Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies DR. O. GEOFFREY EGEKWU and JIM RIDINGS Institute for Infrastructure and Information Assurance (IIIA) James Madison University
Functions of SCADA Systems Part of computer system that control production and distribution in critical infrastructure industries DATA ACQUISITION & HANDLING POLLING CONTROLLERS CHECKING ALARMS PERFORMING CALCULATIONS LOGGING & ARCHVING PROCESS DATA
JMU CIM Lab runs SCADA System Installed full commercial version SCADA system Physical security system implemented Cisco Security Agent both network and node protection being implemented Our experience similar to Cisco s experience in oil gas SCADA project
Critical Infrastructure Industries that use SCADA systems include: Electric power Oil and gas Water Chemicals Pharmaceuticals Metals and mining Pulp and paper Durable goods manufacturing
Issues around SCADA Systems Security for Manufacturing Sector Need to protect against outside and internal threats Assets in private hands difficult to regulate Corporations control confidential and/or proprietary information hence resistance to information sharing Small-to-medium businesses are essentially not part of the security equation yet security costs can be prohibitive Accessibility, a prime requisite for employee utilization of systems, becomes a major liability due to long value chains System failures still occur from incidents for which known technical solutions exist System assets (hardware and software) vary within sector
Enterprise Security Solution for Manufacturing Sector Security infrastructure must consist of redundant security layers Access control must comprise of physical solutions as well as authentication, authorization, and accounting solutions Possess encryption capabilities that prevent unauthorized access to company data even after it leaves the corporate secure network Possess a robust security POLICY that includes comprehensive employee training
Current Research Emphases Evaluate COTS and new security agents that reside in SCADA devices and/or network nodes Cisco Systems CSA 4.0 Integrate physical and software-based solutions into a single policy-based security system MC Dean/CIM Associates Develop framework for sector-wide security asset study that would lead to reliable vulnerability assessment process Cisco CIAG Integrate RFID technology into SCADA security system Defense Systems, Inc.
Expected Results Play a role in mandatory sector-wide risk assessment movement (pending bill on compulsory rail security assessment) Duty of Care & Duty to Warn legislation in the UK is an interesting model Improve confidence of self assessment tools, security solutions Identify Security Best Practices and guiding principles for sector Understand full impact of RFID technology on SCADA systems
RFID as an ENABLER Item Authentication, Track, and Trace are important application benefits Possesses more functionality: Read/Write memory On-tag sensors possible [MEMS] Active communication
RFID as an ENABLER RFID seen as silent technology and part of CI Knowledge-enabled logistics and control possible Application in multiple critical infrastructure sectors Tag read generates: receipt, acceptance, closeout, payment, inventory adjustment, update asset visibility system, Real-time asset locator system for SCADA security systems
An efficient, integrated approach to data collection and business intelligence [Adapted from Acsis ]
Camera (Pan Tilt Zoom) Security Server Monitoring station Digital IP Addressable Camera Local Network Local Lab Network Readers Controller Biometric Gateway Secure Internet Fingerprint Reader External Monitoring Station Card Reader Proximity Readers
Overview OF RFID VIDEO
< 140kHz 13.56MHz 869.4-869.65MHz 2.446-2.454GHz Standard.Standard. Standard! < 140kHz 13.56MHz 902-928MHz 2.4-2.4835GHz < 140kHz 13.56MHz TBD UHF 2.427-2.47GHz
Unified Protocol Performance Comparison Parameter Class 0 Class 1 Gen 2 Read Rate US: 800 tags/sec EU: 200 tags/sec US: 200 tags/sec EU: 50 tags/sec US: 1700 tags/sec EU: 600 tags/sec Rewriteability Read Only Write Once Fully Rewritable Privacy 24-bit Password 8-bit Password Security Regulatory Compliance Multi-Reader Environment -- Reader broadcasts OID, or -- Anonymous modes with reduced throughput Reader broadcasts partial OID -- 32-bit Password -- Concealed Mode -- Reader does not transmit OID -- Has authentication and encryption North America Worldwide Worldwide -- Reader transmissions are spectrally separated from tag backscatter -- Reader transmissions interfere with tag backscatter -- Reader transmissions are spectrally separated from tag backscatter -- Guardbands prevent reader-on-tag collisions
Only the Unified Protocol Meets All User Requirements User Requirements Class 0 Class 1 6A/6B Unified Worldwide Compliance X? Multi Source Availability Rewriteable Nonvolatile Memory X X? X > 500 tags / second Dense-Reader Operation Industry Endorsement X X X X X X X X Security X X Availability Q3/04
Supply Chain Management Warehouse [Phillips]
MWVIS Products And Services Reader Unit Legacy Corporate Systems Reader Unit Application Server Reader Unit Reader Unit
http://www.isat.jmu.edu/egekwu.htm egekwuog@jmu.edu