</strong> of the Internet. One of theoperat<strong>in</strong>g areas is <strong>security</strong>, which has multiplework<strong>in</strong>g groups around different topics.1.4.4 St<strong>and</strong>ardizati<strong>on</strong> summarySt<strong>and</strong>ardizati<strong>on</strong> <strong>and</strong> related activities has str<strong>on</strong>gpositi<strong>on</strong> <strong>in</strong> ICT <strong>security</strong>. Nature ofst<strong>and</strong>ardizati<strong>on</strong> fits well <strong>in</strong> <strong>security</strong> as it offerstransparent <strong>and</strong> open platform for development.Technical soluti<strong>on</strong>s are reviewed by expertsglobally <strong>and</strong> the results are available <strong>in</strong> thepublic doma<strong>in</strong> for use <strong>in</strong> <strong>in</strong>dustry. Security ofautomati<strong>on</strong> is newer topic. However, there hasbeen active work by society <strong>and</strong> wider IECst<strong>and</strong>ardizati<strong>on</strong> is <strong>on</strong>go<strong>in</strong>g. Industry shouldadopt present automati<strong>on</strong> <strong>security</strong>st<strong>and</strong>ardizati<strong>on</strong> <strong>and</strong> prepare for the forthcom<strong>in</strong>goutcome. There are proven <strong>security</strong> methodsavailable; it’s more an <strong>in</strong>dustry task to applythem <strong>in</strong> proper <strong>and</strong> relevant extent. Somelimitati<strong>on</strong>s will apply <strong>in</strong> <strong>security</strong> realizati<strong>on</strong> dueto historical reas<strong>on</strong>s, but the current IECst<strong>and</strong>ardizati<strong>on</strong> approach gives a good start<strong>in</strong>gpo<strong>in</strong>t towards better automati<strong>on</strong> <strong>security</strong>.2 Generic <strong>security</strong>c<strong>on</strong>siderati<strong>on</strong>sGenerally known, the three most importantelements of <strong>in</strong>formati<strong>on</strong> <strong>security</strong> arec<strong>on</strong>fidentiality, <strong>in</strong>tegrity, <strong>and</strong> availability (CIA).In the scope of automati<strong>on</strong> systems the CIA triadmay shift to AIC, availability be<strong>in</strong>g the mostimportant characteristic of an <strong><strong>in</strong>dustrial</strong>automati<strong>on</strong> system.


12Informati<strong>on</strong> needs to be available if requested.Denials of Service attacks for <strong>in</strong>stance areattacks aga<strong>in</strong>st the availability of <strong>in</strong>formati<strong>on</strong>.Especially <strong>in</strong> <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> systems it iscrucial that the mach<strong>in</strong>es are work<strong>in</strong>g <strong>and</strong> that<strong>in</strong>formati<strong>on</strong> can be retrieved from them.Availability can be achieved by creat<strong>in</strong>g robustsystems with multiple layers of redundancy.Protecti<strong>on</strong> aga<strong>in</strong>st Denial of Service attacks haveto be put <strong>in</strong>to place.Integrity refers to protect<strong>in</strong>g <strong>in</strong>formati<strong>on</strong> aga<strong>in</strong>stunauthorized modificati<strong>on</strong>. It is necessary to beable to detect if the given <strong>in</strong>formati<strong>on</strong> isqualitatively valuable or not. If an attacker isable to alter <strong>in</strong>formati<strong>on</strong> this represents animportant threat which can be, depend<strong>in</strong>g <strong>on</strong> thecase, even worse than deleti<strong>on</strong> of <strong>in</strong>formati<strong>on</strong>.Integrity therefore guarantees that if the<strong>in</strong>formati<strong>on</strong> has been altered, then this can bedetected. Different approaches can achieve<strong>in</strong>tegrity, depend<strong>in</strong>g <strong>on</strong> the need. A simple hashfuncti<strong>on</strong> can be used to calculate the hash over<strong>in</strong>formati<strong>on</strong>. In other cases asymmetriccryptography might be employed <strong>in</strong> order to signdata with a private key. In both cases thelegitimate receiver will have the certa<strong>in</strong>ty thatthe <strong>in</strong>formati<strong>on</strong> has or has not been altereddur<strong>in</strong>g transit.C<strong>on</strong>fidentiality means that <strong>in</strong>formati<strong>on</strong> shouldbe protected aga<strong>in</strong>st unauthorized access. Thiscan for <strong>in</strong>stance be achieved by encrypt<strong>in</strong>g the<strong>in</strong>formati<strong>on</strong>. An attacker who is able to receivethe encrypted <strong>in</strong>formati<strong>on</strong> is not able to disclosethe c<strong>on</strong>tent of the <strong>in</strong>formati<strong>on</strong> (if properlyencrypted <strong>and</strong> the secret keys are kept secret).Therefore the c<strong>on</strong>fidentiality is guaranteed.A further c<strong>on</strong>cept which could be added to theCIA triad is called accountability. The <strong>in</strong>tenti<strong>on</strong>of accountability is to be able to attribute a givenacti<strong>on</strong> to a known actor. Furthermore, it mightbe necessary to know the time <strong>and</strong> activityperformed by the actor.2.1 Attacks <strong>and</strong> scenariosC<strong>on</strong>cern<strong>in</strong>g <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> systems,essentially two types of attacks seem to be themost important: Informati<strong>on</strong> leak<strong>in</strong>g attacks <strong>and</strong>tamper<strong>in</strong>g attacks. First, <strong>in</strong>formati<strong>on</strong> leak<strong>in</strong>g canhave an important impact <strong>on</strong> advantages forcompetitors <strong>and</strong> may also affect the trust of thecustomers. Sec<strong>on</strong>d, tamper<strong>in</strong>g can directly affecta customer <strong>and</strong> therefore represents an equallycritical threat. If an attacker is able tosuccessfully alter an <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong>system, the c<strong>on</strong>sequences will <strong>in</strong>evitably damagethe manufacturer. Secti<strong>on</strong>s 3.2 <strong>and</strong> 4.1 of this<str<strong>on</strong>g>white</str<strong>on</strong>g><str<strong>on</strong>g>paper</str<strong>on</strong>g> will expla<strong>in</strong> the detailedc<strong>on</strong>sequences.2.2 Security programUnless a <strong>security</strong> program already exists <strong>in</strong> anorganizati<strong>on</strong>, it is of high importance that <strong>on</strong>e isestablished. A <strong>security</strong> program comm<strong>on</strong>lydef<strong>in</strong>es the objectives, policies, <strong>and</strong> guidel<strong>in</strong>esregard<strong>in</strong>g <strong>in</strong>formati<strong>on</strong> <strong>security</strong>, <strong>and</strong> is alsoc<strong>on</strong>cerned with the practices used to analyze,implement, <strong>and</strong> ma<strong>in</strong>ta<strong>in</strong> <strong>security</strong> <strong>in</strong> anorganizati<strong>on</strong> <strong>and</strong> its systems. The <strong>security</strong>program should c<strong>on</strong>cern IT systems, <strong><strong>in</strong>dustrial</strong>c<strong>on</strong>trol systems, as well as the l<strong>in</strong>ks betweenthese two.The <strong>security</strong> objectives, policies, <strong>and</strong> guidel<strong>in</strong>esare important tools for employees <strong>and</strong> partnercompanies for underst<strong>and</strong><strong>in</strong>g why <strong>in</strong>formati<strong>on</strong><strong>security</strong> is important <strong>and</strong> how <strong>security</strong> isachieved <strong>in</strong> the organizati<strong>on</strong>. By help<strong>in</strong>g peopleto underst<strong>and</strong> their role <strong>in</strong> creat<strong>in</strong>g <strong>in</strong>formati<strong>on</strong><strong>security</strong>, it is easier for them to act securely <strong>in</strong>their daily tasks.A crucial aspect of the <strong>security</strong> program is thec<strong>on</strong>t<strong>in</strong>uous assessment of threats <strong>and</strong> risks,preventi<strong>on</strong> <strong>and</strong> countermeasures, <strong>and</strong> c<strong>on</strong>stantm<strong>on</strong>itor<strong>in</strong>g <strong>and</strong> improvement. The <strong>security</strong>program must be viewed as a c<strong>on</strong>t<strong>in</strong>uous process


13which ma<strong>in</strong>ta<strong>in</strong>s the <strong>in</strong>formati<strong>on</strong> <strong>security</strong> <strong>in</strong> theorganizati<strong>on</strong> at the required level.In the field of <strong><strong>in</strong>dustrial</strong> systems, the IEC 62443st<strong>and</strong>ard presents term<strong>in</strong>ology, models, <strong>and</strong>guidel<strong>in</strong>es for establish<strong>in</strong>g a <strong>security</strong> program.3 Security <strong>in</strong> communicati<strong>on</strong>between devicesThis secti<strong>on</strong> of the <str<strong>on</strong>g>white</str<strong>on</strong>g> <str<strong>on</strong>g>paper</str<strong>on</strong>g> describes<strong>security</strong> issues <strong>in</strong> the communicati<strong>on</strong> betweendevices, e.g. SCADA to PLC or field device,PLC to field device, or between field devices.3.1 Purpose of communicati<strong>on</strong>Communicati<strong>on</strong> between devices <strong>in</strong> an <strong><strong>in</strong>dustrial</strong>c<strong>on</strong>trol system enables real-time m<strong>on</strong>itor<strong>in</strong>g <strong>and</strong>c<strong>on</strong>trol of the target system <strong>and</strong> devices.Additi<strong>on</strong>ally, auxiliary functi<strong>on</strong>s such asparameterizati<strong>on</strong> <strong>and</strong> c<strong>on</strong>figurati<strong>on</strong>, assetmanagement, <strong>and</strong> potentially firmwareupgrad<strong>in</strong>g may take place <strong>in</strong> the communicati<strong>on</strong>.Higher level systems such as SCADA can bec<strong>on</strong>sidered to have more of a “coord<strong>in</strong>at<strong>in</strong>g” role,acquir<strong>in</strong>g data from the PLC <strong>and</strong> field devicelevel <strong>and</strong> utiliz<strong>in</strong>g this <strong>in</strong>formati<strong>on</strong> to supervise,c<strong>on</strong>trol <strong>and</strong> optimize the overall functi<strong>on</strong>ality ofthe system. Basic, n<strong>on</strong>-real-time c<strong>on</strong>trolexecuted by the SCADA might <strong>in</strong>clude chang<strong>in</strong>gor overrid<strong>in</strong>g setpo<strong>in</strong>t values. Acquired data isoften illustrated <strong>in</strong> a graphical user <strong>in</strong>terface.When discuss<strong>in</strong>g communicati<strong>on</strong> protocols <strong>and</strong>l<strong>in</strong>ks, the OSI reference model is comm<strong>on</strong>lyused to represent the layers of abstracti<strong>on</strong>provided by different protocols. The figurebelow illustrates the OSI model, <strong>in</strong> which acommunicati<strong>on</strong> relati<strong>on</strong>ship between devices A<strong>and</strong> B is viewed as c<strong>on</strong>sist<strong>in</strong>g of multiple layers.The applicati<strong>on</strong> layer <strong>on</strong> top has the highest levelof abstracti<strong>on</strong>, provid<strong>in</strong>g functi<strong>on</strong>ality which isrelated to the ma<strong>in</strong> functi<strong>on</strong>ality of the device.It is <strong>in</strong>terest<strong>in</strong>g to note that <strong>in</strong> the OSI model,which was <strong>in</strong>troduced <strong>in</strong> the late 1970s <strong>and</strong> early1980s, no layer explicitly c<strong>on</strong>siders the need forany <strong>security</strong>. Although this can be (<strong>and</strong> is)implemented <strong>in</strong>side layers <strong>in</strong> different protocols,the below illustrati<strong>on</strong> as comm<strong>on</strong>ly presenteddoes not detail the need for <strong>security</strong> functi<strong>on</strong>ality.If, <strong>in</strong> some systems, <strong>in</strong>termittent layers do notaddress <strong>security</strong> specifically, then thiscomm<strong>on</strong>ly has to be implemented <strong>in</strong> theapplicati<strong>on</strong> layer.Figure 2 The OSI seven-layer reference model.


14Depend<strong>in</strong>g <strong>on</strong> the communicati<strong>on</strong> l<strong>in</strong>k, not alllayers specified <strong>in</strong> the model are used. However,the purpose of the model is to illustrate that thelayer<strong>in</strong>g of protocols creates a k<strong>in</strong>d oftransparency; the layer<strong>in</strong>g of protocols meansthat communicati<strong>on</strong> follows the path of the bluedashed arrow, but to the applicati<strong>on</strong> layer itseems like it is communicat<strong>in</strong>g directly to theapplicati<strong>on</strong> layer of another device, as illustratedby the orange dashed arrow.3.2 Security threats <strong>and</strong> issuesThe use of communicati<strong>on</strong> networks has allowed<strong>in</strong>stallati<strong>on</strong>s to reduce the amount of cabl<strong>in</strong>grequired, compared to e.g. wired I/O c<strong>on</strong>trol <strong>and</strong>m<strong>on</strong>itor<strong>in</strong>g. The reduced cabl<strong>in</strong>g results <strong>in</strong>reduced costs <strong>and</strong> generally also a moremanageable <strong>in</strong>stallati<strong>on</strong>. Communicati<strong>on</strong> alsobetter utilizes the capabilities of modernelectr<strong>on</strong>ics. However, the available digitalcommunicati<strong>on</strong> <strong>in</strong>terfaces <strong>in</strong> both systems <strong>and</strong>devices pose <strong>security</strong> risks unless they arecorrectly addressed.The word ‘attack’ comm<strong>on</strong>ly means thedeliberate realizati<strong>on</strong> of a threat aga<strong>in</strong>st a system,with the purpose of evad<strong>in</strong>g or circumvent<strong>in</strong>g<strong>security</strong> measures <strong>and</strong> violat<strong>in</strong>g <strong>security</strong> policies.Attacks may be directed from outside anorganizati<strong>on</strong> or plant, but they may also be<strong>in</strong>itiated from with<strong>in</strong>. It is also possible thatattacks are <strong>in</strong>itiated due to a suitable opportunityaris<strong>in</strong>g, perhaps without significant plann<strong>in</strong>geffort. There are also attacks which are highlydeliberate <strong>and</strong> thoroughly planned, perhaps withsuch an important goal that large amounts ofm<strong>on</strong>ey, resources <strong>and</strong> time are used <strong>in</strong>implement<strong>in</strong>g the attack. Furthermore, <strong>security</strong>threats <strong>and</strong> issues may be associated with either<strong>in</strong>tenti<strong>on</strong>al or un<strong>in</strong>tenti<strong>on</strong>al acti<strong>on</strong>s of people, e.g.deliberate <strong>in</strong>correct operati<strong>on</strong> of equipment vs.<strong>in</strong>correct operati<strong>on</strong> due to ignorance or lack ofunderst<strong>and</strong><strong>in</strong>g of <strong>security</strong> policies.When view<strong>in</strong>g communicati<strong>on</strong> between devices,the <strong>security</strong> threats can essentially be viewed totarget either <strong>on</strong>e or both of the devices, or thecommunicati<strong>on</strong> l<strong>in</strong>k <strong>and</strong> data. Before attacks areexecuted, it is comm<strong>on</strong> that the attackerperforms some surveillance of the target system.Device ADevice BLayer 7Layer 1Applicati<strong>on</strong> layerPresentati<strong>on</strong> layerSessi<strong>on</strong> layerTransport layerNetwork layerData l<strong>in</strong>k layerPhysical layerApplicati<strong>on</strong> layerPresentati<strong>on</strong> layerSessi<strong>on</strong> layerTransport layerNetwork layerData l<strong>in</strong>k layerPhysical layerFigure 3. An illustrati<strong>on</strong> of the effects of <strong>on</strong>e layer <strong>in</strong> theOSI model be<strong>in</strong>g compromised.


