Fieldbus Protocol For Secured Wireless Sensor Network Communication in Process Automation



Similar documents
FOUNDATION Fieldbus High Speed Ethernet Control System

Process Control and Automation using Modbus Protocol

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones

Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements

Chapter 9. IP Secure

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY

Using MODBUS for Process Control and Automation

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Single Sign-On Secure Authentication Password Mechanism

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Protocol Rollback and Network Security

Industrial Networks & Databases

Wireless Communications for SCADA Systems Utilizing Mobile Nodes

The Secure Sockets Layer (SSL)

Security vulnerabilities in the Internet and possible solutions

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description

High-Performance, Highly Secure Networking for Industrial and IoT Applications

Elettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS

Virtual Private Networks

An Overview of ZigBee Networks

Compter Networks Chapter 9: Network Security

Computer Networking: A Survey

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Wireless Sensor Network for Performance Monitoring of Electrical Machine

Security in IEEE WLANs

Problems of Security in Ad Hoc Sensor Network

A Transport Protocol for Multimedia Wireless Sensor Networks

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Bus Data Acquisition and Remote Monitoring System Using Gsm & Can

How To Analyze The Security On An Ipa Wireless Sensor Network

DATA COMMUNICATION BETWEEN PROGRAMMABLE LOGIC CONTROLLERS IN THE INDUSTRIAL DISTRIBUTION APPLICATIONS

Chapter 17. Transport-Level Security

Secure SCTP against DoS Attacks in Wireless Internet

Networking Test 4 Study Guide

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

SSL A discussion of the Secure Socket Layer

Client Server Registration Protocol

Recommended Wireless Local Area Network Architecture

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

Network Security Part II: Standards

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

6LoWPAN Technical Overview

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Securing IP Networks with Implementation of IPv6

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Architecture of distributed network processors: specifics of application in information security systems

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 7 Transport-Level Security

IT Data Communication and Networks (Optional)

Chapter 5. Data Communication And Internet Technology

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

PLCs and SCADA Systems

Network Security Technology Network Management

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

524 Computer Networks

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

RIG Acceptance Test (RAT) Procedures

Degree programme in Automation Engineering

Wireless LAN Security Mechanisms

Chapter 8. Network Security

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Chapter 6 CDMA/802.11i

Different Ways of Connecting to. 3DLevelScanner II. A.P.M Automation Solutions LTD. Version 3.0

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Mobitex security issues

ESE566 REPORT3. Design Methodologies for Core-based System-on-Chip HUA TANG OVIDIU CARNU

Security Sensor Network. Biswajit panja

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

OSI Seven Layers Model Explained with Examples

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Vorlesung Kommunikationsnetze Fieldbus Systems

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

11/22/

Design of Remote data acquisition system based on Internet of Things

Synapse s SNAP Network Operating System

Packet Synchronization in Cellular Backhaul Networks By Patrick Diamond, PhD, Semtech Corporation

Transcription:

Fieldbus Protocol For Secured Wireless Sensor Network Communication in Process Automation 92 Dr.S.Udayakumar* and S.Ananthi** *National Institute of Technical Teacher s Training and Research (NITTT&R), Chennai **University of Madras *Udayakumar_s@yahoo.com **ananthipradeep84@gmail.com Abstract: In Modern process Industries, Field bus model is used to transmit control information via the various bus levels to control the process units. Field-bus model makes use of a protocol structure which is similar to the OSI model and which has been customized to support process control systems in a lucid manner. There are the problems of process plant maintenance associated with sudden unexpected sabotage and consequent failure and damage to plant and personnel. When there are three levels of bus based communication the Factory level, the Cell level and the plant or field level, - the security of the data relating to plant set points, control system parameters and the thresholds etc has to be maintained at all times absolutely. The DES algorithm has been developed and implemented and tested in the field bus data. Keywords: FieldBus, DES Algorithm, Network Security, Process Automation, DSP, IEEE RS 485 I. NEED FOR SECURITY Every day, the process automation is changing with a new concept. Industrial field devices are being upgraded from the earlier method of 4-20mA analog communication standard to the new digital method known as the Field Bus. This new technology promises a lot, in terms of reduction of installation costs and also providing the two way communication between the control room and the actual plant in the case of process industries. Any sudden unexpected sabotage consequent failure and damage to plant and personnel. The data can be purposely altered, for e.g. sensor data which will lead to a control signal from the Master which can lead to plant malfunction and subsequent shutdown. Even though the protocol was designed having in mind the IEEE RS 485 as physical layer, efforts was spent to render the SFPB packets to be carried over others physical layers. 1.1. Simple Field Bus Protocol: APPLICATION: SFBP partially implements the application layer by the two packet types Control packet and Data packet. In addition it does not defines the Presentation nor the Session layers that are implicitly left to the Application. The Type of packet bits of the Packet Information section are related to the Application layer level, and in addition the NEXT bit of the Packet Information section may play a role also at the Session layer level. Byte ordering is left to the application, it simply defines the BIG ENDIAN order, where the most significant byte is the last one. TRANSPORT: The ACK packets allow connected packets and mechanism for retransmission on fault of connected packets. The NEXT bit gives a rough mechanism to deal with large messages. However a full implementation of transmission of large messages is left at the application level.

