23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

22<br />

Security in Industrial<br />

Communication Systems<br />

Wolfgang Granzer<br />

Vienna University<br />

of Technology<br />

Albert Treytl<br />

Austrian Academy<br />

of Sciences<br />

22.1 Introduction to Security in Industrial Communication........... 22-1<br />

22.2 Planned Approach to Security: Defense in Depth.....................22-3<br />

22.3 Security Measures to Counteract Network Attacks..................22-4<br />

Virtual Private Networks. •. Firewalls. •. Cryptography. •. .<br />

DoS Prevention and Detection<br />

22.4 Security Measures to Counteract Device Attacks......................22-9<br />

Protected Hardware and Security Token. •. Secure Software<br />

Environments<br />

22.5 State of the Art in Automation Systems.....................................22-12<br />

Security in Building Automation Systems. •. Security in Industrial<br />

Communication. •. Security in IP-Based Networks. •. Security<br />

in Wireless Communication Systems<br />

22.6 Outlook and Conclusion..............................................................22-15<br />

Abbreviations............................................................................................. 22-15<br />

References.................................................................................................. 22-16<br />

22.1 Introduction to Security in Industrial Communication<br />

Modern <strong>industrial</strong> <strong>communication</strong> <strong>systems</strong> go far beyond small automated islands that have been<br />

in mind when developing the original <strong>communication</strong> protocols. Vertical integration and transmission<br />

over the Internet are common today, but they require additional security measures to protect<br />

the assets.<br />

In literature, a multitude of security definitions that are more or less ambiguous exist [R49,PFL,MEN,<br />

BIS,I15]. In the context of <strong>industrial</strong> <strong>communication</strong>, security can be defined as measures that protect<br />

system resources against adversaries that intentionally try to gain unauthorized, malicious access. The<br />

aim of such an access can be manifold. In the field of <strong>industrial</strong> <strong>communication</strong>, an adversary may be a<br />

human or some piece of malicious software (e.g., Trojan horse, virus, worm) with the intention to gain<br />

unauthorized access to control functions, i.e., functions that interact with the process under control.<br />

Note that this definition of security is contrary to the definition of safety. While security protects the<br />

system against intentional actions that may result in damage to the system and as a consequence may<br />

also be harmful to people, safety measures reduce the risk of unintentional system states that do cause<br />

harm to humans.<br />

The actual action that an adversary performs to gain access to the control functions is generally<br />

referred to as a security attack. A security attack is only possible if the system suffers vulnerabilities, i.e.,<br />

flaws and weaknesses that may be exploited. The existence of vulnerabilities leads to security threats that<br />

can be seen as the potential for violation of security. To provide measures that avoid a violation of the<br />

system’s security, these security threats have to be determined. Note that a security attack is different to<br />

22-1<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!