15C<strong>on</strong>sider<strong>in</strong>g the OSI reference model, the threatsto a communicati<strong>on</strong> l<strong>in</strong>k may exist at any layerwhich is used. As an example, if the <strong>in</strong>formati<strong>on</strong>of a message is attacked <strong>on</strong> the data l<strong>in</strong>k layer,<strong>and</strong> the attacker succeeds <strong>in</strong> e.g. modify<strong>in</strong>g thesource address of a message such that it passesthrough <strong>security</strong> defenses, then the layers <strong>on</strong> topof the data l<strong>in</strong>k layer are also compromised. Thelayers above the data l<strong>in</strong>k layer assume that theframe check<strong>in</strong>g <strong>on</strong> the data l<strong>in</strong>k layer is reliable<strong>and</strong> has <strong>in</strong>dicated a positive match, mean<strong>in</strong>g thatthe encapsulated data shall be processed by thenext higher layer.It is not uncomm<strong>on</strong> that an organizati<strong>on</strong> or itsemployees needs to have remote access to<strong>in</strong>formati<strong>on</strong> <strong>and</strong> systems, comm<strong>on</strong>ly <strong>in</strong> the formof VPNs (Virtual Private Network). Thisfuncti<strong>on</strong>ality is enabled by tunnel<strong>in</strong>g protocolsus<strong>in</strong>g cryptography to communicate <strong>in</strong>formati<strong>on</strong>securely over an untrusted network. Often it iswr<strong>on</strong>gly believed either by an organizati<strong>on</strong> or itsemployees that the VPN system is immune to<strong>in</strong>trusi<strong>on</strong> or attacks. However, it is well-knownthat VPNs are comm<strong>on</strong>ly used forcommunicat<strong>in</strong>g sensitive <strong>in</strong>formati<strong>on</strong>, <strong>and</strong> <strong>in</strong>many cases a VPN allows access to anorganizati<strong>on</strong>’s IT networks <strong>and</strong> applicati<strong>on</strong>s. Inother words, VPN c<strong>on</strong>necti<strong>on</strong>s form an attractivetarget for attackers, <strong>and</strong> therefore emphasisneeds to be placed <strong>on</strong> analyz<strong>in</strong>g the <strong>security</strong> ofremote c<strong>on</strong>necti<strong>on</strong>s.Threats to the <strong>security</strong> of VPN soluti<strong>on</strong>s are notmerely technology-based, but are sometimesalso due to human ignorance or error. As anexample, even if the technical <strong>security</strong> issues ofa VPN system are resolved, an employee maymistakenly or <strong>in</strong>tenti<strong>on</strong>ally leak a username <strong>and</strong>password to a third party, effectivelycompromis<strong>in</strong>g the <strong>security</strong> of the entire system.If sent <strong>in</strong> pla<strong>in</strong>-text us<strong>in</strong>g e.g. unencrypted email,it is possible for a hacker perform<strong>in</strong>g trafficsniff<strong>in</strong>g to detect this <strong>in</strong>formati<strong>on</strong>.Over the last years, the use of remotec<strong>on</strong>necti<strong>on</strong>s for access<strong>in</strong>g <strong><strong>in</strong>dustrial</strong> c<strong>on</strong>trolsystems has <strong>in</strong>creased. The c<strong>on</strong>necti<strong>on</strong>s aremade either to a SCADA or DCS system,however sometimes such c<strong>on</strong>necti<strong>on</strong>s areestablished directly to PLCs or even to fielddevices. It is essential to acknowledge that <strong>in</strong>c<strong>on</strong>nect<strong>in</strong>g these devices to a network with<strong>in</strong>ternet access, the <strong><strong>in</strong>dustrial</strong> c<strong>on</strong>trol system <strong>and</strong>its devices are automatically exposed to threats.3.2.1 Rec<strong>on</strong>naissance activityLearn<strong>in</strong>g to know the target which is to beattacked is comm<strong>on</strong>ly the first step <strong>in</strong> the plan.This prestudy may <strong>in</strong>volve physically visit<strong>in</strong>gthe target if possible, obta<strong>in</strong><strong>in</strong>g <strong>in</strong>formati<strong>on</strong> byobserv<strong>in</strong>g <strong>and</strong> potentially steal<strong>in</strong>g <strong>in</strong>formati<strong>on</strong>.For determ<strong>in</strong><strong>in</strong>g the structure or topology of thecommunicati<strong>on</strong> network(s) <strong>in</strong> the targetedsystem, various approaches can be c<strong>on</strong>sidered.Informati<strong>on</strong> obta<strong>in</strong>ed through physical presence,as menti<strong>on</strong>ed above, may <strong>in</strong>cludeschematics/bluepr<strong>in</strong>ts or documentati<strong>on</strong> <strong>on</strong> thestructure of an electrical system. Alternatively,c<strong>on</strong>figurati<strong>on</strong> or project files used <strong>in</strong> c<strong>on</strong>trolsystems such as PLCs or SCADA systems mayprovide significant <strong>in</strong>formati<strong>on</strong> regard<strong>in</strong>g thelayout <strong>and</strong> operati<strong>on</strong> of a system. It is importantto recognize risks such as this k<strong>in</strong>d of documentleak<strong>in</strong>g dur<strong>in</strong>g the commissi<strong>on</strong><strong>in</strong>g phase of aplant, e.g. <strong>in</strong> the <strong>in</strong>teracti<strong>on</strong> with suppliers <strong>and</strong>subc<strong>on</strong>tractors.If access to a communicati<strong>on</strong> bus can beobta<strong>in</strong>ed, it may be possible for an <strong>in</strong>truder tolisten to the communicati<strong>on</strong> activity <strong>in</strong> thec<strong>on</strong>cerned bus or network. Apart from thecommunicati<strong>on</strong> which occurs frequently (e.g.m<strong>on</strong>itor<strong>in</strong>g <strong>and</strong> c<strong>on</strong>trol comm<strong>and</strong>s <strong>in</strong> the case ofan <strong><strong>in</strong>dustrial</strong> communicati<strong>on</strong> bus); <strong>in</strong>frequentlyor irregularly communicated <strong>in</strong>formati<strong>on</strong> may beof <strong>in</strong>terest to an <strong>in</strong>truder. Such <strong>in</strong>formati<strong>on</strong> may<strong>in</strong>clude passwords or other sensitive <strong>in</strong>formati<strong>on</strong>,but also e.g. proprietary protocols may be


16observed with the purpose of reverseeng<strong>in</strong>eer<strong>in</strong>g. It may also be possible to determ<strong>in</strong>esome structure of the bus or network based <strong>on</strong>the activity log.The way <strong>in</strong> which the targeted devices arephysically <strong>in</strong>stalled or located <strong>in</strong> the plant affectsthe possibilities to study the communicati<strong>on</strong>system <strong>and</strong>/or ga<strong>in</strong> access to it. If the devices arelocated <strong>in</strong>side cab<strong>in</strong>ets or electrical rooms, mostlikely there is <strong>on</strong>ly a communicati<strong>on</strong> cableenter<strong>in</strong>g <strong>and</strong> exit<strong>in</strong>g the enclosure. On the otherh<strong>and</strong>, if the devices are distributed across theplant <strong>in</strong> the vic<strong>in</strong>ity of the equipment or processc<strong>on</strong>trolled, this k<strong>in</strong>d of enclosure need not bepresent which means that the device may bemore exposed to a potential <strong>in</strong>truder.If an attacker is successful <strong>in</strong> determ<strong>in</strong><strong>in</strong>g thetype of devices <strong>in</strong> a system, additi<strong>on</strong>al<strong>in</strong>formati<strong>on</strong> about <strong>in</strong>dividual devices may oftenbe found <strong>on</strong>l<strong>in</strong>e. Such <strong>in</strong>formati<strong>on</strong> <strong>in</strong>cludes usermanuals <strong>and</strong> data sheets, <strong>and</strong> <strong>in</strong> the terms of<strong><strong>in</strong>dustrial</strong> communicati<strong>on</strong> often devicedescripti<strong>on</strong> files <strong>and</strong> examples <strong>on</strong> the k<strong>in</strong>ds ofmessages to use for <strong>in</strong>teract<strong>in</strong>g with the device.3.2.2 Attacks <strong>on</strong> communicati<strong>on</strong>The communicati<strong>on</strong> between devices can beattacked <strong>in</strong> different ways.An example of an attack <strong>on</strong> a communicati<strong>on</strong>bus is a man-<strong>in</strong>-the-middle attack, <strong>in</strong> which e.g.a gateway, switch or server is compromised. Inthis case, the <strong>in</strong>formati<strong>on</strong> which is <strong>in</strong>tended toflow through the <strong>in</strong>termediate comp<strong>on</strong>ent maybe read, modified <strong>and</strong>/or forwarded to a thirdpartybefore it is sent to its orig<strong>in</strong>al dest<strong>in</strong>ati<strong>on</strong>.This behavior may occur silently, avoid<strong>in</strong>gdetecti<strong>on</strong> while gather<strong>in</strong>g <strong>in</strong>formati<strong>on</strong> about thesystem. Theoretically, an <strong>in</strong>trusive device mightprovide <strong>in</strong>correct comm<strong>and</strong>s or data to thelegitimate devices, caus<strong>in</strong>g behavior whichdiffers from that which is <strong>in</strong>tended <strong>and</strong> expectedof the system. Depend<strong>in</strong>g <strong>on</strong> the system <strong>and</strong>circumstances, this may cause harm to thesystem, the equipment or the process which isc<strong>on</strong>trolled.Another approach to compromis<strong>in</strong>g acommunicati<strong>on</strong> bus is by overload<strong>in</strong>g the bus,essentially equivalent to a denial-of-service(DoS) attack. This k<strong>in</strong>d of attack will likely bedetected <strong>on</strong>ce it is executed. Overload<strong>in</strong>g of thebus or exhausti<strong>on</strong> of resources <strong>in</strong> the bus orsome device c<strong>on</strong>nected to it, may prevent thesystem from perform<strong>in</strong>g the functi<strong>on</strong>s that areexpected of it. The <strong>in</strong>ability to executefuncti<strong>on</strong>ality may mean that services are deniede.g. due to certificates or authorizati<strong>on</strong> not be<strong>in</strong>gcommunicated properly, which may prevent anoperator of the system from exercis<strong>in</strong>g c<strong>on</strong>trol.Also the <strong>in</strong>ability to c<strong>on</strong>trol setpo<strong>in</strong>t <strong>and</strong>/orm<strong>on</strong>itor actual values might cause the processc<strong>on</strong>trol to malfuncti<strong>on</strong>, potentially lead<strong>in</strong>g toequipment damage, risk of pers<strong>on</strong>al <strong>in</strong>jury,<strong>and</strong>/or f<strong>in</strong>ancial loss.Additi<strong>on</strong>ally the spoof<strong>in</strong>g of <strong>in</strong>formati<strong>on</strong> such assource or dest<strong>in</strong>ati<strong>on</strong> addresses forms anotherk<strong>in</strong>d of attack. Protocols <strong>and</strong> systems which arenot able to authenticate the source or dest<strong>in</strong>ati<strong>on</strong>address are vulnerable to spoof<strong>in</strong>g, <strong>and</strong> wouldgenerally need precauti<strong>on</strong>s to be taken by e.g.the applicati<strong>on</strong> layer to authenticate source <strong>and</strong>dest<strong>in</strong>ati<strong>on</strong> devices. This spoof<strong>in</strong>g may beutilized to make <strong>in</strong>trud<strong>in</strong>g devices act likelegitimate masters <strong>and</strong> attempt to c<strong>on</strong>trol slavedevices <strong>in</strong> a potentially harmful way.It is important to protect the master devices <strong>in</strong>the communicati<strong>on</strong> buses or networks of thec<strong>on</strong>trol system, regardless of which protocol orbus/network is <strong>in</strong> questi<strong>on</strong>. If a master devicegets compromised, the attacker can issuecomm<strong>and</strong>s appear<strong>in</strong>g “legitimate” to the slaves.It is important to note that if functi<strong>on</strong>al-safetyrelateddata is communicated over <strong>fieldbus</strong>esus<strong>in</strong>g the various functi<strong>on</strong>al-safety extensi<strong>on</strong>s to


17protocols, then e.g. man-<strong>in</strong>-the-middle attacksmay compromise the safety of the process. Sucha situati<strong>on</strong> may pose a significant risk to humansafety <strong>and</strong> also carries f<strong>in</strong>ancial risk. This isespecially true <strong>in</strong> systems where functi<strong>on</strong>alsafety is entirely implemented by the automati<strong>on</strong>system.3.3 Traditi<strong>on</strong>al <strong>fieldbus</strong>esIn this <str<strong>on</strong>g>white</str<strong>on</strong>g> <str<strong>on</strong>g>paper</str<strong>on</strong>g>, the term “traditi<strong>on</strong>al <strong>fieldbus</strong>”is used to refer to <strong>fieldbus</strong>es us<strong>in</strong>g a n<strong>on</strong>-Ethernet medium, for example (but not limitedto) CAN- or EIA485-based <strong>fieldbus</strong>es.Communicati<strong>on</strong> protocols used <strong>in</strong> <strong><strong>in</strong>dustrial</strong> <strong>and</strong>build<strong>in</strong>g automati<strong>on</strong> systems <strong>in</strong>clude e.g.Modbus RTU, PROFIBUS DP, CANopen,DeviceNet, BACnet MS/TP <strong>and</strong> LON.Many of these field buses are based <strong>on</strong> a masterslave<strong>in</strong>teracti<strong>on</strong> <strong>in</strong> which a master devicecomm<strong>and</strong>s <strong>and</strong> issues requests to the slavedevices. Such comm<strong>and</strong>s <strong>and</strong> <strong>in</strong>formati<strong>on</strong>returned by the slave devices is generallycommunicated cyclically at an update raterang<strong>in</strong>g from a matter of millisec<strong>on</strong>ds to sec<strong>on</strong>ds.In many field buses, the master device isresp<strong>on</strong>sible for h<strong>and</strong>l<strong>in</strong>g the start of the system,c<strong>on</strong>figur<strong>in</strong>g the slave devices <strong>and</strong> ensur<strong>in</strong>g thatthe system is operat<strong>in</strong>g correctly. A slave is notallowed to send messages to the bus unlessrequested by the master device, or if the slavehas the token <strong>in</strong> a “token-pass<strong>in</strong>g” system.diagnostics use, otherwise the <strong>in</strong>truder wouldneed to c<strong>on</strong>nect such a stub. Obta<strong>in</strong><strong>in</strong>g accessthrough an exist<strong>in</strong>g device likely <strong>in</strong>volveshijack<strong>in</strong>g or manipulati<strong>on</strong> of the firmware <strong>in</strong> abus node.Another factor possibly limit<strong>in</strong>g theattractiveness of target<strong>in</strong>g a traditi<strong>on</strong>al <strong>fieldbus</strong>may be the restricted openness <strong>and</strong> familiarity ofthe bus protocols. Although <strong>in</strong>formati<strong>on</strong> aboutthe protocols can be obta<strong>in</strong>ed with sufficienteffort, specificati<strong>on</strong>s about IP-based protocols(e.g. UDP, TCP <strong>and</strong> FTP) are easily accessed.However, this “<strong>security</strong> by obscurity” cannot beviewed to <strong>in</strong>crease system <strong>security</strong> c<strong>on</strong>siderably,because these legacy protocols are <strong>in</strong>creas<strong>in</strong>glybe<strong>in</strong>g replaced by st<strong>and</strong>ardized, welldocumentedprotocols. Additi<strong>on</strong>ally, an attackermay cause problems even by disrupt<strong>in</strong>g thephysical layer (electrical signals) <strong>and</strong> need notknow the communicati<strong>on</strong> protocols used <strong>in</strong> thesystem.Logg<strong>in</strong>g <strong>and</strong> analysis of the communicati<strong>on</strong> <strong>on</strong> atraditi<strong>on</strong>al <strong>fieldbus</strong> requires an access po<strong>in</strong>t tothe bus, as well as a tool for captur<strong>in</strong>g the framesbe<strong>in</strong>g communicated. As menti<strong>on</strong>ed earlier, thisk<strong>in</strong>d of eavesdropp<strong>in</strong>g or m<strong>on</strong>itor<strong>in</strong>g wouldrequire a direct access po<strong>in</strong>t with an <strong>in</strong>trusivedevice, or obta<strong>in</strong><strong>in</strong>g this <strong>in</strong>formati<strong>on</strong> through anexist<strong>in</strong>g device e.g. by hijack<strong>in</strong>g or us<strong>in</strong>g othermethods.One beneficial factor of traditi<strong>on</strong>al <strong>fieldbus</strong>es ascompared to Ethernet networks is the restrictedaccess to the bus. When a plant is commissi<strong>on</strong>ed,a specific set of devices are usually c<strong>on</strong>nected tothe bus. For an attacker to ga<strong>in</strong> access to the<strong>fieldbus</strong>, this would require either attach<strong>in</strong>g anunfamiliar device to the bus, or obta<strong>in</strong><strong>in</strong>g accessthrough an exist<strong>in</strong>g device.C<strong>on</strong>nect<strong>in</strong>g a new device to the bus likelyrequires a physical presence at the bus; theremay be a bus stub available for e.g. servic<strong>in</strong>g or


18Table 2. An overview of a few <strong>fieldbus</strong> protocols <strong>and</strong> their properties.Modbus RTU PROFIBUS DP CANopen DeviceNetSpeed9,6 – 19,2 kbit/s, orhigherup to 12 Mbit/s up to 1 Mbit/s 125, 250 <strong>and</strong> 500kbit/sCommunicati<strong>on</strong>schemeMaster-SlaveMaster-Slave(multiple Masterpossible)Master-Slave,Client-Server <strong>and</strong>Producer-C<strong>on</strong>sumerMaster-Slave(multiple Masterpossible) or Peerto-PeerAuthenticati<strong>on</strong>of devices?No authenticati<strong>on</strong> Device number Opti<strong>on</strong>al, e.g.vendor IDOpti<strong>on</strong>al, e.g.vendor IDSpoof<strong>in</strong>g of datapacketspossible?Yes Yes Yes YesRemarksMaster node has nospecific address Slave devicescannot know theidentity of themaster node.Implementati<strong>on</strong> isd<strong>on</strong>e preferably <strong>in</strong>Hardware.Implements a class2 Master which isused for e.g.diagnosticspurposes.In c<strong>on</strong>clusi<strong>on</strong>, <strong>on</strong>ly some buses use deviceauthenticati<strong>on</strong>, which is not especially spoofresistant.Once a malicious attacker is able to getaccess to the different buses, he can c<strong>on</strong>ductDenial of Service attacks <strong>and</strong> modify requests.3.3.1 Modbus RTUModbus RTU is a mapp<strong>in</strong>g of the Modbusapplicati<strong>on</strong> layer protocol <strong>on</strong> the EIA-485 seriall<strong>in</strong>e. This protocol is a master-slavecommunicati<strong>on</strong> bus featur<strong>in</strong>g a s<strong>in</strong>gle master. Interms of communicati<strong>on</strong>, the master co-ord<strong>in</strong>atesall transacti<strong>on</strong>s by issu<strong>in</strong>g a request <strong>and</strong> thenawait<strong>in</strong>g a resp<strong>on</strong>se from the correct slave. Them<strong>and</strong>atory supported bitrates are 9600 <strong>and</strong>19200 bits per sec<strong>on</strong>d but others may also besupported. The resp<strong>on</strong>se timeout, i.e. the time <strong>in</strong>which a slave must resp<strong>on</strong>d to a request by themaster, may be several sec<strong>on</strong>ds <strong>and</strong> isapplicati<strong>on</strong>-dependent.In the Modbus frames which are communicated,the master node has no specific device address;<strong>on</strong>ly slave devices are assigned an address.Additi<strong>on</strong>ally, the master can also use the address0 for broadcast messages, which are processedby all slave nodes.Because a Modbus request frame does notc<strong>on</strong>ta<strong>in</strong> a master address, the slave devicescannot verify whether the device issu<strong>in</strong>g the


