PKI Deployment Challenges and Recommendations for ICS Networks

PKI Deployment Challenges and Recommendations for ICS Networks

Nandan Rao, Shubhra Srivastava, Sreekanth K.S.
Copyright: © 2017 |Pages: 11
DOI: 10.4018/IJISP.2017040104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Different types of Control Systems used for Industrial production are broadly called Industrial Control Systems (ICS) (n.d.). These include Supervisory Control and Data Acquisition (SCADA) Systems and Distributed Control Systems (DCS). ICS typically perform the “Command and Control” operations required for smooth functioning of machines in industrial production. They are widely used in Critical infrastructures such as power generation and distribution systems, Oil and Gas plants, Chemical factories and various other manufacturing facilities. Traditionally, ICS used proprietary protocols and operated in isolation. Perimeter security was considered enough as the only means to compromise these systems was via physical access to the systems. However, increased standardization, open architecture adoption and connectivity to enterprise networks as well as internet opened up these systems for a wide range of audience and enabled remote attacks. In this new operation landscape, it is imperative that newer means of securing the networks are adopted continuously. One of the security considerations for the ICS networks is the communication paths used by these networks. Public Key Infrastructure (PKI) (n.d.) plays a key role in securing the communication of ICS networks. Using Digital Certificates, PKI provides a mechanism to verify the identity of all the entities on a network and also ensures that the information is shared securely between communicating entities. PKI is a proven mechanism for secure communication and is widely used in many organizations. However, PKI as a solution to ICS security is challenging due to factors such as resource constrained environments, bandwidth considerations and hard real-time communication requirements. This paper intends to focus on key challenges in Digital Certificate management and correct deployment of PKI in ICS networks and will also present recommendations to overcome these challenges without compromising the basic functionalities of ICS.
Article Preview
Top

2. Role Of Pki In Securing Communication For Ics Networks

In industries like electricity, water and oil where ICS are typically used, information is continuously exchanged between remote stations and control systems (see Figure 1). Critical system parameters are part of the information exchange and any external entity gaining access to this information can potentially jeopardize the operation of the ICS thereby causing loss of business or even loss of human life.

Figure 1.

Communication in ICS networks

IJISP.2017040104.f01

In this scenario, usage of PKI system lays the foundation for ensuring the integrity and confidentiality of data exchanged, by enabling the usage of encryption techniques, through public key cryptography. Further, PKI also ensures that the data exchange happens only between authenticated entities. For example, remote stations will be able to ensure that the information is sent only to the intended control system and the control system can ensure that the information it receives is from an authenticated remote station (see Figure 2).

Figure 2.

PKI used to secure communication in ICS networks

IJISP.2017040104.f02

2.1. PKI Setup and Enrollment Process

  • Pre-Requisite: There are two possibilities related to PKI setup in an ICS network:

    • 1.

      ICS network operator already has a PKI setup and a Certification Authority (CA) server;

    • 2.

      A complete PKI setup is required as part of commissioning.

The ICS network operator owns the complete PKI setup.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing