23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

22-12 Industrial Communication Systems<br />

Guaranteeing a secure environment for the execution of software is a typical task of the operation<br />

system running on the device. However, <strong>industrial</strong> <strong>communication</strong> <strong>systems</strong> contain embedded devices<br />

with limited system resources. Therefore, these devices are often not equipped with an operation system<br />

that provides support for advanced security services. Therefore, providing a secure software execution<br />

environment is especially challenging in embedded networks.<br />

22.5 State of the Art in Automation Systems<br />

This section will give an overview of the state of the art of security measures in <strong>industrial</strong> <strong>communication</strong><br />

<strong>systems</strong>. These are divided into fieldbus <strong>systems</strong> originally designed for building automation, but<br />

also used in <strong>industrial</strong> <strong>communication</strong>s, classical <strong>industrial</strong> fieldbus <strong>systems</strong>, and IP-based networks.<br />

An overview of the supported security mechanisms can be found in Table 22.1 at the end of this section.<br />

22.5.1 Security in Building Automation Systems<br />

Today, many different protocol standards for building automation <strong>systems</strong> exist. The most important<br />

open ones that span more than one application domain are BACnet [BAC], KNX [KNX], LonWorks<br />

[LON], and IEEE 802.15.4/ZigBee [IEE,ZIG].<br />

BACnet in its current version—version number 2008—offers an authentication service as well as different<br />

security services that guarantee data confidentiality, data integrity, and data freshness. These mechanisms<br />

use the symmetric Data Encryption Standard (DES) algorithm and a trusted key server, which is<br />

responsible for generating and distributing the secret keys. However, due to several security flaws [GR2],<br />

there are investigations underway to replace these security services by new ones. The new security architecture,<br />

which is defined in BACnet Addendum g, uses AES and HMAC in combination with a message<br />

ID and a time stamp. At the time of writing, BACnet Addendum g has not been declared as final yet.<br />

KNX, on the other hand, only provides a basic access control scheme based on clear-text passwords.<br />

Up to 255 different access levels can be defined, each of them associated with a different (otherwise<br />

unspecified) set of privileges. For each of these access levels, a 4 byte password (key) can be specified.<br />

However, since this rudimentary access control mechanism does not provide strong security [GR2], it<br />

is only of limited use in security-critical environments. Furthermore, it is not available for process data<br />

exchange, which is called group <strong>communication</strong> in KNX.<br />

In LonWorks, an authentication mechanism that guarantees data integrity and freshness is available.<br />

Support for data confidentiality is not provided. This mechanism is based on a four-step challenge–<br />

response protocol. The used cryptographic algorithm calculates a 64 bit hash value over the plain<br />

TABLE 22.1<br />

Security Services of Common Fieldbus Systems<br />

Fieldbus<br />

Foundation Fieldbus<br />

ControlNet<br />

PROFIBUS<br />

P-Net<br />

WorldFIP<br />

Interbus<br />

SwiftNet<br />

LonWorks<br />

KNX<br />

BACnet Addendum g<br />

ZigBee<br />

Security Services<br />

8 access groups, 8 bit unencrypted password<br />

Connection authentication, unencrypted password<br />

Access control for predefined addresses<br />

Simple write protection for variables<br />

8 access groups, 8 bit unencrypted password<br />

8 access groups, 8 bit unencrypted password<br />

None<br />

Challenge–response auth., integrity check, MD5 for IP<br />

Unencrypted password for management access<br />

AES for data confidentiality, HMAC for data integrity,<br />

time stamp + message ID for data freshness<br />

CCM* algorithm for data integrity, freshness, and<br />

confidentiality<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!