23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security in Industrial Communication Systems 22-13<br />

message and a random number using a shared secret key. However, due to key length and several protocol<br />

flaws, this mechanism cannot be considered as secure [SC1]. In addition to this basic authentication<br />

mechanism, a more advanced one based on MD5 is available for LonWorks/IP. However, since MD5 is<br />

not collision resistant, it is also regarded as insecure.<br />

IEEE 802.15.4 supports security mechanisms at the data link layer. The current version IEEE 802.15.4-<br />

2006 uses a variant of the counter with CBC-MAC (CCM) algorithm called CCM to guarantee data<br />

integrity, freshness, and confidentiality. ZigBee in its current version ZigBee 2007 utilizes the IEEE<br />

802.15.4-2003 transmission services of the data link layer. However, ZigBee 2007 does not use the security<br />

mechanisms provided by IEEE 802.15.4-2003—they are completely replaced by a more advanced<br />

security concept. This concept supports the use of different key types and provides advanced key management<br />

services. Again, CCM* is used as a cryptographic algorithm.<br />

Beside the security features within the protocol, an important issue is the connection of the building<br />

to remote maintenance centers. For such connections, buildings are equipped with gateways that allow<br />

remote access to the underlying fieldbus. Typical security measures for these gateways are IP connections<br />

protected by transport layer security (TLS) or VPN that securely tunnel the commands from the<br />

remote site to the fieldbus (see Section 22.5.3). In rare cases also Web Services Security is used. To the<br />

fieldbus site, the gateways usually provide no security or the security protocols mentioned above.<br />

22.5.2 Security in Industrial Communication<br />

Although almost never used, some <strong>industrial</strong> automation fieldbusses support security. However, these<br />

security measures are very limited in scope and capabilities, and therefore cannot be considered as<br />

serious protection if a considerable threat level needs to be assumed. The fieldbus <strong>systems</strong> for <strong>industrial</strong><br />

and process automation currently standardized by the IEC in the standards IEC 61784-1 [IEC1] and the<br />

underlying IEC 61158 series [IEC2] are a heterogeneous collection of solutions. Their security features<br />

can be divided into two categories: in <strong>systems</strong> like ControlNet, P-Net, and SwiftNet, hardly any state-ofthe-art<br />

security measures are used at all. Foundation Fieldbus, Profibus, WorldFIP, and Interbus on the<br />

other hand implement very similar application layer services and protocols modeled after their fieldbus<br />

ancestor MMS. The simple access protection mechanism of these <strong>systems</strong> is based on access rights management<br />

similar to UNIX-based <strong>systems</strong>. Every object has a 8 bit long password associated with it and a<br />

list of 8 different access groups coded in an 8 bit word. Both password and access groups are transmitted<br />

in plain text. If they match for a specific request, the additional access rights parameter defines the<br />

allowed operations. Usually the access rights depend on the type of object and allow reading, writing,<br />

executing, deletion, etc.<br />

Unfortunately, these security means are not mandatory for implementation, and the password itself,<br />

additionally, has no explicit protection. That is, it is transmitted in clear text, and hence should not<br />

be used at all. A note in IEC 61158-5 reveals the actual intention of the security mechanisms: “This is<br />

not a protection against intentional misuse of the <strong>communication</strong> facilities of a field device but helps<br />

to protect a system for accidental erroneous use of process data.” This statement is in fact true for all<br />

traditional fieldbus <strong>systems</strong> in <strong>industrial</strong> and process automation. Hence, to secure data traffic security<br />

measures can only be implemented on top of the protocol stack. That is, the fieldbus is only used as a<br />

transparent transport channel to transmit secure messages over standard fieldbus protocols and services.<br />

Such an application-level approach could easily achieve end-to-end security, which is the goal<br />

in many applications, anyway. Similar approaches have already been implemented for safety applications<br />

such as the Profisafe profile of Profibus (IEC 61158). Drawback of adding such an application-level<br />

approach for security is to cause problems with interoperability, since in general the interoperability<br />

mechanism of the underlying fieldbus system cannot be used. Existing variable types or messages cannot<br />

be used since they define no properties for security measures. Hence, the only way is to use general<br />

purpose messages and redefine their behavior. Although a parallel usage of secure and insecure devices<br />

is possible with this approach, the practical application demands a joint use. Yet connecting secure and<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!