23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

22-2 Industrial Communication Systems<br />

a security threat. While a security attack is the actual action that tries to violate the security of a system,<br />

a security threat is the potential for violation of security that may never be utilized [R49].<br />

Up to now, security has been neglected in the <strong>industrial</strong> <strong>communication</strong> domain. However, as mentioned<br />

in [DZU], <strong>industrial</strong> <strong>communication</strong> <strong>systems</strong> are already the target of security attacks as reported<br />

incidents show. The consequences of a successful security attack on an <strong>industrial</strong> <strong>communication</strong> system<br />

may be manifold. In addition to a malfunction of safety critical services, which are harmful to<br />

humans, security attacks on <strong>industrial</strong> <strong>communication</strong> <strong>systems</strong> can also have massive economic impact.<br />

Consider, for example, a power plant being the target of a security attack.<br />

Since security has been a major topic in the Information Technology (IT) world for years, many available<br />

security mechanisms exist. However, it is not always possible to trivially map these mechanisms<br />

to the <strong>industrial</strong> <strong>communication</strong> domain. This is for various reasons. The requirements regarding the<br />

used <strong>communication</strong> protocol(s) may differ. Industrial <strong>communication</strong> <strong>systems</strong> often have real-time<br />

and safety requirements that cannot be met by protocols and their extensions used in the IT world.<br />

Additionally, while Internet protocol (IP)-based networks are getting more popular in <strong>industrial</strong> <strong>communication</strong><br />

<strong>systems</strong>, non-IP-based fieldbus media and protocols are still used at the field level. Since<br />

most IT security mechanisms are tailored to IP networks, they are of limited use in non-IP-based fieldbusses.<br />

Furthermore, in contrast to devices typically found in the IT domain, <strong>industrial</strong> <strong>communication</strong><br />

<strong>systems</strong> may consist of low-power embedded devices with limited system resources. This is especially<br />

true in wireless sensor networks. Since security mechanisms are computationally intensive, their use<br />

must not exceed the available resources of these embedded devices.<br />

Industrial <strong>communication</strong> <strong>systems</strong> are distributed <strong>systems</strong> where the control functionality is spread<br />

across different devices. To interact with each other, these devices are interconnected by a common<br />

network. Therefore, an adversary has two different opportunities to gain unauthorized access to control<br />

functions: The adversary may try to maliciously interfere with the data that is exchanged between the<br />

devices (network attacks) or the adversary may directly attack the devices that implement the control<br />

functionality (device attacks).<br />

Network attacks can be divided into four classes [PFL]:<br />

• Interception attacks: The adversary tries to gain unauthorized access to confidential data<br />

exchanged over the network (e.g., network sniffing).<br />

• Modification attacks: The adversary tries to change the data while it is transmitted over the network<br />

(e.g., modification of network messages).<br />

• Fabrication attacks: The adversary tries to insert malicious data (e.g., replay previously sent network<br />

messages).<br />

• Interruption attacks: The adversary tries to interrupt the <strong>communication</strong> between devices and<br />

thus makes data unavailable (e.g., denial-of-service (DoS) attacks).<br />

Device attacks, on the other hand, can be classified into<br />

• Software attacks: An adversary may use regular <strong>communication</strong> channels to exploit weaknesses<br />

in a device’s software.<br />

• Physical attacks: An adversary may use physical intrusion or manipulation (e.g., probing of bus<br />

lines, replacement of ROM chips) to interfere with a device.<br />

• Side-channel attacks: Side-channel attacks are based on observing external parameters of a device<br />

such as current consumption of EM emissions that are measurable during operation to collect<br />

information about its internals.<br />

To counteract these types of security attacks, different security objectives have to be guaranteed.<br />

According to [DZU], these are integrity, availability, authentication, authorization, confidentiality, and<br />

non-repudiation or traceability, whereas the first four have a very high ranking in <strong>industrial</strong> <strong>communication</strong><br />

<strong>systems</strong>.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!