Reader small image

You're reading from  Practical Industrial Internet of Things Security

Product typeBook
Published inJul 2018
PublisherPackt
ISBN-139781788832687
Edition1st Edition
Right arrow
Author (1)
Sravani Bhattacharjee
Sravani Bhattacharjee
author image
Sravani Bhattacharjee

Sravani Bhattacharjee was a technology leader at Cisco untill 2014, where she led the architectural planning and security evaluations of several enterprise cloud/datacenter solutions. She is currently the Principal of Irecamedia, where she collaborates with Industrial IoT innovators (incl. IBM, AT&T, Microsoft, and Intel) to strategize and create compelling whitepapers and a wide variety of editorial and technical marketing content that drives awareness and business decisions. She is a member of the IEEE IoT chapter, a writer, and a speaker. She is the Managing Editor of “The IoT Review”, a podcast and blogging platform on Industrial and Enterprise IoT (iot.irecamedia.com).
Read more about Sravani Bhattacharjee

Right arrow

Chapter 5. Securing Connectivity and Communications

"Once a new technology rolls over you, if you are not part of the steamroller, you are part of the road."                                                                                                         – Stewart Brand

Secured connectivity underpins the success of the industrial internet. The internet and cloud connectivity have already enabled many industrial enterprises to streamline operations and profitability. In addition to cloud connectivity, IIoT use cases such as smart cities and connected cars also require horizontal interconnectivity and interoperability across vertical technologies and systems.

However, interconnectivity exposes industrial systems to newer threats and attack surfaces. For example, the adoption of cloud-connected ICS systems, SCADA-as-a-service, and so on has been accompanied by a steady rise in security incidents. Attacks targeting industrial control systems were reported to have increased by 110 percent...

Definitions – networking, communications, and connectivity


The terms networking, communications, and connectivity are often used interchangeably, although these terms do have context-specific differences. For the sake of clarity, in this section, we shall define these terms and adhere to those definitions for the remainder of this book.

To arrive at the definitions, let's take recourse to the three prevalent standard-based information technology stack models:

  • Seven-layer OSI model (ISO/IEC 7498)
  • Four-layer TCP/IP stack
  • IIoT connectivity stack model (IIC-IICF)

Figure 5.1 shows the relative mapping of the various layers in each of the stack models:

Figure 5.1: Relative mapping of the communication stack models 

As shown in Figure 5.1, the Network section of the stack deals with the infrastructure, technologies, and protocols for routing and forwarding packets between any two devices. The Connectivity section involves infrastructure, technologies, and protocols that encompass the entire stack, including...

Distinguishing features of IIoT connectivity


The industrial internet and Industrie 4.0 are driving the transformation of industrial assets into cyber-physical entities. The erstwhile air-gapped devices and operational domains are now being connected to business application systems over IP-based network infrastructure (Figure 5.3):

Figure 5.3: Transition of industrial systems from unconnected to converged IT/OT model 

Ubiquitous connectivity introduces new operational dynamics in OT environments. To adequately protect OT connectivity, we need to consider its key distinguishing aspects, as discussed in this section.

Deterministic behavior

Traditionally, in industrial systems, field devices such as sensors communicate with control and actuation devices such as PLCs in highly deterministic modes. Consider the example of an oil and gas plant where the field sensors send out data in deterministic timeframes. The control devices receive, process, and analyze this data to send out control and actuation...

IIoT connectivity architectures


In the industrial world, 100 percent greenfield IIoT use cases are a rarity. As industries embrace digital innovations, they must factor in the unique characteristics of their existing connectivity frameworks, as discussed in the previous section. Due to the convergence of legacy OT infrastructure with IT connectivity frameworks, the cybersecurity envelope must extend to the industrial edge, factory floors, and remote field sites.

Security, however, incurs a cost. Plant downtime has massive cost implications, which plant managers want to avoid under any circumstances. Before introducing secured connectivity to a production environment, the threat landscape for the specific use case needs to be properly assessed, as does how these security technologies would interplay with that operational environment. An architectural understanding of secured industrial connectivity is also a precursor to implementing the appropriate security controls.

To design a secured network...

Controls for IIoT connectivity protection


Whether it is the factory floor, an autonomous vehicle on the road, a connected surgery room, or a smart energy grid powering up a city, ubiquitous connectivity has exposed these industrial applications to unprecedented cyber threats. We are architecting a connected world where the network itself has been "weaponized." The increasing use of open standards in OT infrastructure, cloud connectivity, and multi-vendor-based highly complex solutions has seized the protection of using "little-known" protocols and technologies in industrial networks. Wireless technologies are providing a fast track to connectivity, but are also easier avenues (compared to wireline) for interception, code injection, and other forms of "man-in-the-middle" attacks (WSN).

Insider attacks and human errors can also cause havoc. The Stuxnet virus, for example, could slip through automated process control system (APCS) firewalls by taking stealthy routes such as USB drives, CDs,...

