Vous êtes sur la page 1sur 11

Journal of Industrial Information Integration 5 (2017) 616

Contents lists available at ScienceDirect

Journal of Industrial Information Integration


journal homepage: www.elsevier.com/locate/jii

Information attacks and security in wireless sensor networks of


industrial SCADA systems
Alexey G. Finogeev, Anton A. Finogeev
Penza State University, Penza, Russia

a r t i c l e i n f o a b s t r a c t

Article history: The effectiveness of automated process control systems (APCS) and supervisory control and data acqui-
Received 21 November 2016 sition systems (SCADA) information security depends on the applied protection technologies of transport
Revised 5 February 2017
environment data transmission components. This article investigates the problems of detecting attacks
Accepted 7 February 2017
in wireless sensor networks (WSN) of SCADA systems. As a result of analytical research the authors de-
Available online 9 February 2017
veloped the detailed classication of external attacks and intrusion detection in sensor networks and
Keywords: brought a detailed description of attacking impacts on components of SCADA systems in accordance with
Information security the selected directions of attacks. The cryptographic encryption tasks in the wireless sensor networks
SCADA system have been resolved by means of the built-in mechanism for symmetric AES encryption with 128 bit keys
Wireless sensor network according to the ZigBee Pro Feature Set specication. However, analysis of the current state in the eld of
Network attacks security of wireless sensor networks has shown that the key management problem is almost no solved.
Attacks detection
The article considers the problems and objectives of key management for data encryption in wireless
Intrusion detection system
Key management
sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network
Data encryption and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suit-
Routing protocol able for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to
encrypt the session key transmitted from the routing information. Three algorithms of hybrid key man-
agement using routing information frames determined by routing methods and the WSN topology are
presented.
2017 Elsevier Inc. All rights reserved.

1. Introduction lect data from digital and analog sensors or transmit commands to
devices which in some way alter the status of the managed system.
The SCADA (Supervisory Control And Data Acquisition) system The effectiveness of solving problems of the SCADA systems in-
is developed and implemented for monitoring and analyzing the formation security depends mainly on data transmission protection
parameters of the energy consumption, as well as characteristics technologies applied to transport environment components. SCADA
of the operations to improve energy eciency and reduce fuel con- systems use wired or wireless sensor networks (WSN) as a trans-
sumption and energy losses in the generation, transportation, con- port medium for collecting sensor data and sending commands to
sumption and disposal of energy [1,2]. The main purpose of these actuators [5,6].
systems is automated data collection and data processing on en- Because of the transition from wired to wireless network tech-
ergy consumption objects. Today SCADA is a system for measuring, nologies for the construction of sensor networks for gathering
data collection, monitoring and control of industrial systems [3,4]. telemetry data, the quality of such protection [7] is determined not
The SCADA network consists of one or more MTUs (Master Termi- only by hardware and software solutions for industrial controllers
nal Unit) which are actually computer stations equipped with the and sensor nodes, but also by the chosen principles of their infor-
appropriate software and operating system. These stations are used mation interaction in the process of synthesis of network topology,
by operators to monitor and control one or more RTUs (Remote routing determination and data transfer [8,9].
Terminal Unit). RTU is also a computer device which is typically The protection of corporate information systems from security
designed for the use in industrial environments. Its job is to col- threats is the basis for the implementation of any IT project, in-
cluding SCADA systems. Most such systems are not directly con-
nected to the Internet with a low level of information security, but

Corresponding author.
they are connected to industrial business and information systems
E-mail addresses: alexeynogeev@gmail.com (A.G. Finogeev), fanton3@yandex.ru [10], to the communication maintenance manufacturers and con-
(A.A. Finogeev). sultants, which are connected to external networks [11]. If you use

http://dx.doi.org/10.1016/j.jii.2017.02.002
2452-414X/ 2017 Elsevier Inc. All rights reserved.
A.G. Finogeev, A.A. Finogeev / Journal of Industrial Information Integration 5 (2017) 616 7