19request is the legitimate master, or an <strong>in</strong>trud<strong>in</strong>gdevice. If the frame is valid <strong>and</strong> the slave is <strong>in</strong> asuitable state, the request may very likely beprocessed.The Modbus over serial l<strong>in</strong>e specificati<strong>on</strong> doesnot specify any m<strong>and</strong>atory requirement for themaster node to <strong>in</strong>dicate whether it has detectede.g. the presence of a sec<strong>on</strong>d master <strong>on</strong> thecommunicati<strong>on</strong> bus. Essentially, when a masternode <strong>in</strong> a Modbus-over-serial-l<strong>in</strong>e system is <strong>in</strong>the idle state, it does not receive any data fromthe bus. It might be the situati<strong>on</strong> that the busreceiver electr<strong>on</strong>ics is disabled. In this case, itneed not hear that another device is act<strong>in</strong>g as amaster node.S<strong>in</strong>ce the bitrate of the system can be low, <strong>and</strong>the resp<strong>on</strong>se timeout of the system is relativelyl<strong>on</strong>g, an <strong>in</strong>truder does not need advancedhardware to access the bus. Comm<strong>on</strong>ly, thebitrates <strong>in</strong> a Modbus RTU bus are compatiblewith those of a PC serial port, mean<strong>in</strong>g that apers<strong>on</strong> with a portable computer <strong>and</strong> suitableEIA-485 hardware <strong>and</strong> software can easilyc<strong>on</strong>nect to the bus <strong>and</strong> possibly enter thecommunicati<strong>on</strong> loop.An <strong>in</strong>trusive device which has access to the buscan perform a denial-of-service attack e.g. byplac<strong>in</strong>g its transmitter <strong>in</strong> the “active” state, asopposed to the “<strong>in</strong>active” state which allows thebus to be idle. Thus this rogue device couldreserve the bus without releas<strong>in</strong>g it, effectivelyprevent<strong>in</strong>g other devices from communicat<strong>in</strong>gnormally. The <strong>in</strong>trud<strong>in</strong>g device could alsoactivate its transmitter <strong>in</strong>termittently, result<strong>in</strong>g <strong>in</strong>what might seem like r<strong>and</strong>om errors <strong>in</strong> thecommunicati<strong>on</strong> <strong>on</strong> the bus.3.3.2 PROFIBUS DPPROFIBUS DP is a master-slavecommunicati<strong>on</strong> bus which supports the presenceof multiple masters <strong>in</strong> the network. The mastersshare the EIA-485 medium us<strong>in</strong>g a specialtelegram, <strong>in</strong> which <strong>on</strong>e master passes the tokento another master. Only the node which has thetoken can communicate. The PROFIBUS DPsystem can be c<strong>on</strong>figured to operate at up to 12Mbit per sec<strong>on</strong>d. The PROFIBUS DP protocolfeatures a watchdog functi<strong>on</strong>ality, which is usedby DP slaves to m<strong>on</strong>itor that the master devicesends updated I/O data frequently. Thewatchdog time is determ<strong>in</strong>ed <strong>in</strong> the master setup<strong>and</strong> can be c<strong>on</strong>figured from a few millisec<strong>on</strong>dsup to several m<strong>in</strong>utes, or it can be completelydisabled.It is very comm<strong>on</strong> that the PROFIBUS DPprotocol of a device is implemented <strong>in</strong> hardware,either by us<strong>in</strong>g a s<strong>in</strong>gle-chip soluti<strong>on</strong> which<strong>in</strong>cludes the protocol <strong>and</strong> an MCU core <strong>in</strong> thesame IC, or by us<strong>in</strong>g a separate MCU <strong>and</strong> aseparate ASIC which h<strong>and</strong>les the DP protocol. Itis also possible to implement PROFIBUS DP <strong>in</strong>software but it is rather uncomm<strong>on</strong>. Due to thehigh bitrates <strong>and</strong> thus tight tim<strong>in</strong>gs of theprotocol, a potential attacker likely needs topurchase suitable hardware for access<strong>in</strong>g the bus.There are two classes of masters <strong>in</strong> thePROFIBUS DP system; class 1 which iscyclically comm<strong>and</strong><strong>in</strong>g a number of slaves, <strong>and</strong>class 2 which is e.g. a laptop or programm<strong>in</strong>gc<strong>on</strong>sole which can be used for c<strong>on</strong>figurati<strong>on</strong>,ma<strong>in</strong>tenance or diagnostics. A class 2 master cancommunicate with other masters <strong>and</strong> their slaves;however it may <strong>on</strong>ly briefly perform actual I/Oc<strong>on</strong>trol. This is a managed feature which firstrequires stopp<strong>in</strong>g the data exchange with theprimary master.In each PROFIBUS DP message, two fields arereserved for the addresses of the send<strong>in</strong>g <strong>and</strong>receiv<strong>in</strong>g devices. A PROFIBUS DP slavedevice remembers the address number of themaster which <strong>in</strong>itialized it; thus an attackerneeds to detect the address of the masterc<strong>on</strong>troll<strong>in</strong>g a slave, <strong>in</strong> order to attempt tocomm<strong>and</strong> the slave us<strong>in</strong>g a spoofed address.


20When the bus system starts, masters whichperform cyclical data exchange <strong>in</strong>itialize theslaves which are assigned to them. This<strong>in</strong>itializati<strong>on</strong> c<strong>on</strong>sists of a parameterizati<strong>on</strong> <strong>and</strong> ac<strong>on</strong>figurati<strong>on</strong> step, <strong>in</strong> which the PROFIBUS DPparameters as well as possible vendor- ordevice-specific parameters are set <strong>in</strong> the slave.Additi<strong>on</strong>ally, the device number is verifiedaga<strong>in</strong>st that which the master expects, to ensurethat the correct type of device exists at thecorrect address. In the c<strong>on</strong>figurati<strong>on</strong> step, thelength <strong>and</strong> structure of the periodicallytransmitted I/O data is set, as def<strong>in</strong>ed <strong>in</strong> themaster setup. Both the parameterizati<strong>on</strong> <strong>and</strong>c<strong>on</strong>figurati<strong>on</strong> procedures can be accepted orrejected by the slave. Each slave keeps track ofwhich master address c<strong>on</strong>figured them for dataexchange.To avoid the c<strong>on</strong>flict<strong>in</strong>g situati<strong>on</strong> <strong>in</strong> whichdifferent masters try to comm<strong>and</strong> the same slave,it is possible to lock slaves to a s<strong>in</strong>gle class 1master (the master which performs the<strong>in</strong>itializati<strong>on</strong> procedure described above). It is,however, also possible that a slave is not locked,which would mean that a slave could be claimedby different masters. This is nevertheless morean issue of network management, i.e. ensur<strong>in</strong>gthat slaves are locked to their primary master.to read the Identificati<strong>on</strong> & Ma<strong>in</strong>tenance (I&M)<strong>in</strong>formati<strong>on</strong> from bus devices. The I&M is astructure of device identificati<strong>on</strong> <strong>in</strong>formati<strong>on</strong>which at a m<strong>in</strong>imum <strong>in</strong>cludes the I&M0<strong>in</strong>formati<strong>on</strong>, but opti<strong>on</strong>ally also other I&Mfields (see the table below) This k<strong>in</strong>d of<strong>in</strong>formati<strong>on</strong> about a device (which can beidentified us<strong>in</strong>g its slave number <strong>in</strong> the bus) canreveal what the device is do<strong>in</strong>g, the device type<strong>and</strong> give clues as to how its behavior could becompromised. The I&M <strong>in</strong>formati<strong>on</strong> may bechangeable by the owner or operator of a device,so <strong>in</strong> case this <strong>in</strong>formati<strong>on</strong> is not write-protected,an <strong>in</strong>truder may attempt to change the<strong>in</strong>formati<strong>on</strong>, e.g. change the text describ<strong>in</strong>gfuncti<strong>on</strong>, task, locati<strong>on</strong> or <strong>in</strong>stallati<strong>on</strong> date sothat identificati<strong>on</strong> of the device istampered.Table 3. The I&M <strong>in</strong>formati<strong>on</strong> <strong>in</strong>PROFIBUS <strong>and</strong> PROFINET devices.The PROFIBUS DP-V1 extensi<strong>on</strong> specifies anacyclic communicati<strong>on</strong> which can be used asneeded to e.g. read or write variables orparameters of a device, if it implements somedevice profile such as PROFIdrive or encoderprofile. A master class 2 can perform read <strong>and</strong>/orwrite operati<strong>on</strong>s targeted at a PROFIBUS DPslave device <strong>in</strong>dependent of the slave’srelati<strong>on</strong>ship to its primary master. This presentsrisk <strong>in</strong> case the master class 2 can modifyparameters which affect the operati<strong>on</strong> of thedevice.If a device ga<strong>in</strong>s access to the bus, <strong>and</strong> is able toperform DP-V1 functi<strong>on</strong>ality, then it can attempt


21I&M Field Informati<strong>on</strong> Descripti<strong>on</strong>I&M0 Manufacturer IDOrder IDSerial NumberHardware Revisi<strong>on</strong>Software Revisi<strong>on</strong>Revisi<strong>on</strong> CounterProfile IDProfile-specific typeI&M versi<strong>on</strong>I&Ms supportedNumber codeText str<strong>in</strong>gText str<strong>in</strong>gVersi<strong>on</strong> NumberVersi<strong>on</strong> NumberNumberNumberNumberVersi<strong>on</strong> NumberBitmaskReveals the device vendor.Reveals the order number of the device.Reveals the serial number of the device.Reveals the hardware revisi<strong>on</strong> of the device.Reveals the software revisi<strong>on</strong> of the device.Change counter.Reveals implemented device profile.Possible profile-specific code.Reveals implemented I&M versi<strong>on</strong>.Reveals which I&Ms are supported.I&M1 Functi<strong>on</strong> TagLocati<strong>on</strong> TagText str<strong>in</strong>gText str<strong>in</strong>gDescribes the functi<strong>on</strong> of the device.Describes the locati<strong>on</strong> of the device.I&M2 Installati<strong>on</strong> Date Text str<strong>in</strong>g Reveals the <strong>in</strong>stallati<strong>on</strong> date of the device.I&M3 Descriptor Text str<strong>in</strong>g Freely assignable comment/annotati<strong>on</strong>.I&M4 Signature Text str<strong>in</strong>g Can be used as signature for tools.


22As with e.g. Modbus RTU, an <strong>in</strong>trud<strong>in</strong>g devicecould issue a denial-of-service attack <strong>on</strong> thePROFIBUS DP bus by transmitt<strong>in</strong>g data either<strong>in</strong> bursts or c<strong>on</strong>t<strong>in</strong>uously. This wouldcompromise the normal communicati<strong>on</strong> <strong>in</strong> thesystem result<strong>in</strong>g <strong>in</strong> partial or complete loss offuncti<strong>on</strong>ality.3.3.3 CANopenCANopen is a higher-layer protocol which isbased <strong>on</strong> the CAN data l<strong>in</strong>k layer protocol.CANopen supports bitrates up to 1 Mbit persec<strong>on</strong>d. The network is managed by a s<strong>in</strong>gleNMT master that c<strong>on</strong>trols the devices <strong>on</strong> thenetwork. Different types of communicati<strong>on</strong> aredef<strong>in</strong>ed as “protocols” <strong>in</strong> CANopen, e.g. ProcessData Object (PDO), Service Data Object (SDO)<strong>and</strong> Network Management (NMT) whichprovide different sets of functi<strong>on</strong>ality to thesystem.The PDO protocol can be c<strong>on</strong>figured to transmit<strong>in</strong> either synchr<strong>on</strong>ous or asynchr<strong>on</strong>ous mode. Inthe synchr<strong>on</strong>ous mode, devices communicatetheir <strong>in</strong>put/output data with<strong>in</strong> a specified timew<strong>in</strong>dow of receiv<strong>in</strong>g a special SYNC comm<strong>and</strong>from a synchr<strong>on</strong>iz<strong>in</strong>g applicati<strong>on</strong>. Asynchr<strong>on</strong>ousdata is transmitted without any relati<strong>on</strong> to aSYNC comm<strong>and</strong>. The trigger<strong>in</strong>g of messagescan be event-driven, timer-driven or remotelyrequested. The asynchr<strong>on</strong>ous PDO protocol isvulnerable to an <strong>in</strong>trud<strong>in</strong>g device send<strong>in</strong>g data tothe bus e.g. with spoofed addresses.The CANopen protocol supports a nodeguard<strong>in</strong>g protocol, us<strong>in</strong>g which the NMT masterm<strong>on</strong>itors that slaves resp<strong>on</strong>d to a guard<strong>in</strong>grequest with<strong>in</strong> a specified time w<strong>in</strong>dow. If suchtimely resp<strong>on</strong>ses are not provided by a slave, orits NMT communicati<strong>on</strong> status changes then theNMT master should react <strong>on</strong> this event. Lifeguard<strong>in</strong>g is essentially allows the slave tom<strong>on</strong>itor the guard<strong>in</strong>g performed by the master,<strong>and</strong> allow<strong>in</strong>g the slave to react to not be<strong>in</strong>gguarded <strong>in</strong> a timely manner. Additi<strong>on</strong>ally,CANopen features a heartbeat mechanism <strong>in</strong>which a heartbeat producer cyclically transmits amessage to heartbeat c<strong>on</strong>sumers. Miss<strong>in</strong>gheartbeats <strong>in</strong>dicate that a slave has g<strong>on</strong>e offl<strong>in</strong>e<strong>and</strong> allows for reacti<strong>on</strong>. It is m<strong>and</strong>atory toimplement either guard<strong>in</strong>g or heartbeat.The CAN messages is shared by means of anarbitrati<strong>on</strong> of the CAN message priority. Thepriority is determ<strong>in</strong>ed based <strong>on</strong> a bit field whichis m<strong>and</strong>atory <strong>in</strong> all CAN frames. The hardwareof every CAN device is required <strong>and</strong> able todetect when another device is transmitt<strong>in</strong>g amessage with a higher priority. In this case, the“los<strong>in</strong>g” device backs off <strong>and</strong> cancels itstransmissi<strong>on</strong>, <strong>in</strong>stead listen<strong>in</strong>g to the “w<strong>in</strong>n<strong>in</strong>g”device.A device which ga<strong>in</strong>s access to the bus cansilently m<strong>on</strong>itor the bus <strong>and</strong> observe thecommunicati<strong>on</strong>. Additi<strong>on</strong>ally, a denial-ofserviceattack could be launched utiliz<strong>in</strong>g theautomatic, hardware-based arbitrati<strong>on</strong> of theCAN frame. If an <strong>in</strong>trusive device repeatedlytransmits messages with the highest of priorities,no “normal” CAN frames will be communicated<strong>on</strong> the bus as these will los<strong>in</strong>g the priorityarbitrati<strong>on</strong>. Effectively, the bus is overloaded<strong>and</strong> system functi<strong>on</strong>ality which relies up<strong>on</strong>communicati<strong>on</strong> will suffer. Guard<strong>in</strong>g orheartbeat protocols will trigger events after aspecified time, but communicati<strong>on</strong> is notpossible as l<strong>on</strong>g as the attack proceeds.In CANopen, the highest priority CAN frame isan NMT message for network management. TheNMT message c<strong>on</strong>ta<strong>in</strong>s <strong>on</strong>e octet of data which<strong>in</strong>dicates the requested state of the targeted node,<strong>and</strong> another octet which specifies the nodewhich should change its state when receiv<strong>in</strong>g theNMT message. If the node number is 0, allnodes receiv<strong>in</strong>g the message shall change theirstate. Thus, an <strong>in</strong>trusive device could c<strong>on</strong>trol thestate of the CANopen devices <strong>on</strong> the bus.


23It is also possible that an <strong>in</strong>trusive device whichhas access to the bus can transmit either valid or<strong>in</strong>valid data to the bus, corrupt<strong>in</strong>g some of thenormal communicati<strong>on</strong> <strong>in</strong> the system. In the caseof transmitt<strong>in</strong>g valid data, the <strong>in</strong>trud<strong>in</strong>g devicecan act as a master, comm<strong>and</strong><strong>in</strong>g slave devicesas it desires.CANopen specifies m<strong>and</strong>atory objects whichidentify the devices <strong>on</strong> the bus. An example isthe 1000h “Device Type” object, which c<strong>on</strong>ta<strong>in</strong>sthe device profile number which is implementedby the device. Another m<strong>and</strong>atory object is the1018h “Identity” object c<strong>on</strong>ta<strong>in</strong><strong>in</strong>g <strong>in</strong>formati<strong>on</strong>such as the vendor ID (m<strong>and</strong>atory) <strong>and</strong> possiblethe product code <strong>and</strong> revisi<strong>on</strong> number. Thisreadily available <strong>in</strong>formati<strong>on</strong> may allow an<strong>in</strong>truder to study the device c<strong>on</strong>figurati<strong>on</strong> <strong>in</strong> thenetwork, learn<strong>in</strong>g which k<strong>in</strong>ds of devices (based<strong>on</strong> device profiles) <strong>and</strong> whose devices (vendor<strong>in</strong>formati<strong>on</strong>) are present.CAN-<strong>in</strong>-Automati<strong>on</strong> (CiA), which is the userorganizati<strong>on</strong> for CANopen, has <strong>in</strong>itiated awork<strong>in</strong>g group <strong>on</strong> the topic of communicati<strong>on</strong><strong>security</strong> <strong>in</strong> CANopen <strong>and</strong> the reliable encrypti<strong>on</strong><strong>and</strong> decrypti<strong>on</strong> of CAN frames.3.3.4 DeviceNetDeviceNet is a c<strong>on</strong>necti<strong>on</strong>-based networkprotocol which is based <strong>on</strong> the CAN data l<strong>in</strong>klayer. The DeviceNet protocol supports threebitrates; 125, 250 <strong>and</strong> 500 kbit/s. Master-slave<strong>and</strong> peer-to-peer communicati<strong>on</strong> is supported byDeviceNet, still the majority of <strong>in</strong>stallati<strong>on</strong>sfollow the master-slave scheme. There may bemultiple masters <strong>on</strong> the same network.Like many other protocols, DeviceNet specifiesa m<strong>and</strong>atory “Identity” object which c<strong>on</strong>ta<strong>in</strong>s<strong>in</strong>formati<strong>on</strong> such as vendor ID, device type,product code, product name <strong>and</strong> revisi<strong>on</strong><strong>in</strong>formati<strong>on</strong>. This <strong>in</strong>formati<strong>on</strong> can provide an<strong>in</strong>truder with clues regard<strong>in</strong>g the devices whichare <strong>in</strong>stalled <strong>in</strong> the system.The master <strong>in</strong> a DeviceNet bus may scan thenetwork at startup with the purpose of verify<strong>in</strong>gthat the actual network corresp<strong>on</strong>ds to thatwhich is c<strong>on</strong>figured. It can use <strong>in</strong>formati<strong>on</strong> suchas the Identity object for check<strong>in</strong>g vendor IDnumbers <strong>and</strong> product codes. DeviceNet featuresan opti<strong>on</strong>al heartbeat functi<strong>on</strong>ality which is usedto m<strong>on</strong>itor the status of devices <strong>on</strong> the bus. Theheartbeat <strong>in</strong>terval can be c<strong>on</strong>figured to an <strong>in</strong>tegernumber of sec<strong>on</strong>ds, def<strong>in</strong><strong>in</strong>g the <strong>in</strong>tervals atwhich the slave device sends a heartbeatmessage to the master. If the heartbeat from aslave stops, the master <strong>in</strong>terprets this as a slavego<strong>in</strong>g offl<strong>in</strong>e <strong>and</strong> can react <strong>on</strong> this event.The DeviceNet data l<strong>in</strong>k layer is the same asused <strong>in</strong> e.g. CANopen or other CAN-basedprotocols, us<strong>in</strong>g priority arbitrati<strong>on</strong> <strong>in</strong> hardware.Because of this similarity, these protocols are allvulnerable to the same k<strong>in</strong>ds of attacks whichare targeted at the CAN data l<strong>in</strong>k layer or thephysical layer. An <strong>in</strong>trud<strong>in</strong>g device may m<strong>on</strong>itorthe bus, learn<strong>in</strong>g how the primary master opensc<strong>on</strong>necti<strong>on</strong>s to its slaves. The <strong>in</strong>truder mayimpers<strong>on</strong>ate the primary master <strong>and</strong> send<strong>in</strong>correct comm<strong>and</strong>s to the slave devices.3.4 Ethernet networksEthernet is a de facto st<strong>and</strong>ard medium <strong>in</strong>communicati<strong>on</strong>, with a multitude ofcommunicati<strong>on</strong> protocols <strong>and</strong> applicati<strong>on</strong>s. TheEthernet specificati<strong>on</strong> itself covers the twolowest layers of the OSI reference model(Physical Layer <strong>and</strong> Data L<strong>in</strong>k Layer), while theInternet Protocol (IP) suite <strong>and</strong> its core protocolsprovide Transport Layer (e.g. TCP, UDP) <strong>and</strong>Applicati<strong>on</strong> Layer (e.g. HTTP, FTP or TLS/SSL)functi<strong>on</strong>ality.3.4.1 Ethernet physical layerExcept for the lowest layers <strong>in</strong> the OSI referencemodel, an <strong>in</strong>creased level of abstracti<strong>on</strong> asprovided by higher layers also <strong>in</strong>vites to agreater risk for <strong>in</strong>trusi<strong>on</strong>, vulnerabilities <strong>and</strong>


