The Value of Security Protocols on the Example of Smart Grid



Similar documents
Secure Machine to Machine Communication on the example of Smart Grids

How To Understand And Understand The Security Of A Key Infrastructure

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Laboratory Exercises V: IP Security Protocol (IPSec)

Network Security. Lecture 3

Secure SCADA Network Technology and Methods

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Cisco Which VPN Solution is Right for You?

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Lecture 10: Communications Security

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Network Security Part II: Standards

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Chapter 10. Network Security

TLS and SRTP for Skype Connect. Technical Datasheet

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Internal Server Names and IP Address Requirements for SSL:

Network Access Security. Lesson 10

(d-5273) CCIE Security v3.0 Written Exam Topics

Network Security Fundamentals

Case Study for Layer 3 Authentication and Encryption

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Securing Distribution Automation

MERA s competence in security design includes but is not limited to the following areas: Engineering and assessments for security solutions (e.g.

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1

Introduction to Security and PIX Firewall

Securing IP Networks with Implementation of IPv6

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

Chapter 7 Transport-Level Security

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Computer Networks. Secure Systems

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Best Practices for SIP Security

Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict All rights reserved

NETWORK SECURITY (W/LAB) Course Syllabus

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Chapter 9. IP Secure

T Cryptography and Data Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust

... Lecture 10. Network Security I. Information & Communication Security (WS 2014) Prof. Dr. Kai Rannenberg

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Chapter 4 Virtual Private Networking

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

OpenHRE Security Architecture. (DRAFT v0.5)

DIN/DKE Roadmap GERMAN

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Common Remote Service Platform (crsp) Security Concept

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

VOICE OVER IP SECURITY

ZigBee IP Stack Overview Don Sturek Pacific Gas and Electric (PG&E) 2009 ZigBee Alliance. All rights reserved. 1

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Implementing and Managing Security for Network Communications

Public Key Applications & Usage A Brief Insight

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

SBClient SSL. Ehab AbuShmais

This Working Paper provides an introduction to the web services security standards.

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

THE FUTURE OF SMART GRID COMMUNICATIONS

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

SSL BEST PRACTICES OVERVIEW

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

TLS/SSL in distributed systems. Eugen Babinciuc

Security vulnerabilities in the Internet and possible solutions

Secure Substation Automation for Operations & Maintenance

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Lecture 9 - Network Security TDTS (ht1)

Table of Contents. Introduction

CSCI 454/554 Computer and Network Security. Final Exam Review

ICANWK406A Install, configure and test network security

IP Security. Ola Flygt Växjö University, Sweden

By Jan De Clercq. Understanding. and Leveraging SSL-TLS. for Secure Communications

Lecture 17 - Network Security

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Is Your SSL Website and Mobile App Really Secure?

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Virtual Private Networks: IPSec vs. SSL

Security Services on IPv6 Networks: PKIv6 and IPv6-VPNs

Chapter 17. Transport-Level Security

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Security Considerations for DirectAccess Deployments. Whitepaper

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

CCIE Security Written Exam ( ) version 4.0

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

Transcription:

InfoWare 2014, Seville, Spain Key Note, June 25 th, 2014 The Value of Security Protocols on the Example of Smart Grid Steffen Fries, steffen.fries@siemens.com Siemens AG, CT RTC ITS Unrestricted Siemens AG 2013 All rights reserved. CT RTC IT Security

Siemens is organized in 4 Sectors: Industry, Energy, Healthcare and Infrastructure & Cities Siemens: Facts and Figures Siemens sectors Key figures FY 2013 Industry Divisions: Industry Automation Drive Technologies Customer Services Energy Divisions: Power Generation Wind Power Energy Service Power Transmission Healthcare Divisions: Imaging & Therapy Systems Clinical Products Diagnostics Customer Solutions Infrastructure & Cities Divisions: Rail Systems Mobility & Logistics Low and Medium Voltage Smart Grid Building Technologies Sales: ~ 76 bn. Locations: In 190 countries Employees: ~362,000 R&D expenses: ~ 4.3 bn. R&D engineers: ~29,800 Inventions: ~8,400 Active patents: ~60,000 ~ 19 bn. 1) ~ 27 bn. 1) Corporate functions Corp. Finance Corp. Technology Corp. Development ~ 14 bn. 1) ~ 18 bn. 1) Corporate Technology 1) Sales in FY 2013 Page 2 2014-06-25

