SCADA System Security, Complexity, and Security Proof
SCADA System Security, Complexity, and Security Proof
1 Introduction
SCADA systems are used to control and monitor assets where central data acquisition
is as important as control[1, 2] .These systems are used in distribution systems such as
water distribution and wastewater collection systems, oil and gas pipelines, electrical
utility transmission and distribution systems, and rail and other public transportation
systems. SCADA systems integrate data acquisition systems with data transmission
systems and HMI software to provide a centralized monitoring and control system for
numerous process inputs and outputs. SCADA systems are designed to collect field
information, transfer it to a central computer facility, and display the information to
the operator graphically or textually, thereby allowing the operator to monitor or con-
trol an entire system from a central location in real time. Based on the sophistication
and setup of the individual system, control of any individual system, operation, or
task can be automatic, or it can be performed by operator commands.[1, 3]
1
Fig. 1. Simple SCADA System
2 SCADA vulnerabilities
2
since 1988 and recorded by CERT to 137.529 incidents in 2003 (CERT/CC Statistics
1988- 2005).The necessity to make SCADA systems more secure has therefore been
classified as a significant field of research. One of the most important security re-
quirements for SCADA systems is that communication channels must be more se-
cured. Secure keys need to be established before cryptographic techniques can be
used to secure communications [9].
Security proofs were major concerns of many of research in last few years. To ensure
that a protocol or a software have a certain requested properties, is an important issue.
This task has to be done by formal reasoning instead of examinations and simula-
tions, as the latter approach is not as comprehensive as the formal one.[10]
Security proofs are methods to validate the security of a protocol. A reductionist
security proof of a protocol helps to show that the security in the proof model is relat-
ed to the cryptographic primitives used. A security proof attempt to show that a proto-
col meets the defined goals for the protocol in the security model used.[11]
Protocol verification has mainly two possible approaches: The formal model and the
computational model
In the first model, we are in a very idealized setting; thus this can be efficiently
implemented in completely automated protocol verifiers.
The second model inspires ideas from complexity theory and needs more human
interference in proofs, and it is being automated only in very recent times. [12]
These verification methods let us to discover and uncover design faults that can
stay hidden for years. The purpose of the present paper is to investigate a proof of
security on the 11770-2 Mechanism 9 protocol in the formal model.
The purpose of this protocol 11770-2 mechanisms 9 (ISO 1996) is to establish a
long-term key shared between the nodes.
4 Protocol Description
The ISO 11770-2 standard has been published in 1996, and specifies a series of proto-
cols for establishing shared secret keys using symmetric cryptographic techniques.
The protocols in this standard use a many of different mechanism in order to ensure
the freshness of the established keys, and offer several cryptographic assurances tech-
niques of the established keys. [13]
3
We are mainly concerned about ISO 11770-2 mechanism 9 which used as a basis
for the node-node key establishment protocol. This mechanism has chosen, as it is the
best fit for SCADA systems. In the case of SCADA, it is more appropriate for the
generation of keys to be performed by the external device, and not have keys generat-
ed by the nodes in the systems
5 Security Proof
The fact that a security proof depends on the model used. The security model will
outline the aims for security, and the controls given to the opponent. The selection of
the accurate model has the impact on the value of the security proof. In this section
we try to investigate a security proof of 11770-2 mechanisms 9 protocol, it is assumed
to use Bellare Rogaway model .Bellare Rogaway model has been developed and re-
fined over many years, with some different versions, which has been used for differ-
ent proofs. It is very important in any security proof to specify the adversarial model
and a clear definition of security. We will follow in our developing the proof of Boyd,
Choo and Mathuria .
Reductionist security proofs are a significant part of generating valuable and safe
cryptographic protocols. The aim of provable security is to demonstrate that a proto-
col will meet the security goals .The final outcome will be to say that breaking any of
4
security properties will require an attacker to have broken a fundamental security
primitive. [14].
Several number models for security proofs performance of protocols have been
proposed. The model that will be used as the starting point for the security proof of
11770-2 mechanisms 9, is the Bellare Rogaway model.
Cryptographic community is essential to validate security proofs. Many proofs
have been found to have flaws, and it is necessary to be validated before it is estab-
lished. Although the use of provable security techniques is not perfect, and does not
promise a full security, they do offer important tools for helping to validate the securi-
ty of a protocol [15]
Conclusion
This paper provided a detailed discussion on critical infrastructures and the role cryp-
tographic mechanism protocol plays in their protection. We examined one of current
protocol 11770-2 mechanisms and determined that the solutions are not sufficient for
such an interconnected infrastructure. We provided our initial framework design for
the security proofing of this protocol following the ‘model’ that we will use in the
future.
5
Our future work will focus on the introducing the Bellare Rogaway Model for de-
veloping a reductionist security proofs. This model has been well established for veri-
fying security .Next step is to show how the security goals in this model meet the set
of security aims of 11770-2 mechanisms 9. We will use Bellare Rogaway model to
create a reductionist proof which proves the security of the key establishment proto-
col.
References
1. C. Ning, et al., "SCADA system security: Complexity, history and new developments," in
Industrial Informatics, 2008. INDIN 2008. 6th IEEE International Conference on, 2008, pp.
569-574.
2. S. Gold, "The SCADA challenge: securing critical infrastructure," Network Security, vol.
2009, pp. 18-20, 2009.
3. R. E. Johnson, "Survey of SCADA security challenges and potential attack vectors," in In-
ternet Technology and Secured Transactions (ICITST), 2010 International Conference for,
2010, pp. 1-5.
4 C. Donghyun, et al., "Efficient Secure Group Communications for SCADA," Power Deliv-
ery, IEEE Transactions on, vol. 25, pp. 714-722, 2010.
5. S. Rautmare, "SCADA system security: Challenges and recommendations," in India Confer-
ence (INDICON), 2011 Annual IEEE, 2011, pp. 1-4.
6. K. Stouffer , et al., "Guide to Supervisory Control and Data Acquisition (SCADA) and
Industrial Control Systems Security " The National Institute of Standards and Technology
(NIST), 2006.
7. C. Office, "The UK Cyber Security Strategy Protecting and promoting the UK in a digital
world," ed, 2011.
8 R. Brewer, "Protecting critical control systems," Network Security, vol. 2012, pp. 7-10,
2012.
9. V. M. Igure, et al., "Security issues in SCADA networks," Computers & Security, vol.
25, pp. 498-506, 2006.
10. J. Goubault-Larrecq, "Towards Producing Formally Checkable Security Proofs, Automati-
cally," in Computer Security Foundations Symposium, 2008. CSF '08. IEEE 21st, 2008, pp.
224-238.
11. A. Carcano, et al., "Scada Malware, a Proof of Concept," in Critical Information Infrastruc-
tures Security. vol. 5508, R. Setola and S. Geretshuber, Eds., ed Berlin: Springer-Verlag
Berlin, 2009, pp. 211-222.
12. R. Bresciani and A. Butterfield, "A formal security proof for the ZRTP Protocol," in Inter-
net Technology and Secured Transactions, 2009. ICITST 2009. International Conference
for, 2009, pp. 1-6.
13. ISO, "Information technology — Security techniques — Key management " ISO/IEC,
2008.
14. A. Stolbunov "Reductionist Security Arguments for Public-KeyCryptographic Schemes
Based on Group Action," presented at the NISK, 2009.
15. N. Koblitz, "Another Look of "Provable Security"," Journal of Cryptography, vol. 20, p.
37, 2007.
16. R. Dawson "Secure Scada Communication " 2008.