6 Secure IIoT networking
6 Secure IIoT networking
com
White Paper
2 Introduction
Highly Secure 2 Communication
Networking for 3
Accelerators
Enterprise Network
5 Example applications
Applications
Abstract
The networking, industrial control, Machine-to-Machine (M2M)
and emerging Internet of Things (IoT) markets all share a
similar basic requirement: the ability to safely and securely
connect a variety of end points and support centralized control
across the network. The widespread adoption of the Internet
Protocol (IP) standard now commonly used in enterprise
networks by the industrial automation, M2M and IoT markets
is allowing them to leverage common networking building
blocks across these emerging application spaces. This paper
will discuss the additional requirements for ensuring industrial,
M2M and IoT networks incorporate support for trust, security,
high reliability and efficient performance.
High-Performance, Highly Secure Networking for Industrial and IoT Applications
Introduction
The networking, industrial control, machine-to-machine (M2M) and emerging Internet of
Things (IoT) markets all share a similar basic requirement: the ability to connect a variety of
end points together and support centralized control of the network. The widespread adoption
of the Internet Protocol (IP) standard enables industrial automation, M2M and IoT applications
to leverage common network connectivity building blocks.
The adoption of Ethernet to enable connectivity between machines on the factory floor has
been growing steadily as manufacturers seek greater visibility to data, improved productivity
and the ability to remotely manage their industrial operations. Enhancing the visibility and
management of networked factory devices, which enables streamlining of their associated
functions, depends on the ability to ensure the data carried across the factory network
remains secure.
Freescale continues to lead the industry in this trend as one of the top suppliers of networking
processors used in control and data plane applications for more than 20 years. Whether the
design involves networking infrastructure, industrial control networks (gateways or PLCs) or
factory floor equipment, some essential requirements must be satisfied: deliver exceptional
reliability, data security, efficient packet processing and enhanced connectivity support.
Freescale first established itself as the industry leader for networking solutions by supporting
these requirements with its communication processors based on Power Architecture®
technology. Building on this expertise and record of innovation achieved over the past twenty
years, Freescale announced the first QorIQ networking processor family based on the ARM®
ISA. The innovative QorIQ LS1021A processor is equipped with dual high-efficiency ARM
Cortex®-A7 cores with ECC-protected L1 and L2 caches to ensure maximum reliability and
support operating speeds up to 1 GHz. The dual ARM cores are complimented by the highest
level of integration ever offered in a sub-3 W microprocessor. High-performance networking
interfaces include Gigabit Ethernet, PCI Express® 2.0, SATA 3.0 and USB 3.0. The LS1021A
processor also features support for legacy serial interfaces, including TDM, HDLC, UART,
I2C, SPI, CAN and PWM/Quadric decoding. In addition to the wide variety of communication
interfaces, the processor offers support for SDHC, I2S, and an integrated LCD controller.
Communication Accelerators
In process automation and manufacturing control applications, the network must be always
available, highly reliable and secure. At the same time, network processors need to provide
intelligent features that allow companies to take advantage of the flow of information available
today within their networks.
Supporting Ethernet connectivity, each of the virtualized, enhanced triple speed Ethernet
controllers (VeTSEC) support IEEE® 1588 time stamping on both ingress and egress, along
with timer and pulse implementation in hardware. The hardware also supports software
managed queues, which when combined with the ingress parsing up to ISO layer 4 and
hardware prioritization on egress, allows for simple effective queuing to be implemented.
These proven Ethernet controllers are common to other Freescale processors used in
industrial applications and are supported by a wide variety of mature software drivers,
including software stacks for Industrial Ethernet (EtherCAT® Master), PROFINET® (RT),
EtherNet/IP™ and PRP.
QorIQ LS1021AProcessor
QorIQ LS1021A Processor Block
Block Diagram
Diagram
System Control ARM® ARM®
Internal Boot ROM Cortex®-A7 Cortex®-A7
Core Core
Security Fuses FPU NEON FPU NEON
Security Monitor
32 KB 32 KB 32 KB 32 KB
Power Management D Cache I Cache D Cache I Cache DDR3L/4
Memory 128 KB
DMA
Controller SRAM
System Interfaces 512 KB Coherent L2 Cache
IFC Flash
Cache Coherent Interconnect (CCI 400)
QuadSPI Flash
1x SD/MMC
uQE
2x DUART, 6x LP UART Security
(HDLC,
(XoR,
TDM,
SATA 3.0
Ethernet
Ethernet
Ethernet
PCIe 2.0
PCIe 2.0
3x I C, 2x