| Literature DB >> 31569636 |
Alexandra Tidrea1, Adrian Korodi2, Ioan Silea3.
Abstract
The increased number of cyber threats against the Supervisory Control and Data Acquisition (SCADA) and automation systems in the Industrial-Internet-of-Things (IIoT) and Industry 4.0 era has raised concerns in respect to the importance of securing critical infrastructures and manufacturing plants. The evolution towards interconnection and interoperability has expanded the vulnerabilities of these systems, especially in the context of the widely spread legacy standard protocols, by exposing the data to the outside network. After gaining access to the system data by launching a variety of attacks, an intruder can cause severe damage to the industrial process in place. Hence, this paper attempts to respond to the security issue caused by legacy structures using insecure communication protocols (e.g., Modbus TCP, DNP3, S7), presenting a different perspective focused on the capabilities of a trusted platform module (TPM). Furthermore, the intent is to assure the authenticity of the data transmitted between two entities on the same (horizontal interoperation) or different (vertical interoperation) hierarchical levels communicating through Modbus TCP protocol based on functionalities obtained by integrating trusted platform modules. From the experimental results perspective, the paper aims to show the advantages of integrating TPMs in automation/SCADA systems in terms of security. Two methods are proposed in order to assure the authenticity of the messages which are transmitted, respectively the study presents the measurements related to the increased time latency introduced due to the proposed concept.Entities:
Keywords: ECDSA; HMAC; Modbus TCP; SCADA; TPM; automation systems; cryptography; industrial internet of things; security
Year: 2019 PMID: 31569636 PMCID: PMC6806326 DOI: 10.3390/s19194191
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1MITM (Man-In-The-Middle) physical setup and results of the attack. (a) Real setup for deploying the attack. (b) MITM resulted in Modbus TCP request message altering.
Figure 2System architecture abstract view.
Figure 3Experimental setup with two Raspberry Pi boards and two Infineon TPM2.0 modules.
Figure 4Software application modules.
Measurements of the executed trusted platform module (TPM) functions for primary key generation.
| TPM Function | Duration (s) |
|---|---|
| TPM2_GetKeyTemplate_RSA_EK | 0.000007 |
| TPM2_CreatePrimaryKey | 0.040547 |
Measurements of the executed TPM functions done in a secure environment by a third party.
| TPM Function | Duration (s) | Applicable to Proposed Method |
|---|---|---|
| TPM2_CreateAndLoadRSAKey | 0.096907 | HMAC-SHA256 |
| TPM2_LoadExternal (RsaPublicKey) | 0.002226 | HMAC-SHA256 |
| TPM2_RsaEncrypt | 0.008255 | HMAC-SHA256 |
| TPM2_CreateAndLoadEccKey | 0.122234 | ECDSA ECC-256 |
| TPM2_LoadExternal (EccPublicKey) | 0.005993 | ECDSA ECC-256 |
Measurements of the executed TPM functions related to the authentication messages based on keyed-hash functions (HMAC) based proposed concept.
| TPM Function | Duration (s) |
|---|---|
| TPM2_RsaDecrypt | 0.159672 |
| TPM2_LoadHashedKey | 0.068886 |
| TPM2_HmacStart | 0.006950 |
| TPM2_HmacUpdate | 0.002146 |
| TPM2_HmacFinish | 0.008667 |
Measurements of the executed TPM functions related to the ECDSA based proposed concept.
| TPM Function | Duration (s) |
|---|---|
| TPM2_LoadEccPublicKey | 0.005892 |
| TPM2_Sign | 0.068411 |
| TPM2_VerifySignature | 0.103083 |
Analysis of the security strength and additional size for message m.
| Proposed Method | Key Size (bit) | Key Strength (bit) | Output Size (bit) |
|---|---|---|---|
| HMAC-SHA256 | 256 | 256 | 256 |
| ECDSA ECC-256 | 256 | 128 | 512 |
Figure 5HMAC-SHA256 and ECDSA ECC-256 additional size introduced for the Modbus TCP message.
Figure 6Modbus TCP message structure based on HMAC-SHA256 proposed concept.