24malicious activity. The Physical Layer isc<strong>on</strong>cerned with issues such as electricalcharacteristics <strong>and</strong> the encod<strong>in</strong>g of data <strong>in</strong> themedium, <strong>and</strong> <strong>in</strong> general does not implement any<strong>security</strong> features.3.4.2 Ethernet data l<strong>in</strong>k layerOn the next layer is presented the c<strong>on</strong>cept of theEthernet frame (of which there exist a fewdifferent types) c<strong>on</strong>ta<strong>in</strong><strong>in</strong>g am<strong>on</strong>gst other th<strong>in</strong>gsthe “MAC addresses” of the source <strong>and</strong>dest<strong>in</strong>ati<strong>on</strong> device. These six-octet MACaddresses were <strong>in</strong>tended to be a permanent <strong>and</strong>globally unique numerical identifier for eachnetwork device. However, <strong>in</strong> most modernhardware it is possible to change the MACaddress, which may be maliciously used <strong>in</strong> e.g.MAC spoof<strong>in</strong>g. An example of a MAC addressis 00:21:99:00:2D:A9.In an Ethernet MAC address, the first threeoctets form an OUI (Organizati<strong>on</strong>ally UniqueIdentifier) which is purchased by a devicevendor from the IEEE registrati<strong>on</strong> authority.These first three octets can be used to determ<strong>in</strong>ethe vendor of the device which is the sender orreceiver of an Ethernet frame. In other words, anattack which is <strong>in</strong>tended to target the equipmentof a specific vendor theoretically <strong>on</strong>ly needs theMAC address OUI to detect potential targets.The MAC address identifies a s<strong>in</strong>gle device,mean<strong>in</strong>g that a receiver cannot determ<strong>in</strong>e fromthe MAC address of an <strong>in</strong>com<strong>in</strong>g frame whetherthe sender is <strong>in</strong>stalled <strong>on</strong> the same networksegment (l<strong>in</strong>k) or <strong>on</strong> another segment which isbridged to the receiv<strong>in</strong>g device’s segment. Inother words, MAC address filter<strong>in</strong>g cannot beused to create <strong>security</strong> barriers based <strong>on</strong> networktopology.MAC address filter<strong>in</strong>g can be used to preventaccess to a network or prevent process<strong>in</strong>g of aframe, but it can be circumvented by an <strong>in</strong>truderwho knows how to spoof his or her MACaddress. If the <strong>in</strong>truder is able to f<strong>in</strong>d a MACaddress which is not filtered, it is possible thatthe <strong>in</strong>truder ga<strong>in</strong>s access to a network(depend<strong>in</strong>g <strong>on</strong> whether other protectivemeasures are <strong>in</strong> place) or that the frame isprocessed by the receiv<strong>in</strong>g device.3.4.3 Internet ProtocolInside an Ethernet frame, there may beenveloped an Internet Protocol (IP) datagram.Currently the IPv4 st<strong>and</strong>ard is most widely usedbut IPv6 is <strong>in</strong> deployment. The IP protocol is ac<strong>on</strong>necti<strong>on</strong>less protocol, mean<strong>in</strong>g that messagescan be sent from <strong>on</strong>e device <strong>on</strong> the network toanother without requir<strong>in</strong>g any priorarrangements e.g. h<strong>and</strong>shak<strong>in</strong>g. The sendermight believe that the receiver is <strong>on</strong> the network<strong>and</strong> capable of receiv<strong>in</strong>g data, when <strong>in</strong> fact it isnot. The IP protocol does not guarantee deliverysuccess or order of delivery, nor can it guaranteethat a transmitted message will be received <strong>on</strong>ly<strong>on</strong>ce by the recipient, as network c<strong>on</strong>diti<strong>on</strong>s maycause loss, duplicati<strong>on</strong> or out-of-order deliveryof IP packets. This k<strong>in</strong>d of reliability <strong>and</strong><strong>security</strong> requirements are enabled by the use ofhigher-layer protocols e.g. TCP.The IP protocol makes use of IP addresses (<strong>in</strong>IPv4 these are four-octet addresses) <strong>and</strong> subnetmasks which allow the subdivisi<strong>on</strong> of a network<strong>in</strong>to subnetworks. An example of an IP addressis 192.168.1.0, with a subnet mask of255.255.255.0. This example means that thesubnetwork has the network prefix “192.168.1”<strong>and</strong> the last eight bits of the IP address is usedfor identify<strong>in</strong>g <strong>in</strong>dividual devices <strong>in</strong> thatsubnetwork.The Address Resoluti<strong>on</strong> Protocol (ARP) isdesigned with the purpose of provid<strong>in</strong>g a wayfor devices <strong>and</strong> network<strong>in</strong>g equipment to resolvethe MAC address corresp<strong>on</strong>d<strong>in</strong>g to an IP address(i.e. learn<strong>in</strong>g the device identificati<strong>on</strong> number ofa specific network device). Sometimes there isalso the need for the opposite c<strong>on</strong>versi<strong>on</strong>, i.e.


25learn<strong>in</strong>g the IP address for a specific MACaddress. One protocol <strong>in</strong>tended for that use is theDynamic Host C<strong>on</strong>figurati<strong>on</strong> Protocol (DHCP).IP filter<strong>in</strong>g is the process of allow<strong>in</strong>g certa<strong>in</strong> IPdatagrams access to a network, or allow<strong>in</strong>gframes to be processed <strong>in</strong> a device. Differentfields of the datagram may be subject to filter<strong>in</strong>g,e.g. protocol type, datagram type, the source ordest<strong>in</strong>ati<strong>on</strong> IP address. If the filter rejects aframe based <strong>on</strong> its IP datagram, the frame isdiscarded as if it had never been received.If an <strong>in</strong>truder is able to c<strong>on</strong>figure the c<strong>on</strong>tents ofan IP datagram suitably, so that it passes the<strong>security</strong> sett<strong>in</strong>gs of a network device, it ispossible that he or she ga<strong>in</strong>s access to a networkor that a frame is processed by a receiv<strong>in</strong>gdevice.3.4.4 Transport layerThe Transport layer builds up<strong>on</strong> the services ofe.g. the Internet Protocol. This layer enables thedetecti<strong>on</strong> of miss<strong>in</strong>g or out-of-order frames, orretransmissi<strong>on</strong> of frames which have not beenacknowledged by the receiver. Additi<strong>on</strong>ally, thetransport layer may provide a c<strong>on</strong>cept ofc<strong>on</strong>necti<strong>on</strong>s between network devices, so that ah<strong>and</strong>shak<strong>in</strong>g is performed before data exchangecan commence between two devices. In theInternet Protocol suite, typical transport layerprotocols <strong>in</strong>clude the User Datagram Protocol(UDP) <strong>and</strong> the Transmissi<strong>on</strong> C<strong>on</strong>trol Protocol(TCP).In additi<strong>on</strong> to the aforementi<strong>on</strong>ed improvements,the transport layer protocols TCP <strong>and</strong> UDP<strong>in</strong>troduce the use of ports <strong>in</strong> communicati<strong>on</strong>endpo<strong>in</strong>ts. Ports are associated with a networkdevice IP address so that the two <strong>in</strong> comb<strong>in</strong>ati<strong>on</strong>form the complete source or dest<strong>in</strong>ati<strong>on</strong> addressfor a communicati<strong>on</strong> c<strong>on</strong>necti<strong>on</strong>. Some portnumbers are predef<strong>in</strong>ed for comm<strong>on</strong>ly usedservices, while some port numbers may be usedfor custom purposes. As an example, theModbus protocol over TCP uses the port number502.Firewalls are comm<strong>on</strong>ly c<strong>on</strong>figured to check theport numbers <strong>in</strong> Ethernet frames <strong>and</strong> allow ordisallow certa<strong>in</strong> traffic <strong>in</strong>to or out of a network.This functi<strong>on</strong>ality is referred to as portforward<strong>in</strong>g. An example of the use of portforward<strong>in</strong>g could be allow<strong>in</strong>g computers <strong>on</strong> theInternet to perform an HTTP access to a webserver with<strong>in</strong> a private LAN, by allow<strong>in</strong>gc<strong>on</strong>necti<strong>on</strong>s <strong>on</strong> the port 80 (which is reserved forHTTP traffic).When prepar<strong>in</strong>g for an attack, an <strong>in</strong>truder maytry to c<strong>on</strong>nect to a range of ports <strong>in</strong> sequence <strong>on</strong>a specific network device. This activity iscomm<strong>on</strong>ly referred to as port scann<strong>in</strong>g, thepurpose of which is to detect any open portswhich may be used as an entry po<strong>in</strong>t <strong>in</strong>to thedevice. Another type of scann<strong>in</strong>g is calledportsweep, <strong>in</strong> which c<strong>on</strong>necti<strong>on</strong> attempts to aspecific port number is made to multiplenetwork devices.3.4.5 Network c<strong>on</strong>figurati<strong>on</strong>The network<strong>in</strong>g equipment must be correctlyc<strong>on</strong>figured <strong>and</strong> appropriate <strong>security</strong> featuresmust be enabled. Because different equipmentsupports different opti<strong>on</strong>s for c<strong>on</strong>figurati<strong>on</strong>, it isdifficult to provide a comprehensive list ofth<strong>in</strong>gs to address. At a m<strong>in</strong>imum, however, thedefault username <strong>and</strong> password foradm<strong>in</strong>istrati<strong>on</strong> of the sett<strong>in</strong>gs must always bechanged, so that it is not trivial to change thesett<strong>in</strong>gs of equipment. Passwords forc<strong>on</strong>figur<strong>in</strong>g network equipment must be selectedwith good strength, i.e. hav<strong>in</strong>g different k<strong>in</strong>ds ofcharacters (numbers, upper- <strong>and</strong> lower-casecharacters, special characters) <strong>and</strong> withsufficient length.IP address filter<strong>in</strong>g <strong>in</strong> network<strong>in</strong>g equipmentmay prevent attackers with basic skills fromaccess<strong>in</strong>g the network. Similarly, MAC address


26filter<strong>in</strong>g is another barrier for prevent<strong>in</strong>g simpleattacks. URL filter<strong>in</strong>g may be applied <strong>in</strong> order toprevent pers<strong>on</strong>s <strong>in</strong>side the safe network z<strong>on</strong>esfrom access<strong>in</strong>g known, <strong>in</strong>secure c<strong>on</strong>tent <strong>in</strong> theInternet. Applicati<strong>on</strong>-level firewalls or <strong>on</strong>essupport<strong>in</strong>g stateful packet <strong>in</strong>specti<strong>on</strong> (SPI) canbe used to further <strong>in</strong>crease the level of <strong>security</strong>.Firewalls shall be c<strong>on</strong>figured <strong>in</strong> such a way that<strong>on</strong>ly the required functi<strong>on</strong>ality is open <strong>and</strong>enabled. Firewalls shall be used where needed,e.g. as required by the network <strong>security</strong> z<strong>on</strong>eswhich are setup for an organizati<strong>on</strong>. Firewallsfrom different vendors may be used <strong>in</strong> order toprovide some <strong>security</strong> due to diversificati<strong>on</strong>.Appropriate encrypti<strong>on</strong>s need to be used e.g. forwireless c<strong>on</strong>necti<strong>on</strong>s. As an example, manyWireless LAN (WLAN) routers support WEP,WPA <strong>and</strong> WPA2 encrypti<strong>on</strong>s. Of thesealternatives, WEP should not be used, WPA canbe used but WPA2 provides the best level of<strong>security</strong>. Furthermore, <strong>in</strong> order to <strong>in</strong>crease thelevel of <strong>security</strong>, WPA should be used <strong>in</strong> theenterprise mode (known as WPA-Enterprise orWPA-802.1X mode).Manufacturers’ recommendati<strong>on</strong>s regard<strong>in</strong>gwhich equipment works well together should befollowed. This is especially true if therecommendati<strong>on</strong> is based <strong>on</strong> <strong>security</strong>functi<strong>on</strong>ality.3.4.6 Network topologyIt is important to c<strong>on</strong>sider how the Ethernetnetwork is c<strong>on</strong>structed, <strong>in</strong> terms of topology.The bridg<strong>in</strong>g between networks of different<strong>security</strong>, e.g. between an Industrial Ethernetnetwork <strong>and</strong> an office- or IT-network, should becarefully c<strong>on</strong>sidered <strong>and</strong> c<strong>on</strong>figured.There is also a risk regard<strong>in</strong>g physical <strong>security</strong> ifthere are unused ports <strong>in</strong> Ethernet equipmentwhich can be used by an <strong>in</strong>truder to ga<strong>in</strong> accessto the network. Sometimes, unused ports <strong>in</strong>network<strong>in</strong>g equipment are used for portforward<strong>in</strong>g, which means that the traffic throughe.g. a switch or similar piece of equipment isforwarded to a certa<strong>in</strong>, unused port. This portcan be used for logg<strong>in</strong>g <strong>and</strong> traffic analysispurposes by e.g. c<strong>on</strong>nect<strong>in</strong>g a computer withsuitable capture software.Because Ethernet has become more popular <strong>in</strong>different automati<strong>on</strong> systems, there have alsoappeared a number of gateways <strong>and</strong> bridgeswhich allows c<strong>on</strong>necti<strong>on</strong> of Ethernet totraditi<strong>on</strong>al <strong>fieldbus</strong>es. These devices present anaccess po<strong>in</strong>t from an Ethernet network to <strong>fieldbus</strong>es, which were orig<strong>in</strong>ally designed to beclosed networks. The features of such gateways<strong>and</strong> bridges, such as <strong>in</strong>tegrated web <strong>in</strong>terfacesfor c<strong>on</strong>figurati<strong>on</strong> or m<strong>on</strong>itor<strong>in</strong>g with the purposeof allow<strong>in</strong>g simple c<strong>on</strong>figurati<strong>on</strong> possibly fromremote locati<strong>on</strong>s, may encourage the loosen<strong>in</strong>gof <strong>security</strong> c<strong>on</strong>figurati<strong>on</strong>s. As an example, thebrows<strong>in</strong>g of a web <strong>in</strong>terface generally requiresthe port 80, which is reserved for HTTPcommunicati<strong>on</strong>s, to be open. However, access tothe web server <strong>in</strong> a device from outside meansthat the HTTP port is also exposed to n<strong>on</strong><strong>in</strong>tendedusers, which may target attacks <strong>on</strong> it.Although this k<strong>in</strong>d of web <strong>in</strong>terface iscomm<strong>on</strong>ly protected by a username-passwordcomb<strong>in</strong>ati<strong>on</strong>, the default value is often listed <strong>in</strong>the device manual which is available <strong>on</strong>l<strong>in</strong>e.Although the password may be changed, it is notuncomm<strong>on</strong> that the new password has poorstrength, due to user/operator ignorance <strong>and</strong>/or<strong>in</strong>adequate <strong>in</strong>structi<strong>on</strong>s to choose the passwordcleverly. It is worth menti<strong>on</strong><strong>in</strong>g, that if an<strong>in</strong>truder manages to determ<strong>in</strong>e the password fora gateway (or some other network<strong>in</strong>g device) itmay be possible for the <strong>in</strong>truder to change thepassword, <strong>security</strong> sett<strong>in</strong>gs or other functi<strong>on</strong>alityrelated to the system.


273.4.6.1 Ethernet hubAn Ethernet hub is a layer 1 (physical layer)device which does not exam<strong>in</strong>e or manage thetraffic through it, ma<strong>in</strong>ly rebroadcast<strong>in</strong>g enter<strong>in</strong>gpackets to all the other ports. Because hubs aregenerally not c<strong>on</strong>cerned or even aware of framesor packets, they tend to operate mostly <strong>on</strong> rawdata. A c<strong>on</strong>sequence of this is that hubs do not<strong>in</strong>tegrate any <strong>security</strong> functi<strong>on</strong>ality <strong>and</strong> thusshould not be used <strong>in</strong> <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong>networks.3.4.7 Industrial Ethernet protocolsThere exist a large number of communicati<strong>on</strong>protocols which are based <strong>on</strong> the Ethernetmedium; some examples of <strong><strong>in</strong>dustrial</strong> protocols<strong>in</strong>clude PROFINET IO, EtherCAT, ModbusTCP, <strong>and</strong> EtherNet/IP. Other areas ofautomati<strong>on</strong> <strong>in</strong>clude BACnet/IP <strong>in</strong> build<strong>in</strong>gautomati<strong>on</strong> or GOOSE messag<strong>in</strong>g as def<strong>in</strong>ed byIEC 61850 <strong>in</strong> power systems communicati<strong>on</strong>.3.4.6.2 Ethernet switchBy an Ethernet switch it is generally meant alayer 2 (data l<strong>in</strong>k layer) device which routes databased <strong>on</strong> MAC addresses; however there arealso switches <strong>in</strong> higher layers. There aregenerally two k<strong>in</strong>ds of switches; unmanaged<strong>on</strong>es which have no c<strong>on</strong>figurati<strong>on</strong> <strong>in</strong>terface oropti<strong>on</strong>s, <strong>and</strong> managed <strong>on</strong>es which can bec<strong>on</strong>figured by the user.A switch discovers the devices which arec<strong>on</strong>nected to its ports <strong>and</strong> ma<strong>in</strong>ta<strong>in</strong>s a list ofsuch devices <strong>and</strong> their addresses. When anEthernet frame enters to the switch, the switchchecks its table to determ<strong>in</strong>e which port (if any)c<strong>on</strong>ta<strong>in</strong>s the device with a MAC addressmatch<strong>in</strong>g that of the frame. If a match is found,the frame is forwarded <strong>on</strong>ly to the c<strong>on</strong>cernedport.3.4.6.3 Ethernet routerAn Ethernet router is a layer 3 (network layer)device which routes data based <strong>on</strong> IP addresses,thus enabl<strong>in</strong>g the c<strong>on</strong>structi<strong>on</strong> of subnets. Itchecks the <strong>in</strong>com<strong>in</strong>g frames for their address<strong>in</strong>formati<strong>on</strong> <strong>and</strong> determ<strong>in</strong>es how to forward theframe, based <strong>on</strong> a rout<strong>in</strong>g table or rout<strong>in</strong>g policy.The rout<strong>in</strong>g table can be dynamically achievedus<strong>in</strong>g e.g. rout<strong>in</strong>g protocols; however anoperator may also c<strong>on</strong>figured static rout<strong>in</strong>g rulesmanually.