Security assessment of IIoT connectivity standards and protocols


As mentioned earlier, for industrial systems, automation and connectivity technologies have evolved mainly to cater to the needs of specific industry verticals. Network security controls were omitted from design for reasons already discussed. Legacy industrial networks using domain-specific proprietary protocols continue to be part of brownfield IIoT deployments. For inter-domain connectivity, such as between field sensors with cloud-based applications, or even for connecting multiple verticals such as a smart grid interfacing with a manufacturing facility, it is important to understand the security dimensions of both legacy protocols and also the interconnecting standard protocols.

Figure 5.9 shows a mapping of some of the connectivity protocols and standards to the IIoT connectivity stack model (IIC-IICF). Each layer of this technology stack needs layer-specific security controls. Enabling exhaustive security controls at every...

Fieldbus protocols


The term fieldbus was coined to refer to a family of industrial computer network protocols used for real-time distributed control.

The ecosystem of fieldbus-based protocols is going to remain in deployment for the foreseeable future. Industrial internet platforms and applications have to directly or indirectly interact with fieldbus protocols to acquire data or to communicate actuation signals. In an IIoT context, the security of these protocols becomes all the more important.

Most of the fieldbus protocols facilitate data exchange between field devices, PLCs, and so on. Some common characteristics of fieldbus technologies are as follows:

  • Information security mechanisms are typically not built into fieldbus protocols. They are designed for highly controlled, air-gapped operational domains.
  • These protocols are not supported by open standard communities.
  • Originally developed by a given industrial connectivity vendor, the protocols were adopted in an ecosystem serving vertical...

Connectivity framework standards


IIoT connectivity framework standards facilitate logical data exchange services among participating devices in real time. Connectivity framework standards need to support secure data exchange with low latency and jitter, hardware and transport layer agnostic performance, efficient device discovery and authentication, and interoperability with legacy fieldbus and other open standards.

Two predominant data exchange patterns in IIoT data communication are publish-subscribe and request-response. In publish-subscribe mode, an application publishes data on well-known topics, independent of its consumers or subscribers, while applications that subscribe to the well-known topic are agnostic of publishers. This provides loose coupling between participating endpoints, where an endpoint may operate as a publisher, a subscriber, or both. In the request-response data exchange pattern (also known as the client-server pattern), requestors (clients) initiate a service request...

Connectivity transport standards


The high scalability and low CPU power requirements of IIoT field devices have encouraged the adoption of messaging protocols such as MQTT and CoAP for resource-constrained devices. These transports run on top of TCP or UDP and use TLS/DTLS for security. In this section, a brief description of the transports and their security assessment is presented.

Transmission Control Protocol (TCP)

TCP is an open standard maintained by IETF (IETF-TCP) and integral to the internet or TCP/IP protocol stack. TCP provides connection-oriented transport and has been widely used in HTTP-based applications such as e-commerce. In TCP, messages are delivered in order, and it supports retransmission of messages lost in transit, and as such requires considerable time and resources. As a result, message latencies may vary greatly when using TCP.

TCP security

The TLS protocol is usually used to protect transport layer traffic. TLS is an open standard version of SSL version 3 (RFC-TLS...

Connectivity network standards


The IIoT connectivity stack model (IIC-IICF) has Internet Protocol as the only protocol standard in the network layer for industrial internet and Industrie 4.0 applications. For multicast communications, Internet Group Management Protocol (IGMP) is used at the network layer. To secure the network, IPSec is a suite of open security standards defined and maintained by the IETF (RFC 4301).

To provide IP connectivity to low-footprint, resource-constrained devices, the IETF has defined the 6LoWPAN standard (RFC 6282). The standard includes encapsulation and header compression mechanisms that allow IPv6 packets to be sent and received over low-rate wireless personal area networks (LR-WPANs).

Summary


The industrial internet involves ubiquitous connectivity. Connectivity undoubtedly exposes industrial environments to threats, which may result in serious safety and reliability consequences.

Denying connectivity in the digital era is not an option for enterprises. Industries should instead focus on how to secure their internet-connected infrastructure.

This chapter addresses this question by helping the reader develop deeper insights into building secured IIoT connectivity infrastructure. By analyzing the distinguishing aspects of industrial connectivity frameworks and specifications, this chapter explains how existing industrial deployments can evolve and adopt the secured IIoT connectivity architecture. Multiple security controls and technologies to implement the defense-in-depth strategy for IIoT connectivity were discussed.

 

 

A comprehensive understanding of the standards, protocols, and their associated security postures is presented in this chapter to provide the reader with...

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Practical Industrial Internet of Things Security
Published in: Jul 2018Publisher: PacktISBN-13: 9781788832687
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Sravani Bhattacharjee

Sravani Bhattacharjee was a technology leader at Cisco untill 2014, where she led the architectural planning and security evaluations of several enterprise cloud/datacenter solutions. She is currently the Principal of Irecamedia, where she collaborates with Industrial IoT innovators (incl. IBM, AT&T, Microsoft, and Intel) to strategize and create compelling whitepapers and a wide variety of editorial and technical marketing content that drives awareness and business decisions. She is a member of the IEEE IoT chapter, a writer, and a speaker. She is the Managing Editor of “The IoT Review”, a podcast and blogging platform on Industrial and Enterprise IoT (iot.irecamedia.com).
Read more about Sravani Bhattacharjee