1 / 33

Trustworthy Wireless (Joint ISA100/ISA99)

Trustworthy Wireless (Joint ISA100/ISA99). Wayne W. Manges; Oak Ridge National Laboratory Scott Mix; North American Electric Reliability Corporation. 1. Early Adopters Lead the Way!. Wireless Vibration Sensor. 2 #. No Inherent Flaw – Can Wireless Be As Trustworthy As Wire?.

mills
Download Presentation

Trustworthy Wireless (Joint ISA100/ISA99)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trustworthy Wireless(Joint ISA100/ISA99) Wayne W. Manges; Oak Ridge National Laboratory Scott Mix; North American Electric Reliability Corporation 1

  2. Early Adopters Lead the Way! Wireless Vibration Sensor 2#

  3. No Inherent Flaw – Can Wireless Be As Trustworthy As Wire? • Marketing – sell what I have, bandwidth is king • Emotion – “Wireless scares me, I can’t control it!” • Incompetence/Laziness – Too difficult to configure, too big a learning curve • Cost/Benefit/Risk – ROI in a day, why bother? • Are we expecting to much – does wireless need to be more trustworthy than wireline really is?

  4. Trustworthiness – More Than a Feeling • Quantifiable – When is a system trustworthy enough? How can I make it more trustworthy? What will it cost to achieve a required level of trustworthiness? • Predictable – design trustworthiness into the system before it’s installed • Verifiable – how can I be sure? • Real-time – Can an installed system become less trustworthy in operation? • Sustainable – Can an installed system keep from becoming less trustworthy over time? • Forensics – can I learn from experience?

  5. Industrial Network Topology Standards and Practices • Plant Data Network • SP95 Enterprise Control Systems Integration • ISA99 Control Systems Security • OPC Foundation • Control and I/O Networks • Foundation Fieldbus ext. • Open Automation & Control Group (OAGC) • ISA100 • Device and sensor Networks • IEEE 1451 • DeviceNet • HART (WiHART) • ISA100 • Operator Interface Networks • SP65 Industrial Process Measurement and Control • SP50 Foundation Fieldbus

  6. “Can You Hear Me Now?” – May Not Be Good Enough? IEEE 802.15.4 ISA100.11a WiHART

  7. ISA100 efforts will result in standards, recommendations, and technical reports focused on assuring successful wireless deployments in industrial environments ISA100 Compliance will assure: Supplier specifications are consistent and easy to interpret User requirements are succinct, relevant and easy to interpret Options are clear and easily differentiable Probable outcomes are quantitatively evaluated against options Standards – Results Focus 7#

  8. Bound and Scope for TWIG ISA100

  9. Bound and Scope for TWIG ISA100 ISA99

  10. Bound and Scope for TWIG ISA100 ISA99 .11a

  11. Bound and Scope for TWIG ISA100 ISA99 .11a STG

  12. Bound and Scope for TWIG ISA100 ISA99 PTG .11a STG

  13. Bound and Scope for TWIG ISA100 ISA99 PTG .11a STG TWIG

  14. Florida Meeting • Joint with ISA99 • Discuss relationship of TWIG to other activities • Agree to bounds and scope of TWIG • Document agreements

  15. Nice meeting • Elevation to WG • Mission • Scope • Schedule • Deliverables Interest Group Study Group Birds of a feather Working Group Define deliverables, schedule, Generate work products

  16. Mission Proposed Mission: The ISA100 Trustworthy Wireless Work Group will develop and maintain policies defining the responsibilities of ISA100 standards developers to address the issues of trustworthiness (which includes security) with respect to other standards, other wireless and wired devices anticipated in the industrial work space, and other standards under development. It will also, when required, offer assessments to the ISA100 committee regarding the degree to which ISA100 standards developers have conformed to those conventions. This WG may also develop security documentation of interest to the technical community outside ISA100. TWIG Cleveland – 5/22/08

  17. Trustworthiness in Wireless Industrial AutomationOutline • Forward • The ISA100 Series • Relationship of the ISA100 standards to TWIG • Relationship of TWIG to ISA99 • Introduction • Scope • References • Lexicon Telecon April 2008

  18. Outline • Industrial Wireless Standards • ISA100 draft • Industrial Wireless • Policy • Signal Characteristics • Strength • Attenuation • Power Consumption • Bandwidth • Modulation Techniques (needs additional work …) • DSSS • CDMA • Microwave, Celluar, Packet Radio, etc. • Emerging Technologies • WiFi versus WiMax • Others?