28Table 4. An overview of a few <strong><strong>in</strong>dustrial</strong> Ethernet protocols <strong>and</strong> their properties.Modbus TCPPROFINET IO EtherCAT EtherNet/IPModbus UDPCommunicati<strong>on</strong>schemeMaster-SlaveMaster-Slave (multipleMaster possible)Master-SlaveMaster-Slave(multipleMasterpossible) orPeer-to-PeerAuthenticati<strong>on</strong> ofdevices?Noauthenticati<strong>on</strong>Initializati<strong>on</strong>, vendorID <strong>and</strong> device IDOpti<strong>on</strong>al, e.g. vendorID, product code,revisi<strong>on</strong> number, serialnumberOpti<strong>on</strong>al, e.g.vendor IDSpoof<strong>in</strong>g of datapackets possible?YesYes. If an exist<strong>in</strong>gdevice cannot becompromised,specialized hardware isneededYes. If an exist<strong>in</strong>gdevice cannot becompromised,specialized hardwareis neededYesRemarksSometimesimplemented <strong>in</strong>hardware, especially <strong>in</strong>the class Isochr<strong>on</strong>ousReal-TimeHardwareimplementati<strong>on</strong> <strong>in</strong>slaves3.4.7.1 Modbus TCP <strong>and</strong> UDPModbus TCP is a mapp<strong>in</strong>g of the Modbusapplicati<strong>on</strong> layer protocol <strong>on</strong>to the TCP/IPtransport layer protocol. Another variant isModbus UDP which maps the same applicati<strong>on</strong>layer protocol <strong>on</strong>to the UDP protocol. Thesemapp<strong>in</strong>gs permit the use of Modbus <strong>on</strong> theEthernet medium.In Modbus TCP/UDP, the IP addresses are usedto identify devices. A Modbus TCP/UDP devicemay <strong>in</strong>clude functi<strong>on</strong>ality for both slave <strong>and</strong>master modes. The message framescommunicated <strong>in</strong> this network do not separatelyidentify a device as a master, which is analogousto the master not hav<strong>in</strong>g its own address <strong>in</strong> theModbus RTU protocol. Devices cannotauthenticate a device as a “legitimate” master.The difference between us<strong>in</strong>g TCP <strong>and</strong> UDP liesma<strong>in</strong>ly <strong>in</strong> the c<strong>on</strong>siderati<strong>on</strong> that Modbus <strong>on</strong> TCPensures that messages are reliably delivered, <strong>in</strong>order, while potentially reduc<strong>in</strong>g the timel<strong>in</strong>essof delivery. Us<strong>in</strong>g UDP, there is no guaranteethat messages are delivered <strong>in</strong> the correct order(or delivered at all), but the logic of miss<strong>in</strong>grequests/resp<strong>on</strong>ses <strong>and</strong> retry is moved to theModbus applicati<strong>on</strong> layer. Thus, tim<strong>in</strong>gc<strong>on</strong>siderati<strong>on</strong>s are different from the TCP case<strong>in</strong> which retransmissi<strong>on</strong>s are h<strong>and</strong>led by thetransport layer. Data such as setpo<strong>in</strong>t <strong>and</strong>/oractual values are relevant <strong>on</strong>ly for a short spanof time after “sampl<strong>in</strong>g”, thus there is little sense<strong>in</strong> try<strong>in</strong>g to retransmit these packets numerous


29times just because TCP says so. When us<strong>in</strong>gUDP, retransmissi<strong>on</strong> of old data can be avoided<strong>in</strong> case <strong>on</strong>e cycle of data is missed; the nextcycle with up-to-date data is sent <strong>in</strong>stead.The bridg<strong>in</strong>g between Modbus TCP or ModbusUDP <strong>in</strong>to the serial l<strong>in</strong>e variants, e.g. ModbusRTU, has become more comm<strong>on</strong> as IndustrialEthernet also <strong>in</strong>creases <strong>in</strong> popularity.3.4.7.2 PROFINET IOPROFINET IO is an Ethernet-based protocoldesigned for real-time communicati<strong>on</strong>. Theexperience ga<strong>in</strong>ed from the PROFIBUS <strong>fieldbus</strong>was <strong>in</strong>tegrated with the Industrial Ethernettechnology to create PROFINET. The masterdevice <strong>in</strong> a PROFINET IO system is called the“C<strong>on</strong>troller”, while slaves are referred to as“Devices”. Cyclic data exchange <strong>in</strong> PROFINETIO takes place directly <strong>in</strong> the Ethernet layer 2,not <strong>in</strong>volv<strong>in</strong>g any transport protocols such asUDP or TCP; the messages are addressed us<strong>in</strong>gthe MAC addresses of the PROFINET IOdevices. Acyclic data is exchanged us<strong>in</strong>g theUDP protocol.The cyclic data exchange c<strong>on</strong>necti<strong>on</strong>s arem<strong>on</strong>itored us<strong>in</strong>g a watchdog time, which isc<strong>on</strong>figured as a multiple of the update (cycle)time of the network. As an example, if theupdate time is 8 millisec<strong>on</strong>ds <strong>and</strong> the watchdogtime multiplier is 3, then the watchdog time willbe 24 millisec<strong>on</strong>ds. If the communicati<strong>on</strong> is idlefor l<strong>on</strong>ger than this period of time, the devicem<strong>on</strong>itor<strong>in</strong>g the watchdog will detect this event<strong>and</strong> execute some reacti<strong>on</strong>; however this isdevice- or user-specific.Because the PROFINET IO real-time dataexchange frames are communicated <strong>in</strong> theEthernet layer 2, these frames c<strong>on</strong>ta<strong>in</strong> <strong>on</strong>ly MACaddresses. This means that the real-time framescannot be communicated outside a subnet whichis delimited by a router, because routers formsubnets based <strong>on</strong> IP addresses as def<strong>in</strong>ed <strong>in</strong> layer3.A hardware implementati<strong>on</strong> is required for themost determ<strong>in</strong>istic class of PROFINET IOdevices, known as IRT (Isochr<strong>on</strong>ous Real Time).This is comm<strong>on</strong>ly an ASIC with <strong>in</strong>tegratedswitch <strong>and</strong> other functi<strong>on</strong>ality needed for thePROFINET IO IRT protocol.A PROFINET IO C<strong>on</strong>troller always needs toc<strong>on</strong>nect to a PROFINET IO Device us<strong>in</strong>g anexplicit “C<strong>on</strong>nect” message. After this theC<strong>on</strong>troller downloads startup parameters to thedevice, follow<strong>in</strong>g a h<strong>and</strong>shake verify<strong>in</strong>g that thestartup is successful <strong>and</strong> complete. An <strong>in</strong>truderwish<strong>in</strong>g to establish a c<strong>on</strong>necti<strong>on</strong> to a device, i.e.to act as a sec<strong>on</strong>d master, has to know how thedevice is structured <strong>and</strong> how to <strong>in</strong>itialize itproperly at startup. Based <strong>on</strong> vendor ID <strong>and</strong>device ID it may be possible to f<strong>in</strong>d the GSDMLdescripti<strong>on</strong> file for the device, however if thedevice is modular then know<strong>in</strong>g the truec<strong>on</strong>figurati<strong>on</strong> likely requires physical access ordocumentati<strong>on</strong> about the system.The PROFINET IO protocol furthermorerequires the same I&M functi<strong>on</strong>ality asdescribed for PROFIBUS DP earlier.PROFINET IO devices thus expose the same<strong>in</strong>formati<strong>on</strong> to any<strong>on</strong>e who can access it.At startup the PROFINET IO c<strong>on</strong>troller providesthe vendor ID <strong>and</strong> product ID that is c<strong>on</strong>figuredfor the targeted IO device. The device checks themaster’s expected <strong>in</strong>formati<strong>on</strong> aga<strong>in</strong>st its owndata <strong>and</strong> aborts the c<strong>on</strong>necti<strong>on</strong> request if amismatch occurs.Two potential methods of attack<strong>in</strong>g thecommunicati<strong>on</strong> <strong>in</strong> a PROFINET IO system aredescribed <strong>in</strong> [7]. The authors propose that it maybe possible to modify the outputs of aPROFINET IO Device without be<strong>in</strong>g detectedby either the Device or the C<strong>on</strong>troller.


303.4.7.3 EtherCATEtherCAT is a real-time Ethernet-based protocol<strong>in</strong> which the Ethernet frame moves similar to atra<strong>in</strong> al<strong>on</strong>g rails from the master, through allslave devices <strong>and</strong> back to the master devicewithout stopp<strong>in</strong>g. Slave devices process theEthernet frame “<strong>on</strong>-the-fly”, caus<strong>in</strong>g <strong>on</strong>ly a t<strong>in</strong>ydelay <strong>in</strong> each slave device. Devices take datafrom <strong>and</strong> put data to different secti<strong>on</strong>s of theEtherCAT frame, depend<strong>in</strong>g <strong>on</strong> how theEtherCAT master has c<strong>on</strong>figured the slaves atstartup. The “<strong>on</strong>-the-fly” process<strong>in</strong>g requires aspecialized hardware <strong>in</strong> the slave devices, whilethe master implementati<strong>on</strong> can utilize virtuallyany Ethernet network <strong>in</strong>terface such as PCnetwork<strong>in</strong>g cards. As a result, compromisedslaves could spoof at least data <strong>in</strong> the parts of theEtherCAT frame which they are c<strong>on</strong>figured toprocess. A compromised master, or <strong>on</strong>e which isthe subject of a man-<strong>in</strong>-the-middle attack, couldresult <strong>in</strong> spoofed data <strong>and</strong> altered c<strong>on</strong>figurati<strong>on</strong>of the slaves.Depend<strong>in</strong>g <strong>on</strong> the implementati<strong>on</strong>, theEtherCAT master can be c<strong>on</strong>figured to checkvarious aspects of the slave device, e.g. vendorID, product code, revisi<strong>on</strong> numbers <strong>and</strong> serialnumber at startup. These features are comm<strong>on</strong>lyopti<strong>on</strong>al <strong>and</strong> can be disabled.EtherCAT supports different subprotocols whichare tunneled <strong>in</strong> EtherCAT frames; examples ofsuch are CAN-over-EtherCAT (CoE) <strong>and</strong>Ethernet-over-EtherCAT (EoE). The CoEprotocol is an <strong>in</strong>tegral part of EtherCAT <strong>and</strong> isused to identify, c<strong>on</strong>figure <strong>and</strong> c<strong>on</strong>trol the slaves.The EoE protocol is opti<strong>on</strong>al <strong>and</strong> allows n<strong>on</strong>-EtherCAT devices to be added to the systemus<strong>in</strong>g switchports, which “de-tunnel” theEthernet frames from the EtherCAT frames. It ispossible to tunnel Ethernet frames through themaster PLC if such a feature is implemented <strong>and</strong>enabled.Logg<strong>in</strong>g of the EtherCAT traffic may bepossible <strong>in</strong> case there is a switch <strong>in</strong> the networkwhich is c<strong>on</strong>figured to forward messages to anunused port. If the switch is not a real-timeswitch, the real-time attributes of the EtherCATcommunicati<strong>on</strong> may not be evident from the log.It may also be possible to log the EtherCATcommunicati<strong>on</strong> via the EtherCAT master, whichmay e.g. be PC-based runn<strong>in</strong>g W<strong>in</strong>dows.The EtherCAT protocol diagnoses the network<strong>and</strong> provides <strong>in</strong>dicati<strong>on</strong>s regard<strong>in</strong>g e.g. networkor slave problems. Additi<strong>on</strong>ally, the protocolsupports redundancy such that if the network isc<strong>on</strong>structed like a r<strong>in</strong>g, a broken or disc<strong>on</strong>nectedcable or node somewhere <strong>in</strong> the r<strong>in</strong>g does notprevent the operati<strong>on</strong> of other nodes.Furthermore, EtherCAT features timesynchr<strong>on</strong>izati<strong>on</strong> between master <strong>and</strong> slaves.It is possible that an <strong>in</strong>trud<strong>in</strong>g device whichga<strong>in</strong>s access to the network transmits messages<strong>in</strong>to the network, which easily disrupts theEtherCAT communicati<strong>on</strong>. This will <strong>in</strong>terferewith both c<strong>on</strong>trol <strong>and</strong> m<strong>on</strong>itor<strong>in</strong>g of the process<strong>and</strong> equipment, as data exchange is h<strong>in</strong>dered <strong>and</strong>furthermore time synchr<strong>on</strong>izati<strong>on</strong>-dependentfuncti<strong>on</strong>ality is disrupted.3.4.7.4 EtherNet/IPEtherNet/IP is an Ethernet-based protocol whichimplements the Comm<strong>on</strong> Industrial Protocol(CIP) which is also used <strong>in</strong> DeviceNet.EtherNet/IP uses the UDP <strong>and</strong> TCP protocols forcommunicati<strong>on</strong>. EtherNet/IP follows the masterslave<strong>and</strong> peer-to-peer communicati<strong>on</strong> models ascomm<strong>on</strong> <strong>in</strong> other protocols.The EtherNet/IP protocol presents the same“Identity” object as DeviceNet, thus this<strong>in</strong>formati<strong>on</strong> can be used for detecti<strong>on</strong> <strong>and</strong> studyof EtherNet/IP devices. An EtherNet/IP mastermay check the <strong>in</strong>formati<strong>on</strong> of a device, e.g.vendor ID <strong>and</strong> product ID, <strong>in</strong> order toauthenticate the device. Another similarity to


31DeviceNet is the heartbeat mechanism by whichthe network device states are m<strong>on</strong>itored.EtherNet/IP devices are subject to the genericthreats which face essentially all Ethernet-baseddevices, e.g. espi<strong>on</strong>age by logg<strong>in</strong>g of thenetwork communicati<strong>on</strong>, denial-of-serviceattacks, potential man-<strong>in</strong>-the-middle attacks, orattacks <strong>on</strong> a specific layer <strong>in</strong> the OSI model.3.5 Recommendati<strong>on</strong>s forenhanc<strong>in</strong>g <strong>security</strong>A large number of recommendati<strong>on</strong>s forenhanc<strong>in</strong>g the <strong>security</strong> <strong>in</strong> communicati<strong>on</strong>sbetween devices can be identified, but it is notpractical nor is it the purpose of this document toexhaustively list these. It must be rememberedthat no system is 100 % secure so that it couldnot be broken, given enough resources, time <strong>and</strong>motivati<strong>on</strong>; this also holds true forcommunicati<strong>on</strong> networks <strong>in</strong> <strong><strong>in</strong>dustrial</strong> c<strong>on</strong>trolsystems. The set of feasible improvements tothis k<strong>in</strong>d of <strong>security</strong> depends largely <strong>on</strong> the<strong>in</strong>dividual characteristics of a system, <strong>and</strong> themodeled threats, tolerated risk <strong>and</strong> derivedpriority for address<strong>in</strong>g vulnerabilities shall guidethe implementati<strong>on</strong> of <strong>security</strong> improvements.Physical <strong>security</strong> can be c<strong>on</strong>sidered of keyimportance c<strong>on</strong>cern<strong>in</strong>g access to thecommunicati<strong>on</strong> networks, especially <strong>in</strong> the caseof traditi<strong>on</strong>al <strong>fieldbus</strong>es, <strong>in</strong> which physicalaccess to the bus is necessary for maliciousbehavior. This is an important aspect also forEthernet-based networks, although attenti<strong>on</strong>must be paid <strong>in</strong> these networks also to remoteaccess. In terms of the <strong>security</strong> at the plant, <strong>on</strong>eitem to c<strong>on</strong>sider <strong>in</strong>cludes the cabl<strong>in</strong>g of the bus;the possibilities for an <strong>in</strong>truder to trace thecabl<strong>in</strong>g <strong>and</strong> document the system could bereduced. Also, lock<strong>in</strong>g devices <strong>in</strong>side cab<strong>in</strong>ets orelectrical rooms discloses fewer clues about theiruse, c<strong>on</strong>necti<strong>on</strong>s <strong>and</strong> c<strong>on</strong>figurati<strong>on</strong>s, comparedto devices which are not enclosed. The accessrights to physical locati<strong>on</strong>s <strong>in</strong> which criticalsystems are operat<strong>in</strong>g should be assessed <strong>and</strong>, ifdeemed necessary based <strong>on</strong> vulnerability <strong>and</strong>tolerated risk, restricted appropriately. It is alsopossible to implement critical communicati<strong>on</strong>l<strong>in</strong>ks us<strong>in</strong>g optical fiber, which are not easily<strong>in</strong>tercepted.Unused Ethernet ports <strong>in</strong> e.g. network equipment(switches, hubs) or <strong>in</strong> field devices (with<strong>in</strong>tegrated switch functi<strong>on</strong>ality) can be protectedfrom unauthorized use e.g. with plug guards,which are physically plugged <strong>in</strong>to the port. Theplug guard requires a key to be removed, thusprevent<strong>in</strong>g any<strong>on</strong>e not possess<strong>in</strong>g the key fromc<strong>on</strong>nect<strong>in</strong>g to the network.Functi<strong>on</strong>ality which is password-protected couldattempt to ensure that the factory-defaultpassword is changed to some other password.More importantly, such password-protecti<strong>on</strong>should require that the selected password fulfillscerta<strong>in</strong> requirements regard<strong>in</strong>g strength, such asrequir<strong>in</strong>g a mix of letters, numbers <strong>and</strong> specialcharacters, <strong>and</strong> hav<strong>in</strong>g a m<strong>in</strong>imum length of e.g.six or eight characters.Care should be taken to improve <strong>security</strong> also atthe lowest layers <strong>in</strong> the OSI model. As anexample, if the data l<strong>in</strong>k layer is compromisedfor <strong>in</strong>stance by a falsified source address ortampered data, the layers above <strong>in</strong> the OSImodel are also affected although they might notbe aware of the situati<strong>on</strong>.When select<strong>in</strong>g communicati<strong>on</strong> protocols for theprocess c<strong>on</strong>trol network, but also e.g. for remotec<strong>on</strong>necti<strong>on</strong>s, attenti<strong>on</strong> should be paid to the<strong>security</strong> features which are provided by theprotocols. As examples can be menti<strong>on</strong>ed thestrength of encrypti<strong>on</strong> or the protecti<strong>on</strong> aga<strong>in</strong>streplay attacks us<strong>in</strong>g sequence number<strong>in</strong>g <strong>and</strong> theease of circumvent<strong>in</strong>g these mechanisms. Also,when procur<strong>in</strong>g equipment for networks, the<strong>security</strong> functi<strong>on</strong>ality offered by different