physical isolation (air gap) of the critical SCADA system, it will still dance with the denition of security, all attacks in WSN of SCADA
be at risk because of modern management systems need to receive systems can be divided into the following categories [24,25]:
information from the outside world. The introduction of such mea-
sures generates new ways of information security violations, which 1) Access attacks, which include attempts to gain unauthorized
are more dicult to manage. For example, the Stuxnet virus passed access to system resources.
through APCS rewalls using indirect ways, such as USB keys and 2) Attacks on privacy, which represent attempts to intercept
CDs, or via protocols that rewalls were congured to miss. There- the data transfer in the transport environment.
fore, the purpose of the security of SCADA systems is to implement 3) Attacks on integrity, which include the generation and trans-
architecture, which protects the system from external attacks and fer of frames to capture and control over the SCADA system,
increases resistance of the sensor network, communication chan- to call faults and failures in its work or to prepare other at-
nel, separate devices and data frames [12]. tacks.
The current trend of building a transport network for SCADA
systems data acquisition determines the use of wireless self- We consider the classication of attacks in detail by the direc-
organizing networks with features of the equality of nodes, dy- tions of impacts and give a detailed description of the main types
namically changing topology, the possibility of reconguration of (Fig. 2).
the network, self-organization and self-repair after failures, dy-
namic routing, etc. In particular, the ZigBee technology provides 1. Attacks on sensor network of the SCADA system.
a good basis for the construction of reliable wireless sensor net- 1.1. Creating active interference in the work area of the SCADA
works for data collection [13,14]. WSN are gradually replacing the system. To create permanent noises white noise genera-
wired network and are used in industry for control of technological tors are used. They operate on the same frequency as the
equipment, in the housing sector to control the heat energy sup- SCADA system. A source of that noise can be determined us-
ply [15,16], lighting, air-conditioning and ventilation, to food safety ing spectrum analyzers and its possible to stop the attack
and quality control [17], to commercial account of energy and wa- by locating and eliminating its source. The most dangerous
ter consumption [18], in the re security systems, home automa- are natural (lightning) or articial impulse noises, that can
tion systems, medical monitoring systems, etc [19,20]. lead not only to a system failure, but also damage the sen-
This article investigates the problems of detecting attacks in sor nodes and industrial controllers.
wireless sensor networks (WSN) of the SCADA systems. As a re- 1.2. Attacks on human-machine interface (HMI) of the SCADA
sult of analytical studies, the authors have developed the detailed system. Unauthorized access to the web-interface from a
classication of external attacks and intrusion detection in sensor mobile device can be carried out in the case of open wire-
networks and brought a detailed description of attacking impacts less networks or networks with weak authentication.
on components of the SCADA systems in accordance with the se- 1.3. Attacks on WSN addresses spoong aimed at Denial of Ser-
lected directions of attacks. vice (DoS) initiating [26]. We can distinguish two types of
Traditional information security measures (the use of sophisti- such attacks:
cated encryption algorithms, multi-factor authentication, antivirus 1.3.1. The interception of sensor nodes frames with the pur-
programs, rewalls, etc.) are not always applicable due to the lim- pose of spoong MAC source and destination addresses,
ited computational and energy resources of sensor nodes and wire- which leads to the failure or malfunction of the SCADA
less sensor network (WSN) as a whole [21,22]. In addition, manu- system.
facturers of industrial automation and execution devices are devel- 1.3.2. The replacement of central coordinator to change the ad-
oping proprietary protocols, which dont allow implementing secu- dress space of sensor network conguration.
rity technologies using IPSec, SSL, VPN, etc. 2. Attacks on sensor network nodes and related devices.
If the SCADA system is set in a large area, for example, for mon- 2.1 Changing the rmware, drivers and software of industrial
itoring and management of distributed engineering services (heat, controllers (PLC Programmable Logic Controller) and ter-
water, electricity and gas supplies), then the WSN and network minal sensor nodes (RFD Reduced Function Device). The
of mobile operators (GPRS/3 G modem connections) is used as a attack conducted by PLCs and RFDs scanning to identify
transport environment (Fig. 1) with the possibility of public access the opportunities of the preset operating system, rmware,
[23]. This effectively provides a channel for attacks. drivers and controllers changing.
Therefore, to build the effective ways of protecting information 2.2. Injection attacks by spoong or replacement the WSN
in wireless sensor networks it is necessary to analyze the possi- nodes, responsible for collecting and relaying data in the
ble types of attacks, methods of their detection, and reasons of network (FFD Fully Function Device) to intercept and redi-
system vulnerabilities. The article also considers the problems and rect network trac. The main purpose of such attack is to
objectives of key management for data encryption in WSN of the redirect network trac to the injected or replaced node. We
SCADA systems. The structure of the key information in the ZigBee consider the variety of such attack:
network and methods of obtaining the keys are discussed. Three 2.2.1. Compromising the node by replacing routes conrmation
algorithms of hybrid key management, using routing information tickets to redirect trac from the end source-nodes to
frames, determined by routing methods and the WSN topology, are the injected receiver-node. As a result of such replace-
presented. ment, the real coordinator stops collecting data from the
PLCs and sensors, and dispatch service loses control of
2. The attacks classication on WSN of the SCADA system technological processes.
2.2.2. The router (the FFD node) replacement in a sensor net-
The modern trend towards transport environment of SCADA work aimed to violate the correct operation of routing
systems denes the use of self-organizing wireless networks with algorithms. The attack can be carried out by:
peer equality, dynamically changing topology, the possibility of - the creation of a false tunnel (on the injected
network reconguration, self-recovery, dynamic routing, etc. router there runs a program that copies retransmitted
Currently used principles of data transmission in wireless net- frames to transfer them to another sensor network,
works provide the possibility of making the four types of impacts: or, conversely, a program of frame transmitting with
interception, alteration, destruction and code injection. In accor- control commands from another network);
8 A.G. Finogeev, A.A. Finogeev / Journal of Industrial Information Integration 5 (2017) 616

Fig. 1. Example of wireless networks for SCADA system.

- setting lters (on the injected router there runs 3.2.3. Flooding attacks by generating false frames (service or
a program that lters and destructs retransmitted data) and broadcasts:
frames on the specied criteria or content); - cloning and broadcast of data frames are performed
- changing routes (on the injected router there runs a by intercepting and reproducing repeatedly the same
program that changes the contents of Route Record data frames followed by broadcasting in the network
packets by a given algorithm or at random. to achieve input buffers overow and network fail-
2.2.3. The replacement of WSN central coordinator to the orga- ures;
nization of run- up broadcast storm and to achieve ser- - generation and broadcast of polling units frames
vice denial or to power supplies fast discharge. and HELLO-frames to achieve failures of network re-
3. Attacks on sensor network trac. sources; creating and sending a set of HELLO-frames
3.1. Listening of data transmission channels. It is produced by with non-existent addresses of nodes in the network,
network trac intercepting and decoding with special utili- its possible to make an image of non-existent area
ties (sniffers) for the subsequent frames analysis for extract- of the sensor network;
ing the required information. - synthesis of virtual source-nodes to broadcast from
3.2. Attacks with data frames. It is performed by ooding or by them route packets (routing DDoS attack); here the
generating false service or data frames or replacing the weakness of Source-Routing technology is exploited if
contents of captured frames and the subsequent injection its used in centralized SCADA systems with one co-
into the network. We consider the basic options of such at- ordinator and gateway, namely, the excessive network
tacks. load with broadcast routing trac.
3.2.1. The injection of malicious code. It focuses on bringing
malfunction to the executing devices, the entire net-
work or on changing the parameters of technological 3. Information security on WSN of the SCADA systems
processes. The injection of a self-replicating worm into
the network routers leads to infection and transforma- To ensure reliable and secure data transmission wireless trans-
tion of all nodes to the botnet, which nodes generate port network of SCADA systems must be resistant both to interfer-
data frames to increase the network reaction time, pro- ence and to different kinds of inuences that lead to the violation
ducing faults and failures (distributed DoS attack [27]). of its functionality, failures of network nodes and their attached
3.2.2. Frames ltering and selective broadcast. It is produced by devices. To ensure robustness, security professionals must de-
injecting into the network a special type of software or velop procedures for electromagnetic protection of network nodes
hardware lters that intercept data frames, lter them, (shielding, noise ltering and protection from interference, the ex-
and may perform a selective broadcast. The effectiveness pansion of the frequency spectrum, frequency hopping, etc.) that
of the attack increases with its integration with the fun- will eliminate or signicantly increase the reliability of data trans-
nel attack. mission.
A.G. Finogeev, A.A. Finogeev / Journal of Industrial Information Integration 5 (2017) 616 9

Fig. 2. Classication of attacks by impacts directions.