Corporate Technology has 3 missions Corporate Technology: Mission, roles and basic principles The source of our excellence are our people. We attract and develop creative talents for Siemens. We foster talent exchange with the Business Units. We develop Siemens technology and innovation strategy on corporate level. We ensure seamless technology and innovation processes between Corporate and Business Unit levels. We foster a culture of innovativeness and high performance and our visibility to all internal and external stakeholders. We deliver services for the businesses as a strategic partner and integral part of their value chain. We take a focused approach (e.g., in regional setup, technology focus) to achieve high performance. We regularly develop highimpact technologies and innovations for Siemens with a clear focus on results. The business responsibility for implementing innovations lies with the Business Units. We primarily serve internal Siemens customers with a global mindset and setup. We actively manage our technology and innovation portfolio. We systematically leverage external competence networks to provide the best know-how for Siemens. Page 3 2014-06-25

Outline Introduction Smart Grid & Cyber Security Application of Security Protocols in different Scenarios Substation Automation Power Quality Monitoring and Event Collection DER Integration Connecting Electric Vehicles to the Charging Infrastructure Crucial Points for Integrating Security Protocol (Stacks) Summary & Challenges Page 5 2014-06-25

Smart Grid Scope Incorporation of Decentralized Energy Resources and Flexible Loads requires Security Large and Flexible Generation Distributed Generation Transmission & Distribution ICT Storage Industrial & Residential Electro Mobility Page 6 2014-06-25

What makes Security in Critical Infrastructures like the Smart Grid so important? Security incidents can affect target solution and connected (critical) assets ƒperformance degradation ƒloss of system availability & control Loss of privacy ƒcapturing, modification or loss of data ƒrepudiation (Company image) ƒenvironmental impact ƒfinancial loss ƒloss of health/life Secure solutions ensure reliable operation of critical infrastructures Page 7 2014-06-25

Security Requirements for Smart Grid Applications stem from a Variety of Potential Attacks (examples) Generation / DER Misuse of local administrative rights Distribution and Transmission Falsified status information, e.g., from synchrophasors (PMU) in widely dispersed locations may limit the power flow. Customer Prosumer behavior tracking, e.g., through smart meters Fraud through smart meter manipulation Market Fraud based on falsified offers and contracts (Customer, Utilities, DNOs, ) Operation Unauthorized remote service access Page 8 2014-06-25

Core Communication Standards for Smart Grids IEC TC57 Reference Architecture Distributed Energy Resources (DER) Electric Vehicle DER Generator Market System Back Office IEC 61970 / 61968 Common Information Model (CIM) IEC 61850-90-7, 8, 9, 10, 15 DER Storage Control Center A EMS Apps. DMS Apps. IEC 62325 IEC 61968 Control Center B IEC 62325 Market Communication using CIM IEC 61850-7-420 IEC 61970 IEC 61968 Communication Bus IEC 61970 SCADA IEC 60870-6 TASE.2/ICCP IEC 61850 Substation & DER Automation IEC 61850-7-410 IEC 60870-5-102 IEEE 1815 (DNP3) 60870-5-101/104 SS-CC IEC 61850 Substations / Field Devices IEC 62351 Cybersecurity IEC 60870 Telecontrol Protocols Turbine and electric systems IEC 61850 RTUs Substation Automation Systems IEC 61850-90-5 PMUs IEC 62351 Hydro systems IEC 60870-5-103 IEC 61850 Security for Smart Grid Hydroelectric/ Gas Turbine Power Plants Protection, Control, Metering SS-SS IEC 61850 GOOSE, SV IEC 61850 Switchgear, Transformers, Instrumental Transformers Page 9 2014-06-25

Communication Security provided the naïve way: RFC 3514 The Security Flag in the IPv4 Header Informational RFC (01.04.2003), Steve Bellovin (AT&T labs) Basic Idea Concept Detection of packets with malicious content on intermediate systems addresses Firewalls, IDS systems, and packet filters Sounds good, but, it s a joke Usage of the unused high-order bit of the IPv4 fragment offset field to signal malicious content For IPv6 options header conveys 128 bit strength indicator Evil Flag 0x00 packet has no evil content 0x01 packet has evil content Page 10 2014-06-25

