Keeping SCADA Networks Open and Secure DNP3 Security

Similar documents
Benefits of a Modern SCADA Protocol DNP3 vs Modbus

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

Benefits of Network Level Security at the RTU Level. By: Kevin Finnan and Philippe Willems

Securing Distribution Automation

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Security Policy. Security Policy.

Securing IP Networks with Implementation of IPv6

GSM and UMTS security

Chap. 1: Introduction

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Using etoken for SSL Web Authentication. SSL V3.0 Overview

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

CS 356 Lecture 29 Wireless Security. Spring 2013

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Wireless Encryption Protection

CHAPTER 1 INTRODUCTION

Cryptography and Network Security

Web Security Considerations

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Secure web transactions system

Chapter 7 Transport-Level Security

Potential Targets - Field Devices

Notes on Network Security - Introduction

TLS and SRTP for Skype Connect. Technical Datasheet

Basics of Internet Security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

chap18.wireless Network Security

Industrial Communication. Securing Industrial Wireless

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

PrivyLink Internet Application Security Environment *

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Business Continuity and Disaster Recovery Solutions in Government

Your Wireless Network has No Clothes

544 Computer and Network Security

How To Secure Wireless Networks

Information System Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Chapter 17. Transport-Level Security

INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6

Enterprise Solutions for Wireless LAN Security Wi-Fi Alliance February 6, 2003

Protocol Security Where?

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

ITL BULLETIN FOR AUGUST 2012

Network Security Part II: Standards

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Steelcape Product Overview and Functional Description

A 360 degree approach to security

WLAN Information Security Best Practice Document

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Mobile Office Security Requirements for the Mobile Office

Chapter 2 Wireless Networking Basics

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Implementing and Managing Security for Network Communications

Who is Watching You? Video Conferencing Security

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

Table: Security Services (X.800)

Sync Security and Privacy Brief

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security Requirements for Wireless Networks and their Satisfaction in IEEE b and Bluetooth

Security Issues with Integrated Smart Buildings

Ciphire Mail. Abstract

The Importance of Security Standards

Skoot Secure File Transfer

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Chapter 10. Network Security

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Securing VoIP Networks using graded Protection Levels

Public Key Infrastructure (PKI)

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

ICAB5238B Build a highly secure firewall

TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic

An Introduction to Cryptography as Applied to the Smart Grid

Secure SCADA Communication Protocol Performance Test Results

The BANDIT Products in Virtual Private Networks

User Authentication Guidance for IT Systems

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Security in Ad Hoc Network

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CS5008: Internet Computing

Application Note: Onsight Device VPN Configuration V1.1

AMI security considerations

Biometrics and Cyber Security

Improving SCADA Control Systems Security with Software Vulnerability Analysis

NETWORK ADMINISTRATION AND SECURITY

Security in Wireless Local Area Network

International Journal of Computing and Business Research (IJCBR) INSECURE GSM NETWORK AND SECURITY SOLUTIONS FOR MOBILE BANKING

UMTS security. Helsinki University of Technology S Security of Communication Protocols

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

How To Encrypt With An Certificate On An From A Gmail Account On A Pc Or Mac Or Ipa (For A Pc) On A Microsoft Gmail (For An Ipa) Or Ipad (For Mac) On

Transcription:

Keeping SCADA Networks Open and Secure DNP3 Security June 2008

DNP3 Protocol DNP3 protocol has become widely accepted within water and electrical utilities worldwide for SCADA communications with field equipment. One of the reasons for its acceptance is because it is an open protocol. This allows manufacturers to supply equipment to utilities which can be easily integrated into their SCADA systems. However, DNP3 was never designed with security in mind. Since it is an open design, anyone familiar with the protocol could launch an attack on a SCADA system. This is especially true when the protocol is used over radio networks where packets can be intercepted with a scanner. In recent years, regulatory bodies have taken an increasing interest in the security of public infrastructure. The threat of terrorism attacks are taken particularly seriously. SCADA communications networks are of particular concern since they often control essential services such as sewerage, water and electrical supplies to the community. The DNP3 community has recognized the need for secure SCADA communications and have developed a security model for the protocol with the following goals: Provide both authentication and message integrity Low overhead Supports remote key management Built into DNP3 at the application layer Compatibility with all DNP3 supported communications links The security protocol specification is currently being finalised and is expected to be submitted to the DNP3 Users Group for review in the second quarter of 2008. It is expected to be approved and released shortly thereafter. Implementations of secure DNP3 are already becoming available, and MultiTrode is at the forefront of this push. The MultiSmart Pump Station Manager includes secure DNP3. MultiTrode has chosen to implement the new standard as early as possible because water and wastewater utilities are already demanding security within communications networks. Figure 1 MultiSmart Pump Station Manager Page 2 of 5

Proprietary Protocols vs. DNP3 Security A common perception is that proprietary protocols are inherently secure because their design is not open. Unfortunately this assumes the protocol is not easily reverse engineered. Security measures that may exist in proprietary protocols cannot be independently verified for their robustness. Assuming a proprietary protocol is secure to the level required is therefore a leap of faith. DNP3 Security is implemented within the protocol itself. Proven industry standard authentication methodologies are employed which can be investigated and verified independently. This approach is to be preferred when placing the security needs of civil infrastructure in a particular protocol. How Secure DNP3 Works Secure DNP3 is designed to eliminate the risk of messages being either falsified, or intercepted and repeated by a third party. Both scenarios could result in extensive damage to equipment and disruption of services if carried out correctly. According to the draft specification, the following security threats are addressed by the protocol: Spoofing Modification Replay Eavesdropping - on exchanges of cryptographic keys only, not on other data. Non-repudiation to the extent of identifying individual users of the system Secure DNP3 secures against these threats by providing both authentication and message integrity. It does not encrypt the messages, but does use key encryption to keep session keys secure. Secure DNP3 uses a Challenge Response method to verify the message is originating from a valid source. The implementation is based on the proven Challenge- Handshake Authentication Protocol (RFC 1994). Page 3 of 5

Figure 2 Challenge Response Process Either side of the link can initiate an authentication challenge. This can be at initialisation, periodically or when a critical function is received. An authentication response is then sent. The authentication challenge contains some pseudo-random data, a sequence number and the required algorithm. The response contains a hash value generated from the challenge data and the key. The sequence number is also returned. If the authentication response is valid then the challenger will respond to the original DNP3 message with a standard protocol response. The Challenge-Response method above adds to the required communications bandwidth. If bandwidth is at a premium, a simpler authentication method can be used instead. Aggressive Mode reduces the required bandwidth by eliminating the normal challenge and response messages. The authentication data can also be included at the end of the DNP message. This mode is slightly less secure. Figure 3 Aggressive Mode Page 4 of 5

Key Management Secure DNP3 uses minimum 128 bit AES encryption to keep keys secure. There are two types of keys - temporary session keys and update keys. Session keys are initialised at start-up and then changed regularly approximately every 10 minutes. Update keys are used to encrypt the session keys. These are pre-shared at either end of the link so they never need to be transmitted. Summary The addition of security measures to the DNP3 protocol is important for SCADA communications networks operating over easily intercepted mediums such as radio. Threats such as message interception and repeating are effectively handled by implementing secure authentication within the application layer of the protocol itself. Using DNP3 Security allows an organisation to benefit from using an open, accepted, protocol without the need to use proprietary protocols from one vendor. For more information on MultiTrode s range of products, visit their website at www.multitrode.com References DNP3 Specification, Volume 2, Supplement 1, Secure Authentication. Version 1.00, 3 rd February 2007. Page 5 of 5