For the protection from other types of impacts experts use There are few general traditional techniques aimed to detect at-
hardware and software methods for multi-layer protective model tacks in transport network media. All of them include the follow-
for the components of the SCADA system and security information ing procedures:
interaction with public wireless data transmission. So as the WSN
sensor nodes have limited computational and energy resources,
- identication and validation of non-standard network trac;
traditional methods of information security of computer networks
- periodic inspection of privileges and authorizations for person-
cannot be used. The task of ensuring the sensor networks security
nel access to specic information resources of the SCADA sys-
is shifted to create secure channels for data transmission, the use
tem;
of modern technologies, authentication [28], verication, encryp-
- disabling of the unused protocols and services;
tion and key management, prevent data leaks from the system,
- disabling of the remote access and control of the network nodes
intrusion detection and attack, the use of dynamic routing algo-
and applications;
rithms, etc.
- periodic scan of network interfaces and drivers;
- timely updating of nodes software from the trusted sources.
10 A.G. Finogeev, A.A. Finogeev / Journal of Industrial Information Integration 5 (2017) 616

There are three ways to detect attacks in networks: - reduction of network bandwidth for no apparent reason,
- a dramatic increase of route search time,
1. Detection by the signatures. The signature denes the charac-
- a sharp increase of server applications reaction time to
teristics (proles) of previously committed attacks. During the
client requests,
scanning a coincidence of signatures is revealed and notica-
- an increase of collisions in data channels,
tion is made. However, this method does not reveal the attack
- an appearance of new network nodes,
with new (unknown) signatures.
- reduction of the data transmission rate,
2. Detection of the anomalous behavior. The attack detection oc-
- overload of the network nodes and the network as a whole,
curs when identifying abnormal behavior of the network node
- overow of nodes buffer memory, denial of service, etc.
or deviations from its normal operation. The disadvantage of
this approach is that incorrect behaving node may be affected On the basis of such monitoring results analysis by responsible
by other factors that are not related to the attacks, such as soft- persons for the information security, the necessary decisions may
ware, hardware or sensor failure. be concluded and appropriate operational and long-term measures
3. Combined detection by the specications. This method com- may be implemented.
bines the two previous ones to reduce their shortcomings.
WIDS (Wireless Intrusion Detection System) is a software and
hardware solution, which consists of software agents that per- 4. Key management for data encryption on WSN of the SCADA
form the function of collecting, processing and analyzing net- systems
work trac packets. Agents interact with the server, trans-
mitting captured packets to it. The server processes the re- Description of the new key information-sharing mechanism dis-
ceived data for detecting attack signatures and anomalous be- cussed in this section. Modern cryptographic data protection is
havior of network nodes, as well as responding to events. Thus, based on the encryption using a symmetric key or an asymmetric
WIDS combines signature and behavioral ways, and relates to private/public key. Special codes are used for authentication of the
the third method. In operation, WIDS performs monitoring and elements of the SCADA system and nodes of the sensor network,
analysis of trac in sensor network. Its functionality includes the hash functions are used to control the integrity of transmitted
the following standard procedures: data.
The cryptographic encryption tasks in wireless sensor networks
1. The analysis of WSN topology. have been resolved and are being implemented by means of the
2. The determination of WSN vulnerabilities. built-in mechanism for symmetric AES encryption with 128 bit
3. The compilation and maintenance of network nodes lists. keys according to the ZigBee Pro Feature Set specication. This
These lists are generated on the basis of network trac anal- method does not require complex computing and energy-intensive
ysis and retrieval of MAC-addresses of the network nodes procedures and works simply by breaking a message into blocks
from the captured frames. In the future the resulting lists of 128-bit length and sequentially encrypting their 128 bit key.
will actually allow detecting the appearance of new "foreign" This algorithm has been tested on the ZigBee modules of virtually
potentially dangerous nodes in the network. all modern manufacturers. In fact, in the rmware of all sensory
4. Detecting and countering attacks in WSN. At the moment, the units have built-in hardware encryption modules that allow you to
number of detected attacks in WSN is far less than the number build a wireless network with a guaranteed level of cryptographic
of detected attacks in wired networks, as it is only limited by strength.
the OSI model data link layer trac analysis. The result of the The ZigBee module rmware default security mode is disabled.
attack detection is the administrators notication on potential If security is enabled, every node must obtain the network key
problems in different ways (via email, SMS messages, etc.) and when connecting to the network from a trusted site, which acts
event logging for auditing. as the network coordinator. Then, the network node is temporarily
5. Locating the source of the attack and its suppression. WIDS can disconnected from the network and then reconnected for the new
use such mechanisms of repression as the implementation of address and the network encryption key.
DoS attacks on the attackers node, blocking the attacking agent As the coordinator acts as the center of trust, it is notied of
by active network equipment. Locating the source of attacks each new node that is trying to connect to the network. A unique
means the detection of the coordinates of the device that vi- key is generated for each sensor node and sent it along with the
olates security policy by the trilateration, multilateration or tri- address information at the stage of a new connection to the net-
angulation technologies. work. The encryption keys are randomly generated in a special key
6. Control of security policy. It is based on the analysis of the net- generation module which is present in the rmware ZigBee coor-
work nodes list in order to detect changes in the policies set by dinator and is activated when the security mode is activated on
the administrator. An audit can detect the appearance of unau- it.
thorized nodes and applications, violations of trac protection Many passwords for access to different devices are used in
policy. SCADA systems and users need to modify them periodically to re-
7. Performing controlled invasion tests through the existing vul- duce the probability of compromise. In any complex information
nerabilities of the SCADA system and its components by specic system, there is a lot of secret information [29], which requires a
exploits. constant work to eliminate or reduce the probability of its com-
8. Monitoring of wireless network capacity and network response promise that leads to the development and implementation of key
time. In the process of monitoring, WIDS can monitor the phys- management systems.
ical and data link layers of the network, and identify problems Security mode must be enabled on all network nodes. Copy of
such as: the key with the designated new node IPv6 address is stored in
- overload of channel, node or network, the coordinator and then used to decrypt the networks packet.
- a sharp increase in the number of data frames received by Any other nodes on the network can not access to the data, as
the coordinator, routers and end nodes, an encryption key known only to the sender (end node) and the
- reduction of radio signals power, recipient (network coordinator).
- a sharp increase in the broadcast service or routing frames, If cryptographic algorithms to protect information are well
- overlapping with the neighboring networks, enough developed, the procedures for secure creation, keys use
A.G. Finogeev, A.A. Finogeev / Journal of Industrial Information Integration 5 (2017) 616 11

