23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

22-10 Industrial Communication Systems<br />

a seal to allow visual detection of direct manipulation and to disable network management commands<br />

if applicable. A second level might be a solid case that cannot be opened without obviously damaging<br />

the case or components of it. The third level of physical protection is the usage of a security token that<br />

contains the secrets.<br />

In general, for most applications detecting the opening of the case would increase security, but due<br />

to cost restrictions measures can only be very simple, e.g., a switch or a simple light detector. Hence,<br />

the overall increase of security is only very marginal, since the devices do not have independent power<br />

supply (battery) that maintains the security functions if the device is unplugged. That is, an attacker can<br />

analyze the turned-off device and circumvent the security measures with little effort.<br />

Considering all possible attacks, it is not cost effective to protect the whole node, rather a small part<br />

is equipped with high-security measures, which is called security token. For other applications in commerce<br />

and for building security, such security tokens are already on the market and state of the art.<br />

The most known token is the smart card that implements well-proven security measures to fulfill the<br />

requirements defined before. These commercially available security tokens offer an advanced security<br />

design and satisfy the requirements of high-security applications (e.g., electronic money, digital signatures).<br />

Measures like scrambled RAM placement, power supply monitoring, fail-safe operation, and<br />

power consumption ciphering are already included in such devices. Common products often have a<br />

certificate to be resistant against malicious scrutiny and manipulation (e.g., common criteria evaluation<br />

levels).<br />

In [SC1], the authors already implemented such an approach for the LonWorks [LON] protocol offering<br />

two advantages: First the smart card provided the required secure data storage for the node, and<br />

second the card also supported state-of-the-art cryptographic functions. The smart card was connected<br />

to a LonWorks node using a serial interface and integrated in the application in such a way that each<br />

message sent was protected by an HMAC-SHA-1 cryptographic check sum and encrypted using 3-DES<br />

overcoming the limitations of the LonWorks security mechanisms with respect to strength, number of<br />

security groups (only one is supported by LonWorks), and the support of security services (LonWorks<br />

only supports a weak authentication for unicast services).<br />

Yet, a complete integration of the security token in the chip is often favorable compared to the external<br />

smart card and the required interconnection circuit. Especially for wireless networks, many chips<br />

already have a security token integrated for cryptographic operations reducing the necessity for an additional<br />

security token.<br />

22.4.2 Secure Software Environments<br />

A common approach that directly manipulates the behavior of a device is to interfere with the software<br />

running on it. To achieve this, an adversary may try to change existing program code or even add new<br />

code fragments to existing ones. Thus, modifications that have never been the intention of the software<br />

developer can result in malicious software behavior. This changed or newly added malicious code is<br />

generally called malware, an abbreviation for malicious software. Note that unintentional software faults<br />

are by definition not malware even if they may result in vulnerabilities that an adversary may utilize.<br />

Depending on the intention of malware and on the damage it may cause, malware can further be categorized.<br />

In the literature, different definitions that may differ to each other exist. The most important<br />

kinds of malware are the following:<br />

• Virus: A virus is a self-replicating piece of software that inserts itself into existing program<br />

code or replaces part of it. By definition, a virus needs always a host program that activates it,<br />

since a virus cannot run by itself.<br />

• Worm: In contrast to a virus, a worm is a malicious stand-alone program that propagates a complete<br />

copy of itself usually over the network. The main characteristic is that a worm does not need<br />

any user interaction.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!