160 likes | 294 Views
Critical Infrastructure Protection Cristina Alcaraz. Department of Computer Science University of Málaga Málaga (Spain). What do we have around us ?. What do we have around us ?. What do we have around us ?. What do we have around us ?. What do we have around us ?.
E N D
Critical Infrastructure Protection Cristina Alcaraz Department of Computer Science University of Málaga Málaga (Spain)
What do we have around us ? We need protection andcontrol mechanismson failures and threats
Through SCADA Systems and Sensor Networks • Same control services as a wired infrastructures but with low installation and maintenance costs • Same functionalities as an RTU – new alternative for the control • Autonomous, smart and independent systems New industrial perspectives and new communication standards, such as: ZigBee PRO, WirelessHART, and ISA100.11.a
SCADA Systems and Sensor Networks ZigBee PRO WirelessHART ISA 100.11a They have been specified to ensure energy saving, coexistence with other communication systems, communication reliability and security IEEE 802.15.4-2006 2,4GHz a 250kbps/868-915MHz a 20kbps, 15 canales de transmisión, AES-128bits + MAC/MIC, ACL Services: security at link level and transport level, 6LowPAN+ WHARTSecurity: GK, JK, MK, LK, SKm + MIC Application: Industrial Services: TDMA/CSMA, frequencyhopping, blacklisting, redundantpaths, diagnostic,…Security: KPub, KJoin, KN, KS + MIC (CCM*, AES-128bits + Cpub/Cred + nounce) Application: Industrial Services: Stochasticaddressing, routeaggregation, sourcerouting, frequencyagilitySecurity: MK, LK, NK + SKKEApplication: Commercial & industrial
But, is the communication really secure and reliable for monitoring CIs?
Security Analysis Routing over low power and lossy (ROLL) networks – Tsao et al.
Security Analysis Most attacks are launched by malicious authorized insiderswho know the inherent vulnerabilities of the system
Security Analysis Most attacks are launched by malicious authorized insiders who know the inherent vulnerabilities of the system It can also be observed that the three standards can receive the same attacks on the confidentiality ZigBee PRO and WirelessHART receive the same attacks networks on the integrity WirelessHART and ISA100.11a are slightly more vulnerable to denial of services attacks
Actual Motivation - Overview Control of Cascade Effect -Early Warning Systems Security inSmart Grids