32devices should be assessed, preferr<strong>in</strong>g deviceswith advanced <strong>security</strong> opti<strong>on</strong>s. A look at theuser’s manual, which is comm<strong>on</strong>ly available fordownload from the Internet without cost, canprovide an impressi<strong>on</strong> of how mature the<strong>security</strong> of a device is.The threats aga<strong>in</strong>st a communicati<strong>on</strong> network <strong>in</strong>a plant shall be assessed <strong>and</strong> modeled, either byan <strong>in</strong>ternal or external assessment team. In thisanalysis, it is crucial that the participat<strong>in</strong>gpers<strong>on</strong>nel th<strong>in</strong>k as an attacker. A list ofvulnerabilities <strong>and</strong> possible exploits shall beestablished, aga<strong>in</strong>st which a list of <strong>security</strong>measures shall be c<strong>on</strong>structed. Highest priorityshould be assigned to implement<strong>in</strong>g themeasures which remedy the vulnerabilities withhighest risk, followed by the remedies which areeasiest <strong>and</strong> quickest to implement. This is not tosay, that low-risk vulnerabilities <strong>and</strong> hard-toimplement<strong>security</strong> measures can be ignored oravoided, but they may be assigned to a laterphase <strong>in</strong> order to quickly raise <strong>security</strong>.4 Security <strong>in</strong> field devicesThis secti<strong>on</strong> of the <str<strong>on</strong>g>white</str<strong>on</strong>g> <str<strong>on</strong>g>paper</str<strong>on</strong>g> discusses<strong>security</strong> aspects of field devices. By this ismeant the sensors <strong>and</strong> actuators at the lowestlayer of the automati<strong>on</strong> pyramid, which <strong>in</strong>teractwith, c<strong>on</strong>trol <strong>and</strong> m<strong>on</strong>itor the actual process <strong>and</strong>equipment <strong>in</strong> a system. These devices arecomm<strong>on</strong>ly based <strong>on</strong> embedded firmware withfuncti<strong>on</strong>ality to allow customizati<strong>on</strong> to suit theapplicati<strong>on</strong> needs.4.1 Security threats <strong>and</strong> issuesThere are ma<strong>in</strong>ly two threats aga<strong>in</strong>st fielddevices which should be taken care of:Informati<strong>on</strong> leakage <strong>and</strong> tamper<strong>in</strong>g of thedevices.4.1.1 Informati<strong>on</strong> leakageDepend<strong>in</strong>g <strong>on</strong> where the field device isemployed, <strong>in</strong>formati<strong>on</strong> leakage can occurthrough ma<strong>in</strong>ly three channels: Through an ITleak, human leak, or physical leak. At themanufacturer side, an IT leak could happenwhere the field devices are programmed <strong>and</strong>c<strong>on</strong>figured. If resp<strong>on</strong>sible computers are <strong>in</strong>fectedwith a Trojan horse, an attacker could easilyobta<strong>in</strong> c<strong>on</strong>figurati<strong>on</strong> files <strong>and</strong> access keys.Social eng<strong>in</strong>eer<strong>in</strong>g attacks should not beunderestimated <strong>and</strong> can give an attacker thepossibility to access c<strong>on</strong>fidential <strong>in</strong>formati<strong>on</strong>about field devices through a human leak.The physical leak could happen <strong>on</strong> themanufacturer side, but is more probable whenthe device is employed <strong>in</strong> the field. If amalicious attacker is able to obta<strong>in</strong> a field devicehe is able to analyze it extensively. Reverseeng<strong>in</strong>eer<strong>in</strong>g can be c<strong>on</strong>ducted <strong>on</strong> the analyzedhard- <strong>and</strong> software.4.1.2 Tamper<strong>in</strong>g risksField devices can be manipulated <strong>in</strong> general <strong>in</strong>two different ways: The attacker can <strong>in</strong>sertspoofed firmware updates or change deviceparameters through the PC software c<strong>on</strong>troll<strong>in</strong>gthe device, or us<strong>in</strong>g the device’s <strong>in</strong>tegrated user<strong>in</strong>terface such as a keypad <strong>and</strong> display.If an attacker is able to c<strong>on</strong>trol the PC,c<strong>on</strong>figur<strong>in</strong>g the devices at the manufacturer, hecan alter c<strong>on</strong>figurati<strong>on</strong> parameters <strong>and</strong> the<strong>in</strong>stalled firmware. An attacker will alter devicefirmware with either <strong>on</strong>e of the follow<strong>in</strong>g twomotivati<strong>on</strong>s: First <strong>in</strong> order to provokedysfuncti<strong>on</strong> of the device, or sec<strong>on</strong>d to improvethe performance of the device.A malfuncti<strong>on</strong><strong>in</strong>g device can create damagewherever the field device is employed.Furthermore, not <strong>on</strong>ly the field device will beaffected, the entire producti<strong>on</strong> cha<strong>in</strong> <strong>in</strong> which thefield device works will be <strong>in</strong>fluenced.


33Tamper<strong>in</strong>g with a field device <strong>in</strong> order toachieve better performance can be driven byf<strong>in</strong>ancial benefits. If an attacker can successfully<strong>and</strong> significantly improve the performance of afield device, he can buy cheaper devices, tunethem, <strong>and</strong> sell them c<strong>on</strong>sequently as moreexpensive devices. Usually firmware updates areencrypted with a symmetric key which is stored<strong>on</strong> the field device. Furthermore, the encryptedfirmware updates can usually be retrieved fromthe Internet. Therefore, <strong>in</strong> order to modify afirmware update, the attacker would first need toobta<strong>in</strong> the encrypti<strong>on</strong> key, decrypt the firmware,modify it, <strong>and</strong> f<strong>in</strong>ally encrypt it aga<strong>in</strong>. S<strong>in</strong>ce theencrypti<strong>on</strong> key is stored <strong>on</strong> the field devices, amalicious attacker needs to search <strong>in</strong> memoryfor the key.4.2 Simple field devicesBy “simple” field device is here<strong>in</strong> referred to asa device which does not employ a full-scaleoperat<strong>in</strong>g system, but possibly some k<strong>in</strong>d ofscheduler mechanism. These schedulermechanisms may be developed completelyvendor-specifically, thus there may be no<strong>in</strong>formati<strong>on</strong> publically available <strong>on</strong> theirwork<strong>in</strong>gs. Comm<strong>on</strong>ly, the design decisi<strong>on</strong> to usea scheduler <strong>in</strong>stead of an operat<strong>in</strong>g system maybe related to the low complexity of the device,limited resources such as memory, or otherc<strong>on</strong>stra<strong>in</strong>ts.As scheduler-based devices c<strong>on</strong>sist of embeddedfirmware, the reverse eng<strong>in</strong>eer<strong>in</strong>g <strong>and</strong> themodificati<strong>on</strong> or tamper<strong>in</strong>g is n<strong>on</strong>-trivial.However, if an attacker is able to obta<strong>in</strong> theb<strong>in</strong>ary code from the device, it may be possibleto analyze its behavior <strong>and</strong>, with sufficient effort,identify vulnerabilities. Nevertheless, depend<strong>in</strong>g<strong>on</strong> the device, if its functi<strong>on</strong>ality <strong>and</strong> role with<strong>in</strong>different systems is not significant enough, anattacker’s motivati<strong>on</strong> may not be sufficient to gothrough this reverse-eng<strong>in</strong>eer<strong>in</strong>g effort.If the device provides a user <strong>in</strong>terface, it ispossible that an attacker targets this <strong>in</strong>terface<strong>and</strong> tries to alter the behavior of the device. E.g.butt<strong>on</strong>s or switches can easily be used by apers<strong>on</strong> who has physical access to the device.The wir<strong>in</strong>g <strong>and</strong> c<strong>on</strong>necti<strong>on</strong>s of a device may alsobe the target of tamper<strong>in</strong>g, if they are accessible.4.3 Embedded devices with realtimeoperat<strong>in</strong>g systemsMost embedded field devices utilize some realtimeoperat<strong>in</strong>g system (RTOS), of which thereexist a large number of differentimplementati<strong>on</strong>s. The operat<strong>in</strong>g systems enablemulti-task<strong>in</strong>g <strong>and</strong> necessary support functi<strong>on</strong>s tothe device firmware. Documentati<strong>on</strong> <strong>on</strong> thedifferent systems may be available <strong>in</strong> vary<strong>in</strong>gamounts; however the generic operat<strong>in</strong>g systemtheory applies to virtually all systems.Because these operat<strong>in</strong>g systems are part of theembedded firmware, the direct modificati<strong>on</strong> ofthe device b<strong>in</strong>ary is not an easy task. However,if <strong>on</strong>e succeeds <strong>in</strong> e.g. read<strong>in</strong>g the b<strong>in</strong>ary code ofthe device, it may be possible to detect textstr<strong>in</strong>gs stored <strong>in</strong> the code which c<strong>on</strong>ta<strong>in</strong> clues asto which operat<strong>in</strong>g system is used. Other textstr<strong>in</strong>gs may also disclose software comp<strong>on</strong>entswhich are used or versi<strong>on</strong> numbers.Similar threats relate to the RTOS-based devicesas simple field devices, however these slightlymore advanced systems may be of higherimportance <strong>in</strong> a c<strong>on</strong>trol system <strong>and</strong> thereby themotivati<strong>on</strong> to attack these devices with RTOSsmay be higher.It is comm<strong>on</strong> that some methods of diagnosticsor debugg<strong>in</strong>g are left enabled <strong>in</strong> the devices, forthe purpose of e.g. field troubleshoot<strong>in</strong>g. These<strong>in</strong>terfaces present a possible way for study<strong>in</strong>gthe device <strong>and</strong> its functi<strong>on</strong>ality.


344.4 Embedded devices withgeneral-purpose operat<strong>in</strong>gsystems4.4.1 Operat<strong>in</strong>g systemvulnerabilitiesDue to the complex nature of operat<strong>in</strong>g systems<strong>and</strong> the software envir<strong>on</strong>ment executed <strong>on</strong> top,vulnerabilities do <strong>and</strong> will c<strong>on</strong>t<strong>in</strong>ue to exist.Sometimes the vulnerabilities are found <strong>in</strong> theoperat<strong>in</strong>g system kernel itself, however <strong>in</strong> manycases the vulnerability is caused by the differentservices <strong>and</strong> applicati<strong>on</strong>s which are executedus<strong>in</strong>g the services of the operat<strong>in</strong>g system.By the word “vulnerability” is meant an error(e.g. due to misspecificati<strong>on</strong>, <strong>in</strong>correctimplementati<strong>on</strong> or simply a human mistake)which can be used by an attacker to performmalicious activity <strong>on</strong> a system or network.Different k<strong>in</strong>ds of activity may be possible, forexample execut<strong>in</strong>g code or comm<strong>and</strong>s, access<strong>in</strong>grestricted data without proper authorizati<strong>on</strong>, orc<strong>on</strong>duct<strong>in</strong>g denial-of-service attacks.It is comm<strong>on</strong> knowledge that general-purposeoperat<strong>in</strong>g systems (such as Microsoft W<strong>in</strong>dowsor L<strong>in</strong>ux-distributi<strong>on</strong>s) are targeted by malware.One reas<strong>on</strong> for target<strong>in</strong>g these systems is theirpopularity; if a malware can be targeted at awidely used system, the potential impact <strong>and</strong>associated achievable notoriety for the creator ishigher. Also operat<strong>in</strong>g systems <strong>in</strong>tended e.g. formobile ph<strong>on</strong>es <strong>and</strong> smartph<strong>on</strong>es, such asSymbian or Android, have been targeted bymalware.4.4.2 Open-source systemsOpen-source systems may, from <strong>on</strong>e perspective,be c<strong>on</strong>sidered at risk as the source code isreadily available to any<strong>on</strong>e, <strong>in</strong>clud<strong>in</strong>g malwarecreators. Thus, with proper analysis it is possibleto detect vulnerabilities based <strong>on</strong> the source codeanalysis <strong>and</strong> model<strong>in</strong>g of different scenarios.Furthermore, <strong>on</strong>l<strong>in</strong>e issue <strong>and</strong> vulnerabilitytrack<strong>in</strong>g systems may highlight the detectedissues, sometimes also present<strong>in</strong>g which versi<strong>on</strong>of the system <strong>in</strong>cludes the problem <strong>and</strong> when ithas been corrected.This <strong>in</strong>formati<strong>on</strong> can be helpful <strong>in</strong> track<strong>in</strong>g thehistory of <strong>security</strong> issues <strong>in</strong> a system; howeverthis k<strong>in</strong>d of log can also be used by malwarecreators to make the malicious software adaptitself based <strong>on</strong> the <strong>in</strong>stalled versi<strong>on</strong> of anoperat<strong>in</strong>g system. Nevertheless, nowadays it isvery comm<strong>on</strong> for exploit researchers to makeb<strong>in</strong>ary differences e.g. between patched <strong>and</strong>unpatched W<strong>in</strong>dows drivers. Therefore, it isequally possible to rec<strong>on</strong>struct vulnerabilityunder W<strong>in</strong>dows as under L<strong>in</strong>ux.On the other h<strong>and</strong>, the open-source communityprovides a wealth of competence <strong>and</strong> resourceswhich review documentati<strong>on</strong> <strong>and</strong> source-code,while also actively c<strong>on</strong>tribut<strong>in</strong>g to thedevelopment <strong>in</strong>clud<strong>in</strong>g correcti<strong>on</strong> of identifiedissues. The open-source nature of a systemshould thus not be viewed as a puredisadvantage, as l<strong>on</strong>g as the back<strong>in</strong>g communityof developers <strong>and</strong> stakeholders is competent <strong>and</strong>capable of ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g it.4.4.3 General-purpose operat<strong>in</strong>gsystemsThe experience from desktop operat<strong>in</strong>g systemshas shown that all k<strong>in</strong>ds of operat<strong>in</strong>g systemshave vulnerabilities regardless of open source orclosed source. Microsoft W<strong>in</strong>dows for <strong>in</strong>stancehas been improved by Microsoft throughc<strong>on</strong>stant <strong>and</strong> serious effort, because it has beenshown to not be secure enough. CurrentMicrosoft W<strong>in</strong>dows versi<strong>on</strong>s have asignificantly superior level of <strong>security</strong> comparedto older versi<strong>on</strong>s. L<strong>in</strong>ux implemented earlyimportant <strong>security</strong> features like divisi<strong>on</strong> ofprivileges, whereas under W<strong>in</strong>dows until


35recently the default user adm<strong>in</strong>istrator privilegeshad. Because of the threats, th<strong>in</strong>gs have beenimproved <strong>on</strong> both sides, <strong>and</strong> it is difficult to statethat L<strong>in</strong>ux is more secure than W<strong>in</strong>dows or viceversa.Both, W<strong>in</strong>dows <strong>and</strong> L<strong>in</strong>ux are implemented <strong>in</strong>embedded devices. Know<strong>in</strong>g that is relativelyeasy to update desktop operat<strong>in</strong>g systems, thismight not be true for embedded operat<strong>in</strong>gsystems. An update would be very difficult if thec<strong>on</strong>cerned device is runn<strong>in</strong>g <strong>in</strong> a producti<strong>on</strong>envir<strong>on</strong>ment <strong>and</strong> cannot be rebooted without<strong>in</strong>terrupt<strong>in</strong>g an entire factory. Moreover, notevery field device has a permanent Internet ornetwork c<strong>on</strong>necti<strong>on</strong>. A manual update procedurewould be necessary <strong>and</strong> depend<strong>in</strong>g <strong>on</strong> thenumber of affected devices this requires ac<strong>on</strong>siderable amount of time.Vulnerabilities are provided to the operat<strong>in</strong>gsystem vendors from a lot of different sources <strong>on</strong>a weekly basis. General-purpose operat<strong>in</strong>gsystems do provide a lot of advantages, but if anattacker is able to f<strong>in</strong>d a s<strong>in</strong>gle vulnerability <strong>in</strong> it,he may exploit every device runn<strong>in</strong>g the specificsystem. Therefore, somebody needs to take care,that field devices employ<strong>in</strong>g a general purposeoperat<strong>in</strong>g system are c<strong>on</strong>stantly kept up-to-date.To not use a general purpose operat<strong>in</strong>g system<strong>and</strong> write from scratch a custom operat<strong>in</strong>gsystem might, depend<strong>in</strong>g <strong>on</strong> the complexity,result <strong>in</strong> fact <strong>in</strong> a far less secure system (alsocalled <strong>security</strong> by obscurity).When the operat<strong>in</strong>g system of a device isupdated, the device usually needs to be rebooted.But <strong>in</strong> some cases updates can create c<strong>on</strong>flictswith former software employed <strong>in</strong> the device.Therefore, extensive test<strong>in</strong>g needs to be appliedbefore updat<strong>in</strong>g productive systems <strong>in</strong> order tokeep the negative effect of the downtime assmall as possible.4.5 Recommendati<strong>on</strong>s forenhanc<strong>in</strong>g <strong>security</strong> <strong>in</strong> devicesIn general it is very difficult to protect a device,<strong>on</strong>ce the attacker is able to ga<strong>in</strong> physical accessto it. If possible the disassembly of the deviceshould be made more difficult, nevertheless if anattacker has sufficient time <strong>and</strong> equipment thisdoes not h<strong>in</strong>der him from analyz<strong>in</strong>g anobfuscated device.In the design of devices, <strong>security</strong> needs to beaddressed at all levels <strong>and</strong> <strong>in</strong> different scenarios.Us<strong>in</strong>g an attacker’s perspective, enhanc<strong>in</strong>g<strong>security</strong> <strong>in</strong> the device should be a c<strong>on</strong>t<strong>in</strong>uousprocess about identify<strong>in</strong>g weakest l<strong>in</strong>ks <strong>and</strong>strengthen<strong>in</strong>g them. Threats to a product orproduct family should be modeled <strong>and</strong>appropriate measures to correct these determ<strong>in</strong>ed<strong>and</strong> implemented.4.5.1 Debugg<strong>in</strong>g <strong>in</strong>terfacesInterfaces for debugg<strong>in</strong>g <strong>and</strong> manufactur<strong>in</strong>g (e.g.JTAG or similar, serial ports for text output)shall not be utilizable <strong>in</strong> the producti<strong>on</strong> versi<strong>on</strong>of a device. The <strong>in</strong>terfaces may be rendereddisabled either by not assembl<strong>in</strong>g electricalcomp<strong>on</strong>ents (e.g. zero-ohm jumpers) or by<strong>security</strong> functi<strong>on</strong>ality <strong>in</strong> the ICs <strong>in</strong> the product.A debugg<strong>in</strong>g <strong>in</strong>terface which needs to beenabled <strong>in</strong> a field-<strong>in</strong>stalled device could e.g. beprotected us<strong>in</strong>g cryptography, so thatauthenticati<strong>on</strong> us<strong>in</strong>g a key is needed before the<strong>in</strong>terface opens. Authenticati<strong>on</strong> keys need to bestored securely, protected from the attacker.4.5.2 Communicati<strong>on</strong> <strong>in</strong>terfacesMany devices feature <strong>on</strong>e or morecommunicati<strong>on</strong> <strong>in</strong>terfaces. All such <strong>in</strong>terfacesneed to be appropriately protected aga<strong>in</strong>stmalformed or bad messages, prevent<strong>in</strong>g issuessuch as buffer overflows or crashes fromoccurr<strong>in</strong>g. Communicati<strong>on</strong> protocols which are