93 NETWORK: ACK packets and System packets works at Network layer level, in fact they can be used also for routing purposes. DATA LINK: This layer is covered by packets format and the CSMA/CD similar mechanism and the timing rules. flowing in across the network and a decryption at the receiver end. In large process plant, Using popular encryption algorithms, such as the Data Encryption Standard (DES) and a protocol for secure key exchange has been developed for Symmetric Encryption). The possibility for intervention at various levels is shown in fig.2. PHYSICAL: SFBP does not specify the physical layer, even though it was designed on top of a IEEE RS 485, it can run over any other physical layer such as IEEE RS 232, optic, radio and so forth. The comparison of conventional and field bus in related to security is given in figure 1. Comparing conventional and Fieldbus Systems w.r.t security Fig.2 Shows the possibility of intervention at various levels of the Fieldbus Fig.1. Typical Fieldbus Systems II. SECURITY IN PROCESS CONTROL The field bus along with its associated networks are problems of sudden unexpected sabotage and consequent failure and damage to plant and personnel. Secure data communication relies on suitable encryption of the data Higher level devices are connected to the supervisory levels using commercial networks based on TCP/IP. (Fig.2). In those levels, security protocols are easy to implement, and are also commercially available At the Field level, implementation of security features is difficult because field devices are not sufficiently powerful. It is difficult to co-ordinate among the several sets of field devices. Difficulties exist in incorporating the contemporary cryptographic algorithms over Fieldbus networks. Some have been given below.

94 Field us standards are not well laid out The end devices must be capable of supporting the volume of computation required to decrypt the data and apply it to the control of process. Encryption must be two-way. When the process variable data are being sent upwards over the bus, the same should also be encrypted. This imposes an additional requirement for the field devices to run encryption algorithm. The simple Fieldbus packet details are given below: III. THE CHOICE OF ALGORITHM Of all the standard cryptographic algorithms available in the market today, this work uses the Data Encryption standard 9DES) as the backbone for the Fieldbus security protocol. There are several reasons behind this preference for the DES. The DES is absolutely symmetrical. The algorithm is public and the encrypted message is a function of the input text and the key > Description is done using the same key. The algorithm is probably the fastest of all the commercial cryptographic algorithms available today. The key length is manageable at 56-bits and is more than enough to guarantee security for Fieldbus networks carrying short data chunks. The algorithm is IEEE prescribed standard. IV. FIELDBS PROTOCOL- DEVELOPMENT AND IMPLEMENTATION The implementation of the protocol is based upon a set of primitives which is common to the various levels of the Fieldbus architecture. The one major problem in the implementation of symmetric encryption algorithms like the DES, is the process of key exchange. There has to be a way by which the communicating parties can securely exchange the key. This cannot be done by directly transmitting the key without encryption, which in turn requires another key(infinite recursion!). A straight forward solution could be to manually be exchange the keys.which would be a one-time process during network setup. Communication could then proceed using the manually distributed keys and should theoretically remain secure, but for how long? Network interveners could employ guessing schemes such as the known message or the probable message attacks, or some form of key deduction by analyzing encrypted samples, and figure out the key.this process could happen within days of installations, depending upon the amount and frequency of messages transmitted over the network.this is an added advantage for fieldbus systems as many of the control messages are usually short and frequented over the network.. To get over this problem, the highest level in the fieldbus network, namely the Master supervisory level is equipped with a secure trusted system known as the Key Distributor (KD).The key distributor is installed in a physically sealed environment with access permitted only to trusted management level personnel. It does not require frequent manual intervention as the operating protocol is fully automated. In fact, ZERO manual intervention is a reasonable option.

