23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

22-6 Industrial Communication Systems<br />

Mail<br />

server<br />

Client<br />

workstations<br />

Local network<br />

DMZ<br />

Web<br />

server<br />

Outside network<br />

FIGURE 22.2<br />

Demilitarized zone.<br />

entire application. Therefore, a proxy acts as a man-in-the-middle: to the outside network, a proxy behaves<br />

like the destination device; to the inside network, the proxy acts as the request origin; and vice versa.<br />

Sophisticated application proxies are completely transparent to the involved <strong>communication</strong> parties.<br />

Due to the importance of firewalls, they have to be reliable and robust against security attacks. To minimize<br />

vulnerabilities, firewalls are often isolated, stand-alone devices that are kept as simple as possible.<br />

Furthermore, access to firewalls is only permitted to users with special administrator privileges (if at all).<br />

From a security point of view, using a single firewall that acts as a single wall of protection may<br />

not be sufficient. If an adversary is able to bypass the firewall, he has full access to the entire network.<br />

Therefore, it is more appropriate to separate the network into several zones where each zone is protected<br />

with a dedicated firewall and a corresponding security policy. A typical example is shown in Figure 22.2.<br />

Besides a separation between an outside and an inside network, the inner network is further divided<br />

into a local network that is home for the different client workstations and a so-called DMZ. The firewall<br />

between the outside network and the DMZ is responsible for filtering the incoming network traffic that<br />

is intended for the servers as well as the client workstations. However, to further protect the clients, a<br />

second firewall is located at the boundary between the DMZ and the local network. This firewall is able<br />

to additionally filter traffic that is irrelevant for the client workstations (e.g., HTTP traffic to the Web<br />

server). The main advantage of this second firewall is that if a server within the DMZ gets compromised,<br />

the second firewall acts as an additional wall of protection between the client workstations and the compromised<br />

server. Finally, to further secure the client workstations against compromised clients, each<br />

client may have its own personal firewall that provides an additional layer of protection.<br />

22.3.3 Cryptography<br />

Cryptographic algorithms use mathematical techniques to guarantee a protection of data against unauthorized<br />

interference [MEN]. In <strong>industrial</strong> <strong>communication</strong> <strong>systems</strong>, these cryptographic algorithms<br />

can be used to secure data while it is transmitted over a possible insecure network. Depending on the<br />

used algorithms, the following security objectives can be guaranteed:<br />

• Data confidentiality: To avoid an unauthorized disclosure of confidential data, the producer has to<br />

transform it in way that unauthorized entities are not able to interpret the data’s meaning while it<br />

is transmitted over the network. To achieve this, encryption algorithms can be used. The output of<br />

the encryption (called cipher text) is transmitted over the network where the consumer receives<br />

it. To retrieve the clear-text version again, the consumer applies the inverse operation using the<br />

corresponding decryption algorithm.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!