Smart Grid Scenario Examples Secure Communication supports reliable Operation Power Quality Monitoring and Event Collection (Transmission/Distribution, Substation) Communication Standards used: IEC 61850 (GOOSE) Generation Transmission Distribution Consumer / Prosumer Microgrids Substation Automation (Monitoring + Control) Remote Service Inter Control Center Communication Communication Standards used: IEC 60870-5-104, IEC 61850 Connecting electric vehicles to the charging infrastructure Communication Standards used: ISO/IEC 15118, IEC 61850 DER Integration (Metering & Control) Communication Standards used: IEC 61850, XMPP (future use) Page 11 2014-06-25

Scenario: Substation Automation Applying existing Security Protocols Today s Situation Communication between substation and control center applies telecontrol protocols like IEC 60870-5- 104 and substation automation protocols like IEC 61850. Both base on TCP/IP Communication. Additional protocols like VoIP may be used to enable voice/video communication Security is often provided by using IPSec based VPNs connecting the two network domains Way forward targets end-to-end security It is desired to ensure that security reaches also deeper into the substation to the actual communication end, to support, e.g., RBAC IEC 62351 reuses existing security protocols for TCP/IP and profiles TLS (RFC 5246) to ensure end-to-end authentication and integrity and confidentiality. Additional means for authentication on application layer are defined, including RBAC based on X.509 certificate enhancements Page 12 2014-06-25

Security Protocols used in Scenario Internet Protocol Security (IPSec) IETF defined protocol: RFCs 4301 (Architecture), RFC 4302 (AH), RFC 4303 (ESP) IPSec may be used to secures any protocol transported over IP (IPv4 and IPv6) Allows to augment arbitrary client/server applications with classical security services: Mutual entity authentication (via Key Management) Message integrity RFC 4302 (AH) Confidentiality RFC 4303 (ESP) Security services support host-to-host-, host-to-router-, and router-to-router-communication (VPNs) IPSec supports only limited end-to-end security across firewalls Key management is handled either manually or automated by using IKE or IKEv2 Implementation examples: FreeS/WAN, KAME Libipsec, RTP Application / IKE (IKEv2) TCP/UDP IP/IPSec RTCP UDP SA Establishment Authentication Application Data Key Establishment Handshake Encapsulation Decapsulation Protected Data HTTP DNP3 TCP ICMP IP Sec Page 13 2014-06-25

Security Protocols used in Scenario Transport Layer Security (TLS) Application Representation Session Transport Network Data link Physical TLS Protocol Encapsulation/ Decapsulation Cipher text Payload Negotiation/ Key management/ Key management/ Authentication Authentication Handshake Independent from application protocols Allows to augment arbitrary client/server applications with classical security services: Entity authentication (unilateral, mutual) Message integrity Confidentiality Can supply secure end-to-end communications across firewall boundaries. Implementation example: openssl, gnutls,... TLS specified in RFC 2346 (v1.0) RFC4346 (v1.1), RFC5246 (v1.2) further extensions to address recently found security flaws TLS services are based on X.509-Internet PKI (PKIX) (Certificates and corresponding private key) Reliable transport services (typically TCP) Common use cases Secure web connections https Remote access via SSL/TLS VPNs SMTP HTTP FTP TLS TCP IP Page 14 2014-06-25

Scenario: Monitoring and Event Collection Applying existing Security Protocols Business Critical Physical Substation Security Perimeter File Server Historian Utility Communications Network Communication, e.g., via: - IEC 61850 - IEC 60870-5-104 - IEC 60870-6 TASE2 Web Navigator Remote Access Terminal Server Server DMZ Substation Internal Targets communication of Generic Object Oriented Substation Events (GOOSE), and Sample Values (SV) using, e.g., plain Automation Zone Remote Access Zone Ethernet as defined in IEC 61850 Substation Controller RTU Local HMI ` IP Switch Local HMI ` Usage of multicast transfer (device local subscription for events) Station Bus Zone Serial IED Process Zone PMU Remote Serial DCF 77 IED PMU Configuration Zone IEC 61850 Serial Server / Switch Serial Server / Switch IED IED IED IED IED System Operation Critical Real-time capable security required (message integrity and source authentication) Current security target: group based keys used (distributed using existing standards) in conjunction with keyed hashing Wide Area Network Monitoring Phasor Measurement Units (PMU) measure current, voltage, phase angle Currently communicate via IEEE C37.118 Synchrophasor Protocol Future: GOOSE over UDP as further option for communication Targets the same security approach as in substation GOOSE Page 15 2014-06-25