and management are problematic tasks. Incorrect key usage leads when disconnecting and re-connecting nodes to the network.
to compromise of information security systems, as the crypto- In the process, the center may periodically update the network
graphic strength of the encryption system largely depends on the key, and broadcast to all nodes in the new key encrypted with
condentiality of the keys. There are two problems associated with the old key. High security network keys are sent in the en-
key management: crypted form, and the usual keys are unencrypted.
3. Session link keys provide a secure unicast transmission of
1. How to generate keys with the necessary cryptographic proper-
frames between nodes at the application level.
ties?
2. How to send the keys safely to the participants of the informa- As the ZigBee security is based on symmetric keys, the sender
tion interaction in wireless sensor networks? and the recipient of the data frame must have the same shared
key used in the encryption. There are three methods of transfer
The complexity of key management in wireless sensor networks
switches for the participants of the information exchange: pre-
is determined by the absence of any xed routes data due to self-
installation, transmission from the centre of keys management, the
organization, spontaneous connections when routing, and random
synthesis of keys by the participants of the interaction. In the case
nature of information interactions. The purpose of key manage-
of pre-setting the keys are placed in the nodes or PLC in advance
ment is to neutralize the threat of compromise of private keys con-
in the process of rmware of the device. In the second case, the
dentiality, conrmation of the keys authenticity, to prevent unau-
centre of key management sends the keys to the devices (as a se-
thorized use of keys and use the expired keys. The main objective
cure method as possible). In the third case, one of the participants
of key management is to provide participants of information inter-
generates its own keys before information exchange and sends it to
action with key data in wireless sensor networks for implementing
the partner. Using the symmetric encryption information exchange
the condential exchange of information via a secure communica-
participants are sent the same key (NK) to encrypt and decrypt,
tion channel. The key-management procedures that should be im-
which causes two problems:
plemented in the control system are as follows:
1) The need for secure transmission of keys to each subscriber via
1. Registration of network nodes as the interaction participants;
secret or secure channel;
2. Synthesis of cryptographically strong keys;
2) The complexity of key management, which means the quadratic
3. Transmission and distribution of keys between nodes of a wire-
growth of the number of keys that are to generate, transmit,
less sensor network of the SCADA system;
store and destroy for each pair of nodes in the sensor network.
4. Managing connections between the exchange participants and
the keys; To solve these problems asymmetric encryption scheme with
5. Keys replacement; public key is used in network systems. The use of asymmetric al-
6. Key recovery in case of accidental destruction; gorithms eliminates the problem of key distribution in the system,
7. The planned or compromised destruction of the keys. but raises the problem of validating the received keys and their
source authentication, especially in wireless networks where sub-
The condentiality mechanism in the WSN ZigBee specication
stitution of the center generation key and subsequent receiving of
is the encryption and protection of key data when establishing a
the encrypted information is possible. For authentication, the tech-
trust between interacting partners, both at the stage of installa-
nology of electronic digital signature is used when the message
tion of keys and data transfer process. The security framework is
previously is subject to the hash using the private key and the
governed by IEEE 802.15.4 standard, where security is provided by
other party using the public key can verify the authenticity of the
means of special proles [30]. Specication ZigBee Pro Feature Set
recipient signature. Such a scheme of joint application of asym-
supports data encryption, determines changes in the keys distri-
metric encryption and digital signatures is used in the RSA cryp-
bution and encryption [31]. Additional encryption protocol can be
tosystem, where the sender is rst added to the messages digital
used at the application level when exchanging data cannot be de-
signature, and then encrypts the message and the signature using
crypted by any other node in the network, despite the fact that
the public key belonging to the recipient. The recipient decrypts
they all have a common network key.
the received message using the private key, checking both the au-
Thus the security system is based in accordance with the ZigBee
thenticity of the sender and the message integrity.
specication on the AES symmetric encryption algorithm with 128-
Although this method solves the problem of symmetric
bit keys, which may be associated with the network (network key
schemes associated with the initial transfer of the key to the other
NK) or channel (link key LK). The key synthesis is based on the
party and synchronization of keys, such systems are demanding
use of the master key (MK), which controls their compliance. The
in the length of the keys, computing resources, network nodes
initial master key must be obtained through a secure environment
and the performance of the whole network, which does not al-
by the transfer or pre-setting.
low it to be applied in sensor networks. Therefore, a greater in-
The control centre keys to which other nodes trust the distri-
terest has the hybrid (combined) encryption system for the use in
bution of keys is assigned in the ZigBee network. Each node in
WSN, which combines the advantages of an asymmetric cryptosys-
the network must be pre-loaded with the address of the control
tem with the performance of symmetric cryptosystems. The ses-
center keys to get the NK and session keys for the LK connection.
sion symmetric key is used for data encryption, and asymmetric
During conguration or reconguration of the network the center
algorithm is used to encrypt the session key. Thus the session key
control key enables or disables the connection to the network for
is also sent encrypted. Coordinator prohibited distribution network
new devices, i.e. working with access control lists (ACLs). Typically,
key in the clear. The key structure used in the ZigBee standard,
the control center also serves as the coordinator of the WSN, but
should be supplemented by a special type of key (asymmetric key
it may be associated with the server. In the WSN ZigBee standard
AK), which will be used to encrypt a session key connection (Fig.
uses three types of keys:
3).
1. The master key, which is used as the original shared secret code The master key, network keys and special AK keys are long term
between two nodes in the procedure of generating the session keys and session keys have typically a short lifespan.
link key. In the case of compromise of the network key, a broadcast com-
2. The network key NK provides security at the network layer and mand from any node in the network can be used to reset the net-
each node of the network has its own one. These keys are used, work. At the command of all the devices leave the current network
12 A.G. Finogeev, A.A. Finogeev / Journal of Industrial Information Integration 5 (2017) 616

Fig. 4. The third trusted party roles.


