Global Sources
EE Times-India
Stay in touch with EE Times India
 
EE Times-India > Embedded
 
 
Embedded  

Value of security ICs in industrial control system

Posted: 29 Nov 2012     Print Version  Bookmark and Share

Keywords:industrial control systems  Stuxnet  cryptography 

Just as when industrial networks do not follow documented and well-known protocols, so too the proprietary architecture of PLCs does not normally offer security protection either. The Stuxnet is unfortunately a very good demonstration of this. Admittedly, Stuxnet did only harm proprietary software and PLCs with a specific configuration. This malware could not have been designed without an understanding of the intimacy of the specific systems it was targeting. "System security should not depend on the secrecy of the implementation or its components."2 Indeed, that approach makes the hardware, the PLC in this context, too vulnerable. So, again this cannot be stated too often: one cannot rely on the custom architecture of ICSs to act as a protection against electronic threats.

While ICSs have a different architecture from the typical IT infrastructure and fulfil different requirements, nonetheless, most of the threats to generic IT infrastructures can also affect ICSs. Unfortunately, the list of those threats is long and troubling: malware injection such as worms or viruses; software or hardware configuration changes; fake messages or orders from an attacker; identity theft; and unauthorised observation.

In summary, we are in an extremely challenging situation. ICS security threats are similar to the ones harassing IT infrastructure, but all too often the specific requirements for ICS operation do not allow reuse of well-known security countermeasures!

Figure 1: The hierarchy of security countermeasures.

Highest level of countermeasures inside ICS
With security a pervasive concern for industrial and automation applications, countermeasures and mitigation actions are being implemented. Until now, most of these defensive measures have included security procedures, environment physical protection, and staff education. The ICS itself remains vulnerable. Before we leap to criticise the industrial community for these minimal precautions, we should recall that this is how security started in the traditional IT domain. This is really the first level of protection, a foundation that must be the start.

These traditional defensive tactics do not, in any way, provide the ultimate level of protection needed for an ICS. Procedures, even if audited on a regular basis, are never 100% followed; physical protection like locking doors can be bypassed and cannot be applied everywhere. Most important, defensive manual procedures do not cover attacks performed by highly skilled people with the time and budget to elaborate the most sophisticated scenarios. Even worse, there are examples where bribery led ICS operators to bypass procedures.

The security answer is embedded. It is in the ICS hardware. The upper-level hierarchy of security countermeasures involves generic IT security countermeasures such as cryptography and hardware security (figure 1).

Generic IT security solutions are sometimes already there in the software. Some infrastructures are already protected by firewalls; some secure protocols over IP such as TLS/SSL are also implemented. While again, all stages of the pyramid are necessary, we are now going to describe how hardware-based security brings the ultimate level of protection.

Protect ICS with embedded cryptography
Generic IT policies cannot be systematically applied to the broad range of ICSs at work in industry. However, there is one technology used universally in the IT world that can be implemented: cryptography.

Cryptography answers most of the threats listed above. Still, it is not a magic wand and the approach cannot be as simple as, "I'll add crypto to my ICS and all of sudden it becomes secure." Crypto algorithms and protocols are building blocks that should be implemented on a case-by-case basis after a thorough analysis of the threats to each sub-system. Restated simply, cryptography is a tool common to ICSs and IT infrastructure, but its implementation in an ICS must be tailored to the specific system. Within the broad range of cryptographic techniques, two are very important for an ICS: digital signature and encryption. We shall examine the merits of both processes for an ICS.

Figure 2: A digital signature is applied to a sensor reading.


 First Page Previous Page 1 • 2 • 3 • 4 Next Page Last Page



Comment on "Value of security ICs in industrial ..."
Comments:  
*  You can enter [0] more charecters.
*Verify code:
 
 
Webinars

Seminars

Visit Asia Webinars to learn about the latest in technology and get practical design tips.

 

Go to top             Connect on Facebook      Follow us on Twitter      Follow us on Orkut

 
Back to Top