23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

22-14 Industrial Communication Systems<br />

unsecure messages sacrifices all security. Another problem is the limited message size in some fieldbusses<br />

that leaves only little room for efficient security extensions. Especially, integrity services such as<br />

hash codes or MACs require additional data blocks reducing the actually available payload per packet,<br />

and consequently the performance of a secured channel drastically.<br />

22.5.3 Security in IP-Based Networks<br />

IP-based technologies are gaining increased importance in <strong>industrial</strong> <strong>communication</strong> <strong>systems</strong>. Due to<br />

the widespread use of IP-based LANs and more recently the Internet, IP-based networks are already<br />

widely used at the management level and as backbones to connect remote fieldbus segments. However,<br />

due to the decreasing costs for IP cabling and network interface hardware, even small embedded microcontrollers<br />

can be equipped with a dedicated Ethernet interface chip. Therefore, IP and LAN technologies<br />

have started to penetrate the field level, and their use is no longer limited to the management level<br />

where PC-based devices are located.<br />

From the security point of view, IP-based networks are especially prone to security attacks. This is<br />

for various reasons. Since IP as well as the underlying data link protocols (e.g., Ethernet) do not provide<br />

native security mechanisms, many well-known vulnerabilities exist. Additionally, since IP networks<br />

may be shared with other applications (e.g., office LAN) and interconnections to foreign networks for<br />

remote access are common, gaining access to the network may be easier.<br />

Due to the widespread use of the Internet, security has been a major research field in the IT world<br />

for years. Therefore, many security extensions for IP-based networks are available where each of these<br />

mechanisms is suitable for a certain application field. In this section, a small subset of available, state-ofthe-art<br />

mechanisms that are suitable for <strong>industrial</strong> <strong>communication</strong> <strong>systems</strong> are presented.<br />

Internet Protocol Security (IPsec) [IPS] is a security extension to the IP protocol, and thus operates<br />

on the network layer. IPsec is a part of IPv6, but since IPv4 is still the predominantly used network<br />

protocol in the IT world, it has been ported to extend IPv4. IPsec ensures data integrity, freshness, and<br />

confidentiality. To achieve this, various cryptographic algorithms can be selected (e.g., 3-DES, AES,<br />

HMAC-SHA1). For key exchange, the Internet Key Exchange (IKE) protocol is used. IKE uses asymmetric<br />

algorithms like RSA, ECC, or symmetric algorithms with pre-shared secret keys, alternatively.<br />

One of the main concepts of IPsec is the notion of a Security Association (SA). An SA is a one-way connection<br />

between a sender and a receiver that specifies the security services to apply to the traffic carried<br />

over the connection. Each SA contains the following parameters that may be used to uniquely identify<br />

it: a Security Parameter Index (SPI), the IP destination address, and the security protocol identifier.<br />

Parameters of every SA are stored in an SA database. SAs either support transport mode for <strong>communication</strong><br />

between two hosts or tunnel mode for <strong>communication</strong> between a host and a security gateway or<br />

between two security gateways.<br />

Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) [TLS] is a protocol developed<br />

for securing <strong>communication</strong> between two parties. During the initial handshake, the devices are<br />

authenticated, the used cryptographic algorithms are negotiated, and shared secret keys are exchanged.<br />

After the initial handshake, these secret keys are used to establish a secured channel between the two<br />

entities that provides data confidentiality, integrity, and freshness. Like in IPsec, the initial key exchange<br />

is usually done using asymmetric algorithms, while the secured channel is protected using symmetric<br />

algorithms exclusively. TLS offers similar algorithms but operates on a higher level in the ISO/OSI layer<br />

model. It encrypts data between the transport layer (TCP or UDP) and the application layer. TLS is very<br />

flexible with respect to the use of algorithms. So, it is possible to implement secured unicast connections<br />

on embedded devices, too. [GUP] shows an implementation of a complete secure Web server, using<br />

HTTP and TLS. In this implementation, the asymmetric encryption part of TLS is done with the help of<br />

elliptic curve cryptography (ECC) [HAN].<br />

A popular VPN implementation for IP-based networks is OpenVPN [OVPN]. In OpenVPN, each<br />

device opens a secure unicast connection to a centralized server where the whole network traffic to and<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!