Fig 3. The key structure.

and try to connect again. The coordinator for each node generates in a sensor network, since the keys are placed in the rmware in
a new 128-bit keys, and new addresses. advance when conguring sensor nodes instead of open transmis-
To check the integrity of the transmitted data 4-byte network sion over the network. The disadvantage is the loss of exibility
message integrity code is added to each packet during the forma- and the inability to the keys hot swap in case of compromise. In
tion and network packet encryption. Hashing is performed on the arbitration protocols the third trusted party is used for the genera-
network header and data to retrieve it. Encryption and adding in- tion, distribution, installation and maintenance of keys, established
tegrity code reduces the data packet payload. by the coordinator or the associated server, which solves the ba-
The disadvantage of this approach is the possibility of compro- sic problem of key management. In the process of information ex-
mise of the asymmetric key that is stored in non-volatile memory change the third trusted party plays the following roles (Fig. 4).
coordinator during initialization of the network and do not change The key controlling system generates, stores and distributes keys,
in SCADA systems. Therefore, all other keys can be intercepted on produces accounting, network addressing and conguration of sen-
the stage connecting network nodes and decoded. sor nodes, is responsible for their authorization. In case of compro-
To solve this problem, a method steganography to hide the fact mised key management system the control over the SCADA system
of distribution of encryption keys is proposed to implement with work is completely lost.
the help of the service personnel routing protocol. Interval periodic The autonomous protocols work on the scheme of self-
reset the network also need to install to all nodes in the network distribution pair of identical keys between communicating parties
periodically receive new encryption keys. Schemes key exchange (symmetric encryption), or transmission of the public key of one
data (key management) with the help of the service staff of three party to the private storage key from the other side (asymmetric
major routing algorithms discussed below in the article. encryption) before the exchange of information. In the rst case
Key information control scheme and key exchange procedure in the disadvantages are the keys transmission to other party via un-
WSN can be implemented in the routing process using frames of secured wireless communication channel with the possibility of in-
routing information and the receipt conrmation to save energy terception and compromise, as well as the quadratic growth of the
and reduce the amount of routing trac. number of keys depending on the number of participants in the
In SCADA systems with a small number of monitoring objects interaction. In the second case, the drawback is the computational
WSN with centralized control mechanism is the most common complexity of the algorithms of generating the pair of keys, a large
network, which has a topological structure of the "star" or "cluster dimension keys, the complexity of encryption/decryption and the
tree." This network uses a coordinator associated with the server, need for a key generation node authentication that leads to ad-
where it is logical to install the key management system. ditional time and energy of sensor nodes with limited computing
The task of key management is more complicated in networks and energy resources. Therefore, the system of a hybrid encryption
with a large number of controlled objects. Such networks include is the most effective one, where pairs of asymmetric keys are used
decentralized or partially decentralized structures where multiple to encrypt the symmetric key before passing it to the interaction
coordinators are responsible for separate areas of monitoring and participants with the transmission initiator authentication by elec-
interact with each other through routers. Large distributed WSN tronic signature. However, the application of this system does not
with mesh topology can use a subsystem for keys management for exclude the growth of routing trac caused by the need to ex-
each zone, but the key database must reside on trusted servers. change key information.
The complexity of key management depends on the number of
trusted zones and their sensor nodes. In addition to providing se- 5. Methods of key management for secure sensor data
cure information interoperability of sensor nodes, industrial con- transmission via WSN
trollers and zone coordinator, there are tasks of ensuring secure
communications between coordinators and routers, and of keys In traditional wireless networks the problem of data protection
database replication located on the servers. is ensured by the services at the program level. Sensor networks
Key management protocols can be divided into three groups: do not differ from other types of wireless networks in terms of
protocols of pre-placement keys; arbitration protocols with a third security. They are vulnerable to passive listening attacks and ac-
trusted party; autonomous (self-contained, self-reinforcing) proto- tive falsication attacks as the wireless network is available to the
cols. Protocols of pre-placement keys can reduce the service trac public. Moreover, limited energy, computational power and mem-
A.G. Finogeev, A.A. Finogeev / Journal of Industrial Information Integration 5 (2017) 616 13

