23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Security in Industrial Communication Systems 22-15<br />

from the device is tunneled through. To secure the tunneling connection, TLS is used. OpenVPN provides<br />

several methods to ensure authentication: a pre-shared symmetric key, a username and password<br />

combination, a TLS certificate, or a combination of these methods. While IPsec manipulates the network<br />

protocol, OpenVPN encapsulates the encrypted VPN packets into untouched TCP or UDP packets<br />

of the host network. However, the VPN packets themselves are secured down to the IP layer (layer 3) in<br />

the routing mode or down to Ethernet (layer 2) in the bridging mode.<br />

22.5.4 Security in Wireless Communication Systems<br />

Like many other sectors, wireless networks are also more and more introduced in <strong>industrial</strong> and building<br />

automation infrastructures. Main concern is the robustness to electromagnetic interference and in<br />

general the security goal of availability that can only be solved by proper organizational measures (e.g.,<br />

redundant transmission paths). Also, the wireless transmission is prone to eavesdropping and message<br />

insertion since the media can be accessed by everyone. Chapter 28 introduces the security measures to<br />

fulfill the above-mentioned security goals. To combine existing physical security measures (e.g., fences,<br />

closed rooms) to increase security, new research is going in the direction of location-based security<br />

services limiting the accessibility of a network not only by the signal strength, but also by an active<br />

localization of the node. The Austrian Academy of Sciences investigates such security measures based<br />

on a localization of COTS Wireless LAN hardware via dedicated access points [TR2].<br />

22.6 Outlook and Conclusion<br />

The lack of state-of-the-art security measures at the field level of many <strong>industrial</strong> <strong>communication</strong> <strong>systems</strong><br />

almost solely allows implementing security measures on top of the automation networks. This<br />

usually introduces overhead and undermines interoperability. To omit security is related to high risks.<br />

At the intranet/Internet zone, a general awareness of these risks exists and security measures are commonly<br />

implemented in terms of secured tunneling. At the field-level zone, this awareness is missing.<br />

Looking at threats to <strong>industrial</strong> <strong>communication</strong> <strong>systems</strong>, omitting security measures at the field level<br />

must be very carefully considered. Security measures (at all levels) also help to tackle other problems<br />

such as accidental errors within remote maintenance or safety issues. Therefore, it is worth the effort to<br />

integrate security measures at all levels. Yet, security must not solely be equated to network security or<br />

cryptography. Many security threats, e.g. DoS attacks, require more organizational measures and show<br />

that security must include the complete system and not only a dedicated part. Setting the appropriate<br />

boundaries for security is the most critical part in security design: Defining what is trusted and what<br />

is untrusted requires deep insight into the overall applications, especially since <strong>industrial</strong> <strong>communication</strong><br />

and <strong>industrial</strong> process control strongly interact with its environment. In practical implementations<br />

the security goals of integrity, availability, and authentication/authorization are the most important<br />

ones to protect. Confidentiality and non-repudiation are of minor interest for <strong>industrial</strong> applications.<br />

Additionally, traceability is important during maintenance.<br />

Abbreviations<br />

AES<br />

BACnet<br />

CMAC<br />

CIM<br />

CPU<br />

DMZ<br />

DES<br />

DoS<br />

Advanced encryption standard (cryptographic cipher)<br />

Building automation control network<br />

Cipher-based message authentication code<br />

Computer-integrated manufacturing<br />

Central processing unit<br />

Demilitarized zone<br />

Data Encryption Standard (cryptographic cipher)<br />

Denial of service (attack)<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!