Security for industrial communications systems

被引:226
作者
Dzung, D [1 ]
Naedele, M [1 ]
Von Hoff, TP [1 ]
Crevatin, MC [1 ]
机构
[1] Asea Brown Boveri Corp Res, CH-5405 Baden, Switzerland
关键词
cryptography; embedded systems; industrial automation; industrial communication systems; remote access; security objectives; security protocols; security standards;
D O I
10.1109/JPROC.2005.849714
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Modern industrial. communication networks are increasingly based on open protocols and platforms that are also used in the office IT and Internet environment. This reuse facilitates development and deployment of highly connected systems, but also makes the communication system vulnerable to electronic attacks. This paper gives an overview of IT security issues in industrial automation systems which are based on open communication systems. First, security objectives, electronic attack methods, and the available countermeasures for general IT systems are described. General security objectives and best practices are listed. Particularly for the TCP/IP protocol suite, a wide range of cryptography-based secure communication protocols is available. The paper describes their principles and scope of application. Next, we focus on industrial communication systems, which have a number of security-relevant characteristics distinct from the office IT systems. Confidentiality of transmitted data may not be required; however, data and user authentication, as well as access control are crucial for the mission critical and safety critical. operation of the automation system. As a result, modern industrial automation systems, if they include security measures at all, emphasize various forms of access control. The paper describes the status of relevant specifications and implementations for a number of standardized automation protocols. Finally, we illustrate the application of security concepts and tools by brief case studies describing security issues in the configuration and operation of substations, plants, or for remote access.
引用
收藏
页码:1152 / 1177
页数:26
相关论文
共 123 条
[1]  
Allen C., 1999, RFC, DOI [DOI 10.17487/RFC2246, 10.17487/RFC2246]
[2]  
*AM GAS ASS, 2004, 12 AGA
[3]  
Anderson R., 2001, SECURITY ENG
[4]  
[Anonymous], 3715 RFC
[5]  
[Anonymous], 2001, HACKER JAILED REVENG
[6]  
[Anonymous], 1992, RC4 ENCRYPTION ALGOR
[7]  
[Anonymous], 2402 RFC
[8]  
[Anonymous], 2004, Cryptol ePrint Arch
[9]  
[Anonymous], 2003, ARTECH H COMP SEC LI
[10]  
[Anonymous], 2001, 197 FIPS PUB