ory nodes are not capable of providing powerful data protection. recipient address of the data frame belongs to its "child" branches
These restrictions narrow the selection and use of cryptographic or is in the other part of the network and, therefore, the transmis-
mechanisms and protocols at the data link and physical layers of sion must be done through a common root node of the tree or the
the network model that requires the implementation of an archi- coordinator of the entire network.
tectural component security at the network and application levels. In such sensor network topology and method for hierarchical
routing, it is advisable to use the arbitration key management pro-
5.1. Autonomous hybrid key management with dynamic routing tocol, where on a network coordinator or a related server of the
SCADA system the role of the trusted certication center in a hy-
Reactive dynamic routing protocol Ad hoc On Demand Distance brid encryption is implemented. The arbitration method of a hy-
Vector (AODV) is used in mesh topology sensor networks and sets brid key management for the transmitted data encryption and au-
a route from the source to the destination by broadcasting queries thentication of the sender will be as follows:
[32,33]. When one of the touch nodes is going to send data, it
sends a broadcast request to create a route (Route Requests 1. The joined nodes to sensor networks receive addresses for the
RREQ). The WSN routers broadcast frame relay and make an entry branches of the cluster tree from the coordinator or the router
for the node in their routing table from which they received the in accordance with the ranges.
request. "Logical distance" from the requester to the current posi- 2. Each newly joining node generates a random pair "public key-
tion is also written in the frame. In sensor networks with mesh private key" by the RSA algorithm and sends frames with the
topology, the recipient will receive some RREQ frames with dif- public key, the address and the calculated hash as a digital sig-
ferent "logical distances". The recipient sends a reply (Route Re- nature of the center key management, which records and stores
ply RREP) to the device, from which the package with a mini- records with the public keys and digital signatures of sensor
mum "logical distance" came and then RREP is transmitted on the nodes. Private keys are stored in the sensor nodes.
shortest chain by routers until it reaches the source. Thus, the re- 3. Before the data transfer the source sends a request to the key
sponse is returned to the optimal path, and generates a vector of management center for the generation and reception of the ses-
the direct route for the frame transmission from the source to des- sion key for the symmetric data encryption and the frame re-
tination. If the connection is unreliable, then the node may send a ceiver address for the same key transfer.
receipt conrmation of a route to the destination (RREP-ACK). 4. The management centre authenticates the source, generates a
The key-management procedures should be integrated into the session connection key for the AES symmetric encryption algo-
routing protocol to reduce the service trac. For this you need to rithm of 128 bits, nds the public keys of the source and desti-
add the appropriate elds in the route frames RREQ and RREP to nation in the keys database, encrypts the session key with the
write the keys and hash functions in them. Then the methodology addition of a coordinator digital signature by calculating a hash
of autonomous hybrid key management for encryption of transmit- function.
ted data and authentication of the sender will be as follows: 5. The encrypted session key is sent to the source and destina-
tion, where the authenticity of the key management center is
1. The sender generates a random session key for the AES algo- also veried and the session key is decrypted using the stored
rithm of 128 bits, which encrypts and prepares the data frame private key.
to send. 6. The source encrypts the frame using the session key, destroys
2. The sender sends a broadcast request to create the RREQ route the key and sends the frame to the recipient who decrypts it
and obtain the public key from the recipient to encrypt the ses- with the same key and then destroys it.
sion key.
3. The receiver generates a random pair "public key-private key" 5.3. The arbitration scheme of the hybrid key management in the
for the RSA algorithm and sends the public key to the sender WSN Many-to-One routing
together with the RREP route reply. To authenticate the receiver
the hash of the frame with the public key is computed, en- The third type of routing in ZigBee network takes into account
crypted by a key known to both parties and is also transmitted the specicity of information ows, which are transmitted from
with the frame. a plurality of end nodes to one or more coordinators. This type
4. The sender encrypts the session key with the public key and of routing is called Many-to-One Routing. When using this mech-
sends it to the recipient along with the encrypted session data anism, the central coordinator periodically sends a broadcast re-
frame key. To authenticate the sender and verify the data in the quest (SINK_ADVERTISE) to all nodes. Each node keeps in mem-
frame hash function of the encrypted frame is computed, which ory only the addresses of the nearest nodes to transmit a data
is encrypted with a key known to both parties and is passed frame that it has reached a coordinator or the end node. When
along or together with the frame data, or together with a con- the node receives the SINK_ADVERTISE request, it sends back the
rmation receipt of the RREP-ACK route with bad link quality. Route Record frame and waits for a receipt conrming the route.
5. The recipient decrypts the session key and the hash function, Each router, relaying the frame, adds the route information. Thus,
checks the authenticity of the sender and the integrity of the the coordinator receives the full information about the route to the
encrypted frame. Further he decodes the frame data using the source node and uses it to send a receipt conrmation of the route
session key and deletes the key. and the subsequent receipt of a data frame. With the receipt the
coordinator can send to the node any additional information, such
5.2. The arbitration scheme of the hybrid key management in
as the encrypted session key for the symmetric encryption.
hierarchical routing process
The technique of arbitration hybrid key management for the en-
cryption of data frames and the sender authentication is as fol-
Another routing method of cluster topology in ZigBee networks
lows:
is hierarchical routing, which comes to the transmission from the
source to destination along the branches of the cluster tree with 1. The central coordinator sends the SINK_ADVERTISE broadcast
regard to parent-child relationships [18]. When building a cluster request and waits for the Route Record staff in response.
tree of the ZigBee network [19], the coordinator, and then the at- 2. The sensor node receives the SINK_ADVERTISE request, gener-
tached routers assign address ranges to child devices in a hierar- ates a random pair "public key-private key" by the RSA algo-
chical manner. As a result, each node can determine whether the rithm, forms the Route Record frame adding a public key, then
14 A.G. Finogeev, A.A. Finogeev / Journal of Industrial Information Integration 5 (2017) 616