36not <strong>in</strong>tended for the end-user shall not beenabled <strong>in</strong> a device.Detailed <strong>in</strong>formati<strong>on</strong> about the device, or<strong>in</strong>formati<strong>on</strong> reveal<strong>in</strong>g the technicalimplementati<strong>on</strong> of the device, shall not becommunicated outside the device unlessabsolutely necessary. Secret or critical<strong>in</strong>formati<strong>on</strong>, which needs to be communicatedoutside the device, must be encrypted with astr<strong>on</strong>g algorithm <strong>and</strong> a good key. Such keysneed to be stored securely so that they cannot beaccessed by the attacker.Communicati<strong>on</strong> <strong>in</strong>terfaces to a PC program maybe targeted by an attacker, either by m<strong>on</strong>itor<strong>in</strong>gthe traffic <strong>on</strong> a serial, USB or Ethernet l<strong>in</strong>k, orby reverse eng<strong>in</strong>eer<strong>in</strong>g the PC program itself. Bystudy<strong>in</strong>g the program or the communicati<strong>on</strong>, theattacker may detect comm<strong>and</strong>s which are hiddenfrom the user <strong>in</strong>terface of the PC program, ormay apply exist<strong>in</strong>g comm<strong>and</strong>s <strong>in</strong> new ways.M<strong>on</strong>itor<strong>in</strong>g e.g. the serial port communicati<strong>on</strong> iseasy us<strong>in</strong>g available PC programs. It is alsopossible that the user records the communicati<strong>on</strong><strong>and</strong> replays select porti<strong>on</strong>s <strong>in</strong> order to decipherthe functi<strong>on</strong>ality of the device.If the communicati<strong>on</strong> <strong>in</strong>terfaces of a device<strong>in</strong>tegrate some <strong>security</strong> features (e.g. rem<strong>in</strong>iscentof a firewall <strong>in</strong> Ethernet applicati<strong>on</strong>s), then thedefault c<strong>on</strong>figurati<strong>on</strong> should be that all access tothe device is prevented. The purpose is that <strong>on</strong>lythe smallest required number of changes to the<strong>security</strong> c<strong>on</strong>figurati<strong>on</strong> is made <strong>in</strong> order to allowthe system to work as expected.4.5.3 Firmware protecti<strong>on</strong>The b<strong>in</strong>ary firmware of a product can beprotected from be<strong>in</strong>g extracted e.g. byencrypt<strong>in</strong>g the n<strong>on</strong>-volatile memory <strong>in</strong> which thefirmware is stored. This approach presents somechallenges <strong>in</strong> terms of decrypt<strong>in</strong>g the firmwaresecurely at start-up, <strong>and</strong> stor<strong>in</strong>g the keys so thatthey cannot be extracted from the device. Byprotect<strong>in</strong>g the c<strong>on</strong>tents of e.g. a flash memoryfrom be<strong>in</strong>g extracted, attempts to reverseeng<strong>in</strong>eera device are no l<strong>on</strong>ger trivial.Sometimes there may be a need to prevent thecopy<strong>in</strong>g of b<strong>in</strong>ary firmware from <strong>on</strong>e product toanother. S<strong>in</strong>ce it is not uncomm<strong>on</strong> for differentproducts bel<strong>on</strong>g<strong>in</strong>g to the same product familyto use a s<strong>in</strong>gle piece of hardware, with featuresbe<strong>in</strong>g disabled <strong>in</strong> software, the copy<strong>in</strong>g of b<strong>in</strong>aryfrom a feature-rich product to a low-cost productcan be motivated by f<strong>in</strong>ancial ga<strong>in</strong>, or enabl<strong>in</strong>gfeatures which have been disabled from theentire product family.Another approach to prevent<strong>in</strong>g firmware fromexecut<strong>in</strong>g <strong>in</strong> an unauthorized device is toimplement a k<strong>in</strong>d of license management. Thiscould e.g. be design so that a device needs anunforgeable serial number which corresp<strong>on</strong>ds toauthoriz<strong>in</strong>g a certa<strong>in</strong> firmware to execute <strong>in</strong> thedevice. This mechanism needs protecti<strong>on</strong> aga<strong>in</strong>sttamper<strong>in</strong>g us<strong>in</strong>g cryptography <strong>and</strong> securemanagement of the cryptography keys, serialnumbers <strong>and</strong> firmware packages.There are different ways to prevent this copy<strong>in</strong>g,such as the above menti<strong>on</strong>ed encrypti<strong>on</strong> offirmware <strong>and</strong> license management methods.Creat<strong>in</strong>g different hardware is another opti<strong>on</strong>;perhaps the most effective way is to implementthe feature-restricted product us<strong>in</strong>g a b<strong>in</strong>ary<strong>in</strong>compatibleprocessor or microc<strong>on</strong>troller. Thus,the feature-rich b<strong>in</strong>ary cannot be copied to thefeature-restricted product; as the b<strong>in</strong>ary is<strong>in</strong>compatible it will not execute.If a product does not have encrypted firmwarestorage, but it is <strong>in</strong>troduced to the nextgenerati<strong>on</strong> of the product, this likely alsoc<strong>on</strong>stitutes a k<strong>in</strong>d of hardware differentiati<strong>on</strong>, asthe <strong>security</strong> keys needed for encrypti<strong>on</strong> mayneed a different model of processor,microc<strong>on</strong>troller or memory to be used.


374.5.4 Device parameters <strong>and</strong>c<strong>on</strong>figurati<strong>on</strong>The parameters <strong>and</strong> c<strong>on</strong>figurati<strong>on</strong> of a devicecan be protected aga<strong>in</strong>st modificati<strong>on</strong> e.g. bydef<strong>in</strong><strong>in</strong>g user access levels with passwordprotecti<strong>on</strong>.Such mechanisms shall require thatthe password c<strong>on</strong>figured for the different userlevels have sufficient strength. As the devicemost likely c<strong>on</strong>ta<strong>in</strong>s a default password, thedevice shall encourage (possibly even require)the user to change the default password. It isespecially important is that passwords are nothardcoded <strong>in</strong>to the device.Only proper user <strong>and</strong> software authenticati<strong>on</strong>can really create a level of <strong>security</strong> forautomati<strong>on</strong> field devices. The Stuxnet case hasshown that default passwords underm<strong>in</strong>e many<strong>security</strong> measures, therefore the field devicesshould not be possible to be c<strong>on</strong>figured withdefault passwords.The storage of the passwords should beprotected, potentially us<strong>in</strong>g encrypti<strong>on</strong> so thatpla<strong>in</strong>text is not present. If the passwords need tobe communicated between ICs, the passwordsshould be communicated <strong>in</strong> ciphered mode.4.5.5 Firmware updat<strong>in</strong>gThe updat<strong>in</strong>g of firmware <strong>in</strong> the device needs tobe secure. A major <strong>security</strong> issue arises if anattacker is able to <strong>in</strong>sert a modified firmware<strong>in</strong>to a field device; it would be possible toc<strong>on</strong>trol how the device is functi<strong>on</strong><strong>in</strong>g. Severaltechniques to mitigate this risk can bec<strong>on</strong>sidered.The device should detect if firmware has beenmodified, e.g. us<strong>in</strong>g error check<strong>in</strong>g algorithms <strong>in</strong>a bootloader; <strong>in</strong> this case the system should go toa safe state <strong>and</strong> not execute the <strong>in</strong>correctfirmware.<strong>and</strong> therefore it is nearly unfeasible to alter it. Inthis case, the secret key of the field deviceshould be stored securely <strong>and</strong> to the possibleextent changed regularly. Therefore, encrypti<strong>on</strong>solely cannot be seen as a sufficient <strong>security</strong>measure. If possible, proper key management isneeded. Key management provides functi<strong>on</strong>alityto exchange exist<strong>in</strong>g keys <strong>and</strong> also revoke keyswhich gets compromised. Moreover, whenencrypti<strong>on</strong> is used no Master key should beemployed. Basically, this means that everydevice should have its own key, thus limit<strong>in</strong>g thedamage from disclosure of a s<strong>in</strong>gle key.If possible, firmware updates should be digitallysigned with a private key. The corresp<strong>on</strong>d<strong>in</strong>gpublic key can be stored <strong>in</strong> the field device (for<strong>in</strong>stance <strong>in</strong> a read-<strong>on</strong>ly memory, ROM) <strong>and</strong> used<strong>in</strong> order to verify legitimate firmware updates.No “Master Tool” should be available, whichwould allow modificati<strong>on</strong> <strong>and</strong> tun<strong>in</strong>g of the fielddevice, without proper authenticati<strong>on</strong>.Furthermore, if a field device is modified by theresp<strong>on</strong>sible c<strong>on</strong>troll<strong>in</strong>g software, this softwareshould be able to log this activity. Additi<strong>on</strong>allythe logg<strong>in</strong>g should not be d<strong>on</strong>e exclusively <strong>on</strong>the local mach<strong>in</strong>e, but should be sent to a centralserver which keeps track of all modificati<strong>on</strong>s.4.5.6 Superfluous <strong>in</strong>formati<strong>on</strong>There is often a lot of extra data related to aproduct or device which is needed e.g. <strong>on</strong>lydur<strong>in</strong>g the development stage. There is a riskthat this k<strong>in</strong>d of <strong>in</strong>formati<strong>on</strong> is left <strong>in</strong> theproducti<strong>on</strong> versi<strong>on</strong> of a product, even though itis not needed for the pr<strong>in</strong>cipal functi<strong>on</strong>ality ofthe device. This presents a risk <strong>in</strong> terms of<strong>in</strong>formati<strong>on</strong> leakage, which may further lead torisk of tamper<strong>in</strong>g. It is therefore essential thatthe amount of <strong>in</strong>formati<strong>on</strong>, which is not relatedto functi<strong>on</strong>ality, is m<strong>in</strong>imized <strong>in</strong> the device.The firmware needs to be encrypted. An attackerwould not be able to read an encrypted firmware


385 Security <strong>in</strong> wirelesscommunicati<strong>on</strong>sIn computer network<strong>in</strong>g, wirelesscommunicati<strong>on</strong> such as WLAN has been usedfor many years. For close-range wirelesscommunicati<strong>on</strong>, technologies such as Bluetoothor Zigbee are popular choices. Wirelesstechnology is also enter<strong>in</strong>g the <strong><strong>in</strong>dustrial</strong>automati<strong>on</strong> market, with technologies forWireless HART, Ethernet or PROFIBUS.The Internati<strong>on</strong>al Telecommunicati<strong>on</strong> Uni<strong>on</strong>(ITU) has reserved special frequency b<strong>and</strong>s for<strong><strong>in</strong>dustrial</strong>, scientific <strong>and</strong> medical usage,comm<strong>on</strong>ly known as ISM b<strong>and</strong>s. Many currentwireless approaches to <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> rely<strong>on</strong> IEEE 802.15.4 “Low rate WPAN”technology, or <strong>on</strong> Bluetooth technology, whichare capable of operat<strong>in</strong>g at <strong>on</strong>e or more ISMb<strong>and</strong>s. Bluetooth <strong>and</strong> 802.15.4 technologies areboth capable of operat<strong>in</strong>g <strong>in</strong> the 2.4 GHz ISMb<strong>and</strong>, however 802.15.4 can also operate <strong>in</strong> the902-928 MHz ISM b<strong>and</strong>. Wireless LAN, based<strong>on</strong> IEEE 802.11, can also operate <strong>in</strong> the 2.4 GHzISM b<strong>and</strong>, although higher frequencies are alsoavailable for this communicati<strong>on</strong>.IEEE 802.15.4 <strong>and</strong> Bluetooth are designed forshort range communicati<strong>on</strong>s with ranges around10-20 meters. IEEE 802.11, depend<strong>in</strong>g <strong>on</strong> theprotocol used, offers ranges <strong>in</strong> excess of 50meters <strong>in</strong>door <strong>and</strong> over 100 meters outdoors.The data rates of the technologies differ, as doesthe transmissi<strong>on</strong> range, due to design objectivessuch as low power c<strong>on</strong>sumpti<strong>on</strong> <strong>and</strong> low datarate. 802.15.4-based devices have very lowpower c<strong>on</strong>sumpti<strong>on</strong>, reduc<strong>in</strong>g the achievabledata rate <strong>and</strong> transmissi<strong>on</strong> range, while the highdata rate <strong>and</strong> l<strong>on</strong>g range of 802.11-based devicestranslates <strong>in</strong>to high power c<strong>on</strong>sumpti<strong>on</strong>.5.1 Security of wireless technologyBecause it is not necessary to have physicalaccess to a wire or network, wireless systems arevulnerable targets to eavesdropp<strong>in</strong>g <strong>and</strong> possiblyalso tamper<strong>in</strong>g. Additi<strong>on</strong>ally, some networks areso-called ad hoc networks <strong>in</strong> which nodesparticipate <strong>in</strong> rout<strong>in</strong>g <strong>and</strong> data forward<strong>in</strong>g, <strong>and</strong>thus cannot rely <strong>on</strong> fixed devices act<strong>in</strong>g asrouters. Thus, c<strong>on</strong>necti<strong>on</strong>s may need to beestablished to unfamiliar devices. Because <strong>in</strong>some cases, it is desirable to reducecomputati<strong>on</strong>al capacity <strong>and</strong> thus powerc<strong>on</strong>sumpti<strong>on</strong>, the feasibility of cryptographicalgorithms <strong>and</strong> protocols may <strong>in</strong> someapplicati<strong>on</strong>s be limited.Wireless l<strong>in</strong>ks can be targeted by jamm<strong>in</strong>gattacks <strong>in</strong> the form of a device transmitt<strong>in</strong>g at avery high power, with the target of disrupt<strong>in</strong>gauthorized communicati<strong>on</strong> <strong>in</strong> a system. Byjamm<strong>in</strong>g is comm<strong>on</strong>ly meant that a devicedeliberately transmits different k<strong>in</strong>ds of signals<strong>in</strong>to a busy medium, decreas<strong>in</strong>g the signal-t<strong>on</strong>oiseratio of the <strong>on</strong>-go<strong>in</strong>g communicati<strong>on</strong>. Thiscorresp<strong>on</strong>ds to a denial-of-service attack. Thepossibility to succeed with this k<strong>in</strong>d of attackdepends <strong>on</strong> the network, the used technology<strong>and</strong> devices, the jamm<strong>in</strong>g device <strong>and</strong> the overallenvir<strong>on</strong>ment. Some wireless technologiesimplement features to improve the networkperformance <strong>in</strong> case the medium c<strong>on</strong>ta<strong>in</strong>s a lotof <strong>in</strong>terference; as an example, IEEE 802.15.4provides dynamic channel selecti<strong>on</strong> whichallows the device to select the best availablechannel for operati<strong>on</strong> .A device attempt<strong>in</strong>g toovercome this flexibility of the network needs tobe able to jam over a wide spectrum, whichc<strong>on</strong>tributes to cost <strong>and</strong> complexity <strong>in</strong> the jammer.However, given enough resources <strong>and</strong>motivati<strong>on</strong>, this can also be achieved.