  19. Outline • Industrial Wireless versus Traditional Wireless Networks • Conduit • Service Access Points (SAP) • Gateways • Terminal servers • Serial points of access • Wireless Access Points • Frequency Ranges

  20. Outline • Industrial Wireless in Comparison to Wired Control Networks • Stability • Deterministic versus non-deterministic • Latency • Hard Real-time (DCS) • Deterministic • Soft Real-time (SCADA) • Deterministic with thresholds • Best Effort (non-deterministic) • Discovery and Recovery Periods • Security • Authentication, Encryption and Integrity Impact algorithms with respect to latency for wireless network implementations • IEEE 802.11i • WPA, WPA2 • Zoning • Attack Prevention • DoS via RF Scrambling/Interference • Protocol Ramifications • Ethernet/IP, Modbus/TCP, Profinet, CompoNet, ControlNet, OPC, etc.

  21. Outline • Metrics of Trustworthiness • Trust Levels • Security Levels (from ISA99) • Consequences of failure for both expected and unexpected modes of activity • “Characteristics” of trustworthiness • Classes • Wireless applications only • Monitoring (5) • Logging (4) • Supervisory (open-loop) control (3) • Closed-loop control (2) • Alert (1) • Safety (0) • Appendix • Table of Figures • Table of Tables • Acronym List • Use Cases

  22. Terms: Trustworthiness Reliability Security Confidentiality Integrity Availability Authentication Access Control Fragility Non-repudiation Failure Terms: Scale Industrial Automation Industrial Automation Encryption Compression Network Resilience Survivability Interference Lexicon

  23. Error Curves 1.0 1.0 Probability of False Positive Probability of False Negative 0.0 0.0 Low Resource:Money / Technology High

  24. Error Curves 1.0 1.0 Probability of False Positive Probability of False Negative 0.0 0.0 Low Resource:Money / Technology High

  25. Error Curves 1.0 1.0 Probability of False Positive Probability of False Negative 0.0 0.0 Low Resource:Money / Technology High

  26. Error Curves 1.0 1.0 Probability of False Positive Probability of False Negative Sweet Spot 0.0 0.0 Low Resource:Money / Complexity High

  27. Error Curves 1.0 1.0 Curve Shapes are defined by current technology Probability of False Positive Probability of False Negative Sweet Spot 0.0 0.0 Low Resource:Money / Complexity High

  28. Error Curves 1.0 1.0 Curve Shapes are defined by current technology: Change curve shapes by changing technology Probability of False Positive Probability of False Negative Sweet Spot 0.0 0.0 Low Resource:Money / Complexity High

  29. Wireless Wins – Just Make It Work!

  30. PHY Layer Security – The Holy Grail? • No Bits – must be present to win! • LPI/LPD – low probability of intercept/detect • Stealthy – buried in the noise • Demonstrated – labs and DoD • Low Transmitted Power – easier on surrounding stuff • Denial Of Service Attacks – only at RF level On the other hand: • Requires High Process Gain – around 60 db (1000 chips/bit) vs 12 db (15 chips/bit) today • Export Control Issues – considered too stealthy • Highly Complex – no currently available commercial products • Key Management – always an issue

  31. Where Are We Headed? • Deliverable – key document for use by wireless industrial network community • “Trustworthiness in Wireless Industrial Automation” • Lexicon – definitions • Metrics – measures of success • Use Cases – bound the problem • Participation – sign up!!! • Interface – ISA99, ISA100 Current members include participants from: Honeywell, Emerson, NIST, DOE (ORNL, PNL, INL, ANL), DHS, Shell, Control Chief, NERC, Certicom, and several private consultants IAEA – An interested party!

  32. Could Wireless Provide the Business Case for Cyber?! • Automobiles • EPA provided the impetus for first microprocessors in autos • Now 38 per vehicle! • Internet • Home computing was just a hobby until the first browsers. • Now “Google” is a verb! • Wireless Is Enabler • Enterprise visibility • Mobility • Agility Two Fuses In Entire Vehicle!

  33. Who Will Lead, Who Will Follow, Who Will Whine? • Technology is ready - driven by cellular personal / business / DOD communications • Market is ready – over $2000/ft for wires in some plants • Are we ready? – partnerships, consortia, standards and collaborations – 400 members strong “CBM Is the Next Killer App For Wireless” – Dr. Jay Lee, Fortune Magazine, July 2002 33#

More Related