95 The Protocol Initial Configuration The Master (viz. Supervisory) level has a trusted Key Distributor Every computer at the Master level shares a key with the Key distributor(kd) All the Field Level PLCs also share a key with the Key Distributor The Initial Key configuration is done in secrecy, manually by the higher authorities. Fig.3 Shows the presence of the key distributor at the highest level 4.1.The Initial Configuration To kick start the protocol operation, the following initial configuration should be established. The key distributor should share a DES key with each of the devices in Master level and also the Field Level PLCs. The key distributor should be recognized as the trusted system on the network and every message sent by the KD should be encrypted (except for few allowable exceptions, such as acks, to be discussed later) This initial configuration is only required to turn on the security system. The manually established keys are very much transient,and will change automatically (without manual intervention )from time to time, to ensure tighter system security. 4.2. Procedure for Key Exchange Now that the initial configuration has been put in place, the KD can securely exchange messages with other devices in its level and also the Field level devices (usually PLCs).This secure channel is made use to facilitate key exchange between master and slave devices so that they can proceed to communicate directly. The actual key exchange occurs as follows. The Master (M) starts off by sending an encrypted message to KD (encrypted by the key km, kd shared between M and KD ) that includes the master s identity (optional depending upon underlying communication protocol), the identifier of the Field device (F, usually the PLC, terms used interchangeably) with which it wants to communicate a newly generated 56-bit key Km, Fd for communication with F and a Time stamp TS1. KD then proceeds to verify the key and diverts it over to the Field device F, encrypted by the key Kfd, kd (shared between KD and F ). Along with the key, the identifier of M, a new Timestamp(current clock)and the original timestamp value when M initially placed the request(ts1) are also included in the message. The Field devices stores Km,fd in its key database against the identifier of M. It follows up sending a key acknowledgement (k-ack)back to KD. Note that this k- ack need not be encrypted because of the implicit restriction that only one master can enter key acquisition phase with a particular field level device, at a time. In case multiple masters issue key proposals,the requests are queued up by KD and forwarded to F one by one. The k-ack need not include the identifier of the master to whom it corresponds, thus saving on encryption /decryption processing times. It however, includes a digest of the key, so that spoofed acks can be counteracted. In the final phase,kd redirects this received k-ack back to master M. Once again, there is the similar restriction that prevents a particular master from making key proposal for more than one Field device. Although these restrictions appear to be stringent, they serve to improve performance by reducing the need for transmitting encrypted acknowledgements during key exchange. The key exchange protocol is seen below. Between Master Device(M), Key Distributor (KD) and Field Device (FD) M KD : Ekm,kd(IDM ID F km,fd TS1) KD : Verify the key If key is acceptable KD FD : Ekfd,kd(IDM km,fd TS2 TS1) FD stores the key in its DB

96 FD KD : k-ack (Note: Only one Master Device can KD M : k-ack (Note: Any Master can acquire key to one field device at a time) M stores the key in its DB Legend : ID-Address Identifier, TS Timestamp kx : Key x, Ekx,y: Encrypted with Key shared by x and y, k-ack : Key Ack The Protocol Key Acquisition and Communication has been developed if key is not acceptable. KD M : n-ack i). Communication between Master Device (M) and Field Device (FD) is done as under: FD M : Ekm,fd(reply TS) M FD : Ekm,fd(msg TS) (Only for ymmetric Encryption) ii). Timestamps guard against replay attacks Legend : n-ack : Negative ack Once Key exchange is completed, both parties can directly exchange encrypted information over the network. It is advisable to include timestamps in each message before encryption so that replay attacks are not possible. I n addition to timestamps, The messages should be appended with a hash (or CRC) prior to encryption. This will ensure that no attacker is able to transmit well furnished junk packets in an attempt to confuse the communicating parties. a field device Data scanners which send large amounts enter of Key acquisit data from the process could also use such DSP chips to support encrypted data transfer over the Field bus. REFERENCES 1. Date Encryption standard (DES) Implementation on the DES320C6006, Internet Whitepaper 2. Clauio Ghiotto and Paolo and Paolo Marchetto, Simple Field Bur Protocol Softmedia 2003, HEXEL, Electronic Lab. 3. P.Swaminathan and R.Pradeep, Network Communication Security in Field bus Protocol for secure Process control, Proc. Of the ACHEMA 06 Conference, Germany, 2006. 4. P.Swaminathan and R.Pradeep,The Secure Field Bus (SecFB) Protocol -Network Communication Security for secure Industrial Process control, IEEE Conference, Honkong, 2006. (1-4244-0549-1/ 2006 IEEE). 4.3 Filed Level Security At the field level, the individual field devices are equipped with the TMSC50 and C240 to run the DES cipher. In case of a multi master configuration, with more than one PLC connected to a bus, the same protocol can be operated with each node acting as the local key Distributor for itself V. CONCLUSION The TMS C 240 is present embedded in many of the state of art field devices such as motorized control valves and sensors. Hence, it is easier to implement the SecFB protocol without the need for additional hardware. It was tested with the Simple Field Bus Protocol (SFBP)[2] stack as the underlying platform. The DES algorithm was implemented on the TMS family of DSP processors This chip(240) is already in use for motorized control valves, as