calculates and adds a hash function to authenticate the frame consumption of network nodes as well as the additional energy for
and sends the frame to the coordinator. the generation, storage and destruction of keys, the calculation of
3. The coordinator receives the frame with the routing informa- hash functions, the sender authenticity, etc. The size of transmitted
tion, the source address, its hash function and the public key. frames with routing information also increases, but the number of
Then it generates a session connection key for the AES sym- cycles of transmission remains unchanged.
metric encryption algorithm of 128 bits and encrypts it by the The main disadvantage of key management methods in the hy-
received public key. After that, the coordinator adds the session brid and asymmetric encryption is the possibility of a successful
key to the route supporting receipts, calculates the hash func- attack to spoof the public key or nodes, where the pair keys for
tion to his authentication using the public key and sends the the asymmetric encryption are generated, which leads to a com-
received frame back to the source. promise of the entire sensor network. The process of the asym-
4. The sensor node decrypts the session key using the private key, metric public key obtaining is vulnerable to attack, in which the
authenticates the sender by calculating and comparing the hash attacker interferes with the interaction between the sender and the
function. receiver, and can modify the trac between them. Therefore, the
5. Then the frame is encrypted using the session key and sent to open asymmetric key must have a digital signature to authenticate
the coordinator. The session key is destroyed after the use. its sender. Today there is no such system in which it would be pos-
6. The coordinator decrypts the received frame by the same key sible to guarantee the authenticity of the public key, and the fact
and destroys it. that the sender of the key has not been compromised until it is
sent.
6. Discussion In the next step the session key is encrypted using the asym-
metric encryption algorithm and the asymmetrical public key of
Despite of rather a large number of possible attacks in wireless the recipient. The encrypted session key is attached to the frame
sensor networks and SCADA systems, the internal anthropogenic routing which also includes the added electronic signature. The en-
threats are the most dangerous to information security, which in- tire data packet is transmitted to the recipient via the unprotected
clude: WSN, and, of course, it is also subject to sniffer attacks.
- unintentional personnel actions that create the auspicious con-
ditions for external attacks by hackers, 7. Conclusion and future work
- intentional ignoring the requirements of information security
by the staff serving the SCADA system, This paper introduces a problems of detecting attacks in wire-
- the lack of personnel qualication in the eld of information less sensor networks (WSN) of SCADA systems. As a result of an-
technologies and implementation of information security meth- alytical studies the authors developed the detailed classication of
ods. external attacks and intrusion detection in sensor networks and
brought a detailed description of attacking impacts on components
Unlike the external intruder, the staff of the enterprise has
of SCADA systems in accordance with the selected directions of at-
great opportunities for attacks to infect and spread malicious code
tacks.
on the sensor network. Information security problems are often
Despite of rather a large number of possible attacks in the wire-
caused not so much by external attacks, but the staff non- compli-
less sensor networks and the SCADA systems, the internal anthro-
ance of regulations and rules of the enterprise information security
pogenic threats are the most dangerous to information security,
policy.
which include:
Managers and other staff of the enterprise may ignore their du-
ties and in their "free" time are busy with "surng" the Internet, - unintentional personnel actions that create the auspicious con-
social networking, and playing computer games. ditions for external attacks by hackers,
It may result in an unauthorized PC infection by computer - intentional ignoring the requirements of information security
viruses, Trojan horses and worms, which then may penetrate into by the staff serving the SCADA system,
the sensor networks. This explains the fact that viruses and worms - the lack of personnel qualication in the eld of information
like Stuxnet are often present in industrial systems, and the fact technologies and implementation of information security meth-
that their presence is normally hidden by staff and managers, as ods.
the disclosure of this information will lead all the staff and man-
agement to the detailed inspection and then to the subsequent Unlike the external intruder, the staff of the enterprise has great
negative consequences for them. In addition, the nding of the in- opportunities for attacks to infect and spread the malicious code
fection in the SCADA system may cause a need of hard reset to to the sensor network. Information security problems are often
clean the virus and will stop the most of the enterprises processes, caused not so much by external attacks, but the staff non- com-
but it is not always feasible from the economic standpoint. pliance of regulations and rules of the enterprise information se-
The lack of personnel qualications which works with PLCs and curity policy. Managers and the staff of the enterprise may ignore
SCADA systems also requires the involvement of outside experts to their duties and in their "free" time are busy with "surng" the
identify and correct software changes in controllers, because after Internet, social networking, and playing computer games.
cleaning the system its necessary to be ensured that the programs It may result in an unauthorized PC infection by computer
and settings in the controllers correspond to the values required viruses, Trojan horses and worms, which then may penetrate into
for the proper functioning of industrial automation complex. the sensor networks. This explains the fact that viruses and worms
It is well known that the human factor is the main reason like Stuxnet are often present in industrial systems, and the fact
of deviations from normal operation status in various technical that their presence is normally hidden by the staff and managers,
systems. This requires special attention to the establishment and as the disclosure of this information will lead all the staff and
maintenance of appropriate technical regulations. management to the detailed inspection and then to the subsequent
The advantage of these approaches is the use of existing rout- negative consequences for them. In addition, the nding of the in-
ing procedures for the simultaneous exchange of key information fection in the SCADA system may cause a need of hard reset to
that allows reducing energy consumption during the information clean the virus and will stop the most of the enterprises processes,
transmission. However, the problems remain, for it is required the but it is not always feasible from the economic standpoint.
A.G. Finogeev, A.A. Finogeev / Journal of Industrial Information Integration 5 (2017) 616 15

