Abstract

Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches. Many security breaches have been reported impacting society severely. Hence, it is essential to achieve secure communication between the devices for creating a secure environment. For this to be effective, the keys used for secure communication must be protected against unauthorized disclosure, misuse, alteration or loss, which can be taken care of by a Key Management Infrastructure. In this paper, by considering the generic industrial automation network, a comprehensive key management infrastructure (CKMI) is designed for IACS. To design such an infrastructure, the proposed scheme employs ECDH, matrix method, and polynomial crypto mechanisms. The proposed design handles all the standard key management operations, viz. key generation, device registration, key establishment, key storage, device addition, key revocation, key update, key recovery, key archival, and key de-registration and destruction. The design supports secure communication between the same and different levels of IACS devices. The proposed design can be applied for major industrial automation networks to handle the key management operations. The performance analysis and implementation results highlight the benefits of the proposed design.

Highlights

  • Critical infrastructures are the primary needs of the society

  • 2: comprehensive key management infrastructure (CKMI) server: 3: Considers one polynomial share (PS) ∈ polynomial pool, ID used for generating PS and field level group key (FGK). 4: CKMI server −{−PS−|−|I−D−||F−G−K−}−EJ−oin−k→ey New Field Device. 5: CKMI server broadcasts message to all field level devices about the addition of new device. 6: else if New Control Device is added to the control level network

  • We have proposed an elegant key management design for Industrial Automation and Control Systems (IACS) to handle the key management operations

Read more

Summary

Introduction

Critical infrastructures are the primary needs of the society. To reduce the complexity in the operations of critical infrastructures, there is a need for simple and efficient process supporting remote monitoring and control of various activities, which can be achieved through automation. Our Contribution: In this paper, by considering the generic architecture of IACS, a comprehensive key management infrastructure is designed (Figure 8). Key management is designed in such a way that it can be applied for major industrial networks to secure the communications of industrial devices. 3. The proposed design supports secure communication between the same and different levels of IACS devices. Polynomial method is chosen for field level devices, matrix method for control level devices and ECDH for plant level devices These schemes are basically meant for establishing secret keys between the communicating devices, but we have used the same methods to support other key management operations such as key update, device joining, key revocation, key storage, archival, key recovery and key de-registration and destruction.

Related Work
Preliminaries
Polynomial Key Establishment Scheme
Matrix Key Establishment Scheme
ECDH Key Establishment Scheme
Proposed Key Management Infrastructure Design for IACS
Key Generation
13: Choose ECDH method for key establishment 14
Key Establishment Phase
Key Storage
2: CKMI server: 3
7: CKMI server: 8
13: CKMI server: 14
Key Revocation
Key Update
Archival
Key Recovery
4.10. Key de-Registration and destruction
4.11. Across Field Level and Control Level Devices
4.12. Across Control Level and Plant Level Devices
CKMI Design and Its Features
Performance Analysis
Security Analysis and Comparison
Test Setup and Implementation Results
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.