395.1.1 IEEE 802.15.4The IEEE 802.15.4 st<strong>and</strong>ard is the basis of somecomm<strong>on</strong>ly used communicati<strong>on</strong> protocols suchas WirelessHART, Zigbee <strong>and</strong> 6LoWPAN. TheMAC layer of the IEEE 802.15.4 specifies a<strong>security</strong> mechanism which allows encrypti<strong>on</strong><strong>and</strong> decrypti<strong>on</strong> of the messages which arecommunicated between devices; however this<strong>security</strong> feature is opti<strong>on</strong>al. The <strong>security</strong>mechanism is designed to be flexible, allow<strong>in</strong>gthe applicati<strong>on</strong> of the cryptography <strong>on</strong>ly <strong>on</strong>required frames, or with certa<strong>in</strong> nodes <strong>in</strong> thenetwork. This allows the extra overhead of<strong>security</strong> to be avoided <strong>in</strong> such cases where it isnot deemed necessary. The firmware <strong>in</strong> theapplicati<strong>on</strong> layer of a device specifies the levelof <strong>security</strong> required by sett<strong>in</strong>g c<strong>on</strong>trolparameters <strong>in</strong> the stack; per default no <strong>security</strong> isenabled.The WIrelessHART protocol uses the 128-bitAES encrypti<strong>on</strong> which is provided by the802.15.4 compliant devices <strong>and</strong> does not allow itto be disabled. Apart from protect<strong>in</strong>g the datac<strong>on</strong>tents of the message, it also protects thenetwork/transport layer <strong>in</strong>formati<strong>on</strong> of packetsso that the rout<strong>in</strong>g of packets is correct.The Zigbee protocol specifies additi<strong>on</strong>al <strong>security</strong>services at the network <strong>and</strong> applicati<strong>on</strong> layers,us<strong>in</strong>g symmetric cryptography to protect theframes <strong>and</strong> authorize devices. Keys are managedby a central device <strong>and</strong> are either pre-<strong>in</strong>stalled<strong>in</strong>to devices, transported us<strong>in</strong>g securecommunicati<strong>on</strong>, or established without be<strong>in</strong>gdirectly transported between devices.5.1.2 Wireless LANThe <strong>security</strong> of Wireless LAN (WLAN)networks is a key c<strong>on</strong>siderati<strong>on</strong> <strong>in</strong> IT systemsmanagement, however as it is becom<strong>in</strong>g<strong>in</strong>creas<strong>in</strong>gly comm<strong>on</strong> to have Industrial Ethernetnetworks c<strong>on</strong>nected to WLAN stati<strong>on</strong>s. Unless<strong>security</strong> is properly addressed also <strong>in</strong> thesec<strong>on</strong>figurati<strong>on</strong>s, the <strong><strong>in</strong>dustrial</strong> communicati<strong>on</strong>network <strong>and</strong> c<strong>on</strong>trol system is left highlyvulnerable.Sometimes, WLANs are c<strong>on</strong>figured with no orpoor <strong>security</strong> measures. Additi<strong>on</strong>ally, thephysical <strong>security</strong> around the WLAN, <strong>and</strong> thepossibility to access the WLAN from outside e.g.the build<strong>in</strong>g <strong>in</strong> which it is setup, <strong>in</strong>creases therisk of <strong>in</strong>trusi<strong>on</strong>. Furthermore, employeeschang<strong>in</strong>g the network c<strong>on</strong>figurati<strong>on</strong> or sett<strong>in</strong>g upweakly protected access po<strong>in</strong>ts poses further risk.Insufficient <strong>security</strong> measures, such as weakencrypti<strong>on</strong> st<strong>and</strong>ards or reliance <strong>on</strong> poor filter<strong>in</strong>g,leave holes <strong>in</strong> the <strong>security</strong> which may provide afalse sense of <strong>security</strong>; while <strong>on</strong>ly deter hackerswith basic knowledge, it enables advancedattackers to access the system.5.1.3 BluetoothBluetooth devices must be paired beforec<strong>on</strong>necti<strong>on</strong>s can be made; this is a basicrequirement for protect<strong>in</strong>g private data. Once apair of devices has been authorized to c<strong>on</strong>nect,they can be c<strong>on</strong>figured to do so without futureuser <strong>in</strong>terventi<strong>on</strong>. Basic protecti<strong>on</strong> which can bec<strong>on</strong>figured by the user <strong>in</strong>cludes mak<strong>in</strong>g thedevice n<strong>on</strong>-discoverable, prevent<strong>in</strong>g the devicefrom show<strong>in</strong>g up <strong>on</strong> a Bluetooth device scan. An<strong>on</strong>-discoverable device can theoretically bedetected us<strong>in</strong>g brute-force methods; howeverthis will generally require too much time to bepractical. Some devices can also be c<strong>on</strong>figuredas “n<strong>on</strong>-c<strong>on</strong>nectable”, mean<strong>in</strong>g that not evenpaired devices can establish a c<strong>on</strong>necti<strong>on</strong> to thisdevice.The Bluetooth specificati<strong>on</strong> addresses theproblem with passive eavesdropp<strong>in</strong>g <strong>and</strong> man<strong>in</strong>-the-middleattacks by specify<strong>in</strong>g “SecureSimple Pair<strong>in</strong>g” of devices, which is m<strong>and</strong>atory<strong>in</strong> devices with Bluetooth versi<strong>on</strong> 2.1 or higher.The cryptography of the pair<strong>in</strong>g procedure isenhanced, without affect<strong>in</strong>g the user <strong>in</strong>terventi<strong>on</strong>which is needed. This improvement reduces the


40possibilities for a device sniff<strong>in</strong>g the Bluetoothcommunicati<strong>on</strong> to be able to determ<strong>in</strong>e thecredentials used by a device to establish apair<strong>in</strong>g.User ignorance, typically <strong>in</strong> the case of mobileph<strong>on</strong>es or PDAs, presents a significant <strong>security</strong>risk <strong>in</strong> that devices may be left <strong>in</strong> discoverablemode. Users may also be the subject of a “socialeng<strong>in</strong>eer<strong>in</strong>g” attack, such as proposed <strong>in</strong> [8], <strong>in</strong>which they unsuspect<strong>in</strong>gly accept an <strong>in</strong>com<strong>in</strong>gpair<strong>in</strong>g request. This could expose their sensitivedata or put them at risk for sabotage.Additi<strong>on</strong>ally, numerous <strong>security</strong> issues <strong>in</strong> theform of Bluetooth viruses or worms, <strong>and</strong>operat<strong>in</strong>g system or applicati<strong>on</strong> vulnerabilitieshave been identified. The exploitability of thesevulnerabilities varies, however the exploits maycause slow operati<strong>on</strong> or applicati<strong>on</strong> or devicecrashes. The effect of such an error <strong>in</strong> an<strong><strong>in</strong>dustrial</strong> c<strong>on</strong>trol system can be c<strong>on</strong>siderable.5.2 Recommendati<strong>on</strong>s forimprov<strong>in</strong>g wireless network<strong>security</strong>Due to the broadcast<strong>in</strong>g nature of wirelesscommunicati<strong>on</strong>s, physical access to thecommunicati<strong>on</strong> network is no l<strong>on</strong>ger a necessity.If an attacker is with<strong>in</strong> range of the wireless l<strong>in</strong>k,it is possible to start an attack from outside theboundaries of physical access. Therefore,<strong>security</strong> measures shall focus <strong>on</strong> c<strong>on</strong>figurati<strong>on</strong> ofthe network <strong>and</strong> devices so that an attackercannot exploit vulnerabilities, <strong>and</strong> to ensure thatthere are multiple <strong>security</strong> barriers protect<strong>in</strong>g thesystem. Thus, even if the attacker breaks someof the barriers, he or she does not easily ga<strong>in</strong>access to the network.This is not to say that physical <strong>security</strong> <strong>and</strong>access can be ignored. Both wired <strong>and</strong> wirelessnetwork<strong>in</strong>g equipment must be protected, so thatan <strong>in</strong>truder cannot easily access the networkfrom <strong>in</strong>side the build<strong>in</strong>g or premises. Unusedports <strong>in</strong> network<strong>in</strong>g equipment shall be locked toprevent unauthorized c<strong>on</strong>necti<strong>on</strong> to these.It should be a priority to ensure that employeesor other pers<strong>on</strong>s with access to the organizati<strong>on</strong>do not affect the network c<strong>on</strong>figurati<strong>on</strong>, eitherby modify<strong>in</strong>g exist<strong>in</strong>g devices or by c<strong>on</strong>nect<strong>in</strong>g<strong>and</strong> sett<strong>in</strong>g up new network<strong>in</strong>g equipment. Thereexists a risk that new network<strong>in</strong>g equipment<strong>in</strong>troduced to the network has less str<strong>in</strong>gent<strong>security</strong> c<strong>on</strong>figurati<strong>on</strong>, thus expos<strong>in</strong>g a weakl<strong>in</strong>k to potential attackers.From a management perspective, it is imperativethat the organizati<strong>on</strong> def<strong>in</strong>es <strong>security</strong> guidel<strong>in</strong>es,policies, arranges tra<strong>in</strong><strong>in</strong>g for staff <strong>and</strong> thirdparties, <strong>and</strong> establishes a <strong>security</strong> “culture”. Thisculture shall <strong>in</strong>clude c<strong>on</strong>t<strong>in</strong>uous assessment,feedback <strong>and</strong> acti<strong>on</strong>s to ma<strong>in</strong>ta<strong>in</strong> <strong>security</strong> <strong>in</strong> theorganizati<strong>on</strong>. It is essential to recognize thepeople <strong>in</strong> this process, <strong>and</strong> to ensure that theycan voice their c<strong>on</strong>cerns <strong>and</strong> that theirunderst<strong>and</strong><strong>in</strong>g of <strong>security</strong> is aligned to the<strong>security</strong> policies <strong>and</strong> guidel<strong>in</strong>es as necessary.It is important to c<strong>on</strong>figure the wireless networkcorrectly. As has been outl<strong>in</strong>ed above, the firststep is to ensure that <strong>security</strong> modes are enabled,if they are not by default. Where used,passwords must be selected so that they havegood strength. Where the encrypti<strong>on</strong> modes areselectable, <strong>and</strong> there is a reas<strong>on</strong> not to use thebest available encrypti<strong>on</strong> (e.g. reduc<strong>in</strong>g powerc<strong>on</strong>sumpti<strong>on</strong> <strong>in</strong> wireless nodes) the ease ofcrack<strong>in</strong>g the encrypti<strong>on</strong>s must be weighedaga<strong>in</strong>st the tolerated risk. Then, the appropriateencrypti<strong>on</strong> is taken <strong>in</strong>to use.In applicati<strong>on</strong>s where Bluetooth is used as thewireless protocol, the devices should bec<strong>on</strong>figured with the lowest possible amount ofvisibility to n<strong>on</strong>-familiar devices. Preferably,devices should be n<strong>on</strong>-discoverable if they neednot be paired with new devices.


416 SummaryThis <str<strong>on</strong>g>paper</str<strong>on</strong>g> has provided an overall <strong>in</strong>troducti<strong>on</strong><strong>in</strong>to the <strong>in</strong>formati<strong>on</strong> <strong>security</strong> of <strong><strong>in</strong>dustrial</strong>automati<strong>on</strong>. The current state of st<strong>and</strong>ardizati<strong>on</strong>has been reviewed <strong>and</strong> compared to the level of<strong>in</strong>formati<strong>on</strong> <strong>security</strong> st<strong>and</strong>ardizati<strong>on</strong> <strong>in</strong> the ICTfield. Additi<strong>on</strong>ally, the <strong>security</strong> issues <strong>in</strong> <strong>in</strong>terdevicecommunicati<strong>on</strong> <strong>and</strong> <strong>in</strong> field devices al<strong>on</strong>ehave been discussed, followed by a briefoverview of the <strong>security</strong> issues <strong>in</strong> wireless<strong>in</strong>terfaces.Security <strong>in</strong> <strong><strong>in</strong>dustrial</strong> automati<strong>on</strong> has got muchmore attenti<strong>on</strong> after the Stuxnet case. Measuresto improve <strong>and</strong> implement <strong>security</strong> have beenstarted before Stuxnet, but thoughts <strong>and</strong> attitudeshave now changed. It has been shown <strong>in</strong> this<str<strong>on</strong>g>paper</str<strong>on</strong>g> that traditi<strong>on</strong>al <strong>fieldbus</strong>es are miss<strong>in</strong>g<strong>security</strong> aspects <strong>in</strong> many ways. There are nost<strong>and</strong>ardized rules <strong>and</strong> requirements for fielddevices aga<strong>in</strong>st <strong>security</strong> threats like tamper<strong>in</strong>g,hack<strong>in</strong>g <strong>and</strong> similar activities. This means that itwill be difficult to implement <strong>security</strong> measures<strong>in</strong> lower automati<strong>on</strong> levels by retrofitt<strong>in</strong>g or reeng<strong>in</strong>eer<strong>in</strong>gcurrent communicati<strong>on</strong> st<strong>and</strong>ards <strong>in</strong>the short term.operator staff needs to follow proper procedures<strong>in</strong> order to ensure that the <strong>security</strong> of customeroperati<strong>on</strong>s is not at risk.Field level communicati<strong>on</strong> developers <strong>and</strong> fielddevices manufacturers need to place more focus<strong>on</strong> <strong>security</strong> <strong>in</strong> future development. There areeasier <strong>and</strong> more difficult areas to h<strong>and</strong>le, but asthis P<strong>and</strong>ora’s box is <strong>on</strong>ce opened there is noturn<strong>in</strong>g back. Transparent <strong>and</strong> quantitativemethods are required <strong>and</strong> <strong>on</strong>-go<strong>in</strong>gst<strong>and</strong>ardizati<strong>on</strong> work needs str<strong>on</strong>g support fromall sides. The automati<strong>on</strong> bus<strong>in</strong>ess has creditablehistory solv<strong>in</strong>g challenges e.g. <strong>in</strong> safety, EMC<strong>and</strong> functi<strong>on</strong>al safety – it’s time for <strong>security</strong> now.Therefore, it is essential that end-users <strong>and</strong>owners/operators apply feasible cyber <strong>security</strong>programs <strong>in</strong> their processes <strong>and</strong> plants to getprotecti<strong>on</strong> aga<strong>in</strong>st attacks via upper automati<strong>on</strong>levels <strong>and</strong> to restrict physical access <strong>in</strong> affectedz<strong>on</strong>es. Exist<strong>in</strong>g practices of ICT bus<strong>in</strong>ess <strong>and</strong>already published <strong><strong>in</strong>dustrial</strong> st<strong>and</strong>ards <strong>and</strong>guidel<strong>in</strong>es can be used as a foundati<strong>on</strong> for thiswork.A <strong>security</strong> program shall be a de facto –requirement for new <strong>in</strong>stallati<strong>on</strong>s <strong>and</strong> plants.Risks shall be identified <strong>and</strong> preventivemeasures shall be applied through the deliverycha<strong>in</strong> from customer requirements to system<strong>in</strong>tegrators <strong>and</strong> device vendors. Also <strong>in</strong>stallati<strong>on</strong>,commissi<strong>on</strong><strong>in</strong>g, ma<strong>in</strong>tenance, service <strong>and</strong>


427 References[1] F-Secure Corporati<strong>on</strong> Term<strong>in</strong>ology.http://www.f-secure.com/en/web/labs_global/term<strong>in</strong>ology[2] ITU, ITU-T Study Group 17 – Security.http://www.itu.<strong>in</strong>t/ITU-T/studygroups/com17/<strong>in</strong>dex.asp[3] ISO, Telecommunicati<strong>on</strong> st<strong>and</strong>ardizati<strong>on</strong> committee.http://isotc.iso.org/livel<strong>in</strong>k/livel<strong>in</strong>k/open/jtc1sc6[4] ISO, Technical committee: Security.http://isotc.iso.org/livel<strong>in</strong>k/livel<strong>in</strong>k/open/jtc1_bp[5] IEC Technical Committee 65.http://www.iec.ch/dyn/www/f?p=103:7:0::::FSP_ORG_ID:1250[6] ISA, ISA99, Industrial Automati<strong>on</strong> <strong>and</strong> C<strong>on</strong>trol Systems Security.http://www.isa.org/MSTemplate.cfm?MicrositeID=988&CommitteeID=6821[7] Åkerberg, J. & Björkman, M. (2009). Explor<strong>in</strong>g Security <strong>in</strong> PROFINET IO.33 rd Annual IEEE Internati<strong>on</strong>al Computer Software <strong>and</strong> Applicati<strong>on</strong>s C<strong>on</strong>ference.[8] Symantec Bluetooth Security Review.http://www.symantec.com/c<strong>on</strong>nect/articles/bluetooth-<strong>security</strong>-review-part-1


43BiographiesArthur Gervais is a Junior Security C<strong>on</strong>sultant at Nixu. Currently f<strong>in</strong>ish<strong>in</strong>g his double degree as Masterof Science <strong>in</strong> IT-Security, he has experience especially <strong>in</strong> network <strong>security</strong>. In 2011 he was awarded theBest Student Award from the German Federal Office for Informati<strong>on</strong> Security (BSI).Mikko Hyppönen is Chief Research Officer at F-Secure Corporati<strong>on</strong>. He has studied thous<strong>and</strong>s of viruscases dur<strong>in</strong>g the last 20 years. He has published texts <strong>on</strong> his research f<strong>in</strong>d<strong>in</strong>gs <strong>in</strong> several <strong>in</strong>ternati<strong>on</strong>alpublicati<strong>on</strong>s, <strong>in</strong>clud<strong>in</strong>g Scientific American, The New York Times <strong>and</strong> CNN.com.Janne Kuivala<strong>in</strong>en is Director, C<strong>on</strong>trol Platform <strong>and</strong> Products at Vac<strong>on</strong> Plc. He has been work<strong>in</strong>g over10 years with embedded device related R&D <strong>and</strong> <strong>in</strong> power plant eng<strong>in</strong>eer<strong>in</strong>g <strong>in</strong> the 90's. He is member ofSESKO/SK65 - nati<strong>on</strong>al electrotechnical st<strong>and</strong>ardizati<strong>on</strong> committee for <strong><strong>in</strong>dustrial</strong>-process measurement,c<strong>on</strong>trol <strong>and</strong> automati<strong>on</strong> <strong>in</strong> F<strong>in</strong>l<strong>and</strong>.Juhani Mäkelä is a lead developer <strong>in</strong> the Development <strong>and</strong> Nixu Open divisi<strong>on</strong>s of Nixu. He has a l<strong>on</strong>gexperience of work<strong>in</strong>g with embedded systems <strong>in</strong> the telecommunicati<strong>on</strong> <strong>and</strong> commercial areas. The lastfour years he has been develop<strong>in</strong>g a mobile <strong>security</strong> platform for L<strong>in</strong>ux-based smartph<strong>on</strong>es.Jouko Orava is Manager, C<strong>on</strong>trol Platform <strong>and</strong> Architecture at Vac<strong>on</strong> Plc. He has almost 20 years experienceof frequency c<strong>on</strong>verter development <strong>in</strong> areas of embedded software <strong>and</strong> <strong>fieldbus</strong>es. The last years he has beendevelop<strong>in</strong>g embedded systems <strong>and</strong> architectures for frequency c<strong>on</strong>verters.Magnus Sundell is a Development Eng<strong>in</strong>eer at Vac<strong>on</strong> Plc. He holds a M.Sc. degree <strong>in</strong> Computer Science <strong>and</strong>has l<strong>on</strong>g experience develop<strong>in</strong>g embedded systems for <strong><strong>in</strong>dustrial</strong> communicati<strong>on</strong>. His ma<strong>in</strong> tasks are softwarearchitecture <strong>and</strong> requirements management <strong>in</strong> <strong><strong>in</strong>dustrial</strong> c<strong>on</strong>nectivity.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!