The lack of personnel qualications while operating with the [10] V. Kamaev, A. Finogeev, A. Finogeev, S. Shevchenko, Knowledge discovery
PLCs and SCADA systems also requires the involvement of the out- in the SCADA databases used for the municipal power supply system, in:
Proceedings JCKBSE 2014 Knowledge-Based Software Engineering, 1, 2014,
side experts to identify and correct software changes in controllers, pp. 115.
because after cleaning the system its necessary to be ensured that [11] A.R. Pandaa, D. Mishrab, H.K. Rathaa, Implementation of SCADA/HMI sys-
the programs and settings in the controllers correspond to the val- tem for real-time controlling and performance monitoring of SDR based
ight termination system, J. Indus. Inf. Integr. 3 (2016) 2030. http://www.
ues required for the proper functioning of the industrial automa- sciencedirect.com/science/article/pii/S2452414X16300140.
tion complex. It is well known that the human factor is the main [12] D. Grdr, J. El-Khoury, T. Seceleanu, L. Lednicki, Making interoperability visi-
reason of deviations from the normal operation status in various ble: data visualization of cyber-physical systems development tool chains, J. In-
dus. Inf. Integr. 4 (2016) 2634. http://www.sciencedirect.com/science/article/
technical systems. This requires special attention to the establish-
pii/S2452414X16300656.
ment and maintenance of the appropriate technical regulations. [13] D. Midi, S. Sultana, E. Bertino, A system for response and prevention of security
Also the article considers the problems and objectives of key incidents in wireless sensor networks, ACM Trans. Sen. Netw 13 (December(1))
(2016) 138, doi:10.1145/2996195.
management for data encryption in WSN of SCADA systems. Three
[14] C. Wang, E. Bertino, Sensor network provenance compression using dynamic
algorithms of hybrid key management using routing information bayesian networks, ACM Trans. Sen. Netw 13 (January(1)) (2017) 132, doi:10.
frames determined by routing methods and the WSN topology are 1145/2997653.
presented. [15] A.G. Finogeev, V.B. Dilman, V.A. Maslov, A.A. Finogeev, System for remote mon-
itoring and control of district heating network based on wireless sensor net-
In our future work, it is possible to abandon the cryptographic works, Appl. Inf. 3 (33) (2011) 8393.
encryption of session keys by high computational complexity algo- [16] A.G. Finogeev, V.B. Dilman, V.A. Maslov, A.A. Finogeev, Operational remote
rithms, but instead carry out covert transfer of open or encrypted monitoring system in urban heating based on wireless sensor networks, Uni-
versity proceedings (Volga region) 3 (2010) 2736.
key information by the steganographic methods. Despite the fact [17] Y. Liu, W. Han, Y. Zhang, L. Li, J. Wang, L. Zheng, An Internet-of-Things so-
that the cryptographic security mechanisms, such as broadcast au- lution for food safety and quality control: a pilot project in China, J. In-
thentication and key management, are a prerequisite for the se- dus. Inf. Integr. 3 (2016) 1. http://www.sciencedirect.com/science/article/pii/
S2452414X16300358.
curity and robustness of sensor networks today, other methods [18] F. Taoa, Y. Wangb, Y. Zuoa, H. Yangc, M. Zhanga, Internet of Things in product
also require the intensive study. The examples of such methods life-cycle energy management, J. Indus. Inf. Integr. 1 (March) (2016) 2639.
are steganography to hide the fact of classied information trans- [19] S. Hu, L. Su, H. Liu, H. Wang, F Tarek, Abdelzaher, smartroad: smartphone-
based crowd sensing for trac regulator detection and identication, ACM
fer, the use of the timestamps and synchronization technologies in
Trans. Sen. Netw. 11 (July(4)) (2015) 127 Article 55, doi:10.1145/2770876.
the generation and disclosure of key information, the identication [20] L. Qi, J. Zhang, M. Xu, Z. Fu, W. Chen, X. Zhang, Developing wsn-based trace-
and prevention of data loss, intrusion detection and prevention in ability system for recirculation aquaculture, J. Math. Comput. Model. 53 (11)
(2011) 21622172.
the sensor network, etc.
[21] V.A. Kamaev, V.V. Natrov, Intrusion detection methodology, Izvestia VSTU 2
(2006) 127132.
Acknowledgment [22] K. Gai, L. Qiu, M. Chen, H. Zhao, M. Qiu, SA-EAST: security-aware ecient data
transmission for its in mobile heterogeneous cloud computing, ACM Trans.
Embed. Comput. Syst. 16 (January(2)) (2017) 122 Article 60, doi:10.1145/
The reported study was funded by Russian Foundation for Basic 2979677.
Research (RFBR) according to the research project No 16-07-0 0 031, [23] A.G. Finogeev, V.B. Dilman, A.A. Finogeev, I.S. Nefedova, E.A. Finogeev, Wire-
15-07-01720. less heterogeneous network for monitoring and supervisory control at urban
heating supply system, in: Proceedings Innovative Information Technologies, 3,
2014, pp. 109116.
References [24] P.V. Botvinkin, V.A. Kamaev, I.S. Nefedova, A.G. Finogeev, E.A. Finogeev, Anal-
ysis, classication and detection methods of attacks via wireless sensor net-
[1] G. Mouzon, M.B. Yildirim, J. Twomey, Operational methods for minimization of works in SCADA systems, Life Sci. J. 11 (11) (2014) 384388.
energy consumption of manufacturing equipment, Int. J. Prod. Res. 45 (18-19) [25] S.G. Frolov, A.U. Demin, Types of DDOS attacks, methods of prevention and
(2007) 42474271. protection against them, in: Proceedings Information Technologies in Science,
[2] H. Hopf, E. Mller, Providing energy data and information for sustainable man- Management, Social Services and Medicine, 1, 2016, pp. 7476.
ufacturing systems by energy cards, Robot. Comput. Integr. Manuf. 36 (2015) [26] H. Beitollahi, G. Deconinck, A cooperative mechanism to defense against dis-
7683. tributed denial of service attacks, in: Proceeding Trust, Security and Privacy in
[3] L.D. Xu, W. He, S. Li, Internet of things in industries: a survey, IEEE Trans. Ind. Computing and Communications (IEEE TrustCom-11), 1, 2011, pp. 1120.
Electron. 10 (4) (2014) 22332243. [27] H. Beitollahi, G. Deconinck, Analyzing well-known countermeasures against
[4] H. Alemdar, C. Ersoy, Wireless sensor networks for healthcare: a survey, Com- distributed denial of service attacks, J. Comput. Commun. 35 (7) (2012)
put. Netw. 54 (15) (2010) 26882710. 759771.
[5] A.G. Finogeev, A.A. Finogeev, Mobile sensor networks for supporting deci- [28] A. Mitra, A. Kundu, M. Chattopadhyay, S. Chattopadhyay, A cost-ecient one
sion making, in: Proceedings Innovative Information Technologies-20 09, 20 09, time password-based authentication in cloud environment using equal length
pp. 146149. cellular automata, J. Indus. Inf. Integr. (2016). https://www.sciencedirect.com/
[6] A.P. Tyukov, A. Ushakov, M.V. Shcherbakov, A. Brebels, V.A. Kamaev, Digital science/article/pii/S2452414X1630036X.
signage based building energy management system: solution concept, World [29] H. Beitollahi, G. Deconinck, Ferris wheel a ring based onion circuit for hidden
Appl. Sci. J. (WASJ) 24 (24) (2013) 183190. services, J. Comput. Commun. 35 (7) (2012) 829841.
[7] V.A. Kamaev, V.V. Natrov, Analysis of methods to assess the quality of func- [30] ZigBee Alliance, 2016. URL: http://www.zigbee.org.
tioning and effectiveness of information security systems for energy compa- [31] ZigBee Specication Overview, 2016. http://www.zigbee.org/Specications/
nies, Izvestia VSTU 1 (2006) 6769. ZigBee/Overview.aspx.
[8] X.Y. Chen, Z.G. Jin, Research on key technology and applications for internet of [32] A.M. Bershadskij, L.S. Kurilov, A.G. Finogeev, Review of routing techniques
things, Phys. Proc. 33 (2012) 561566. in wireless sensor networks, University proceedings (Volga region) 1 (2012)
[9] C.H. Liu, B. Yang, T. Liu, Ecient naming, addressing and prole services in 4758.
internet-of-things sensory environments, J. Ad Hoc Netw (2013). [33] A.M. Bershadskij, L.S. Kurilov, A.G. Finogeev, Classication of methods for rout-
ing in wireless sensor networks, Izvestia VSTU 10 (2012) 181185.
16 A.G. Finogeev, A.A. Finogeev / Journal of Industrial Information Integration 5 (2017) 616

Alexey Finogeev is a doctor of science (engineering), professor at Penza State University (Penza, Russia), honored worker of higher professional education of the Russian
Federation. His research interests are mainly in the elds of information technologies, network technologies, wireless technologies, information security technologies, wireless
sensor networks, SCADA system, fog and grid computing.

Anton Finogeev is a PhD, an associate professor at Penza State University (Penza, Russia). His research interesting include network technologies, wireless technologies,
information security technologies, wireless sensor networks, SCADA system.

Vous aimerez peut-être aussi