Group based Key Management provides solution for Substation and Wide Area GOOSE/SV Application of a group based key to distribute group key to be used for achieve message integrity. IED authenticate towards KDC using IED specific certificates and corresponding private keys Key Management based on Group Domain of Interpretation (GDOI, RFC 6407) IED A Group IED B KDC Key Distribution Center (KDC) pre-configured data stream related IED access list different data streams generates data stream related (group) keys SUBSCRIBE {IED-ID A, Stream-ID, Cert A } Sig A May by realized as component within a distinct IED PUBLISH {Stream-ID, Key-ID, Key, Lifetime} Cert A SUBSCRIBE {IED-ID B, Stream-ID, Cert B } Sig B PUBLISH {Stream-ID, Key-ID, Key, Lifetime} Cert B Page 16 2014-06-25

Scenario: Integration of Distributed Energy Resources (DER) into Grid Control Secure DER integration Prosumer or microgrid operator connecting resources and loads to the electrical grid Resources and loads need to be known Control Loads, Generators at the control center to ensure grid stability Communication controller likely to be operated behind Firewall and NAT Address resolution of target controller may not be always possible Inbound connection establishment may not be possible Page 17 2014-06-25

Integration of DER into Grid Control Application of existing and new security means Communication approach XMPP (RFC 6120) is a middleware messaging and presence protocol supporting decentralized architectures Allows for Registering resources in publicly reachable servers Resolving resources based on names Security (authentication, integrity, confidentiality) for the communication with the XMPP server XMPP supported security (current state) TLS (Transport Layer Security, RFC 5246) to protect the communication between the different entities and the XMPP server (mutual source authentication, integrity and confidentiality protection) SASL (Simple Authentication Security Layer, RFC 4422) is an authentication framework; and allows for authentication on application layer Likely to define additional security session for protecting the IEC 61850 client server communication over the XMPP server Server may be operated, e.g., by a telecom service provider, while the IEC 61850 endpoints belong to the distribution network operator (DNO) and the Prosumer/microgrid operator. Page 18 2014-06-25

ISO/IEC Standardization of Vehicle to Grid Interface IEC 15118 incorporates Security by Design Securely connecting the vehicle to the grid requires support of Connection of vehicles to the power grid (control of charging / discharging) Billing of consumed energy (charging) Roaming of vehicles between different charging spot (operators) Value added services (e.g., software updates) Security Approach Application of standardized security protocol to protect the communication between electric vehicle and charging spot Further security means to also protect application layer information beyond the scope of the charging spot (billing, credential provisioning) Attacks in scope (examples) Eavesdropping / Interception Man-in-the-Middle Attack Transaction Falsifying or Repudiation Page 19 2014-06-25

Application Trapo Security Protocols used in Scenario Securely Connecting the Vehicle to the Smart Grid Application of TLS to provide secure communication channel Source authentication of charging spot as terminating transport peer, integrity and confidentiality protected communication Application of XML Digital Signatures and Encryption to communicate with backend To be able to provide signed meter readings from EV to the backend and to provide and encrypted information (e.g. tariff, contract credentials) from the backend to EV Electric Vehicle Charging Spot Energy Provider with Control and Billing Functionality, Clearinghouse, Charge Spot Provider authentication, transport protection TLS Security e.g., contract related data, meter reading, tariffs, etc. contract authentication contract authentication XML Security Page 20 2014-06-25

Crucial Point in all Scenarios Security Credential Management Credential Management defines the process to assure secure handling of cryptographic key material necessary to protect data and command communication between peers. Generation Destruction Registration Deregistration Certification Archiving Distribution Revocation Installation Update Storage Derivation Vast number of security protocols rely on X.509 certificates and corresponding private keys The management of these credentials is typically the task of a Public Key Infrastructure (PKI) AND: requires additional communication protocols (see following slides) Page 21 2014-06-25

Private Public What is a Digital Certificate? A data structure that binds a public key value to a subject Defined in ITU-T X.509 and IETF RFC 5280 Binding through trusted certification authority (CA) verifying the subject's identity; alternative: self signed Limited lifetime, checked by the relying party along with the signature of the issuing CA Applied, e.g., in session key management, message protection, services like role-based access control Public Key Certificate Subject Entity associated Validity Period of validity Serial Number 12345 Subject Public Key Issuer Name of the trust center Signature Signature of trustcenter Holder Validity Serial Number 67890 Attributes Issuer Signature Attribute Certificate Entity associated, (e.g., Certificate 12345) Period of validity Set of attributes (e.g., roles) Name of the trust center Signature of trustcenter Certificate has one corresponding private key which has to be protected separately Attribute certificate provides temporary enhancement of public key certificate, linked with the public key certificate s unique identifier Page 22 2014-06-25

Public Key Infrastructure Which Interactions are necessary? Public Key Infrastructure (PKI) provides means to manage X.509 key material for user and IEDs IEDs ideally generate key material, only certification is done by the CA Human users apply for a certificate; Key generation either through tokens or PKI Migration option through self signed certificates in conjunction with certificate white listing Enrollment Examples: SCEP, CMC, CMS, EST Revocation Examples: CRL, OCSP Distribution & Fetching Example: LDAP Page 23 2014-06-25

Enrollment Protocol Examples SCEP (Simple Certificate Enrollment Protocol) IETF Historic Draft (draft-nourse-scep-23) PKCS #10 for certificate request, PKCS #7 for signing and enveloping of the certificate HTTP and LDAP for transport Requires manual authentication during enrollment Widely implemented (Cisco, Microsoft, Apple, ) EST (Enrollment over Secure Transport) IETF RFC 7030 Certificate enrollment for clients using Certificate Management over CMS (CMC) messages (PKCS #10) over a secure transport (HTTPS = HTTP over TLS) Expected to be SCEP successor Page 24 2014-06-25

Certificate Revocation using OCSP Online Certificate Status Protocol (OCSP) is defined in RFC 6960 OCSP response is digitally signed by the CA and contains (among other information) the certificate status value Delegation possible (different certificate than CA) OCSP may be done proactive (by the requester) or reactive (by the responder) Check Status C-ID Check Status C-ID Status Response OCSP Responder OCSP Responder Status Response Connection Request Incl. Certificate and OCSP Response Connection Response Connection Request Connection Response Requester Verifier Requester Verifier Applied in IEC 62351 for substation automation in IEC 62351 and in vehicle to grid communication using ISO 15118 Page 25 2014-06-25

Crucial Point in all Scenarios Software Quality For most of the security protocols commercial and open source implementations are available. SSL/TLS: OpenSSL, GnuTLS, IPSec: FreeS/WAN, KAME Libipsec, Prominent examples for implementation and integration errors of SSL/TLS libraries 2011 2012 2013 2014 BEAST DigiNotar Comodo CRIME Lucky 13 RC4 biases BREACH DRBG Backdoor Apple goto fail GnuTLS goto Triple Handshakes OpenSSL Heartbleed This argues for (increased ) Verification of the protocol state machine Black/White Box Testing, Fuzzing, etc. Integration of the protocol stack into the application Fuzzing, etc. Connection to the credential management Key store access, certificate validation checking, etc. Page 26 2014-06-25

Summary and Challenges Summary Automation environments like the Smart Grid already utilize existing security protocols Profiling and potential enhancements of security protocols landscape based on use cases Current deployed security means often rely on shared keys. Upcoming use cases like DER integration are likely to rely on X.509 key material, which in turn requires the integration of credential management into the current energy automation landscape Challenges Device-oriented security and identity infrastructure (processes, scalability, limits of authority, ) supporting efficient creation, distribution and handling of cryptographic credentials (e.g., security modules and their integration into products & production) Leverage of domain specific characteristics engineered networks (e.g., for certificate white listing) Extensive software quality improvement for security protocol implementations and their integration environment (applications and also hardware) Page 27 2014-06-25

Thank you for the attention! Questions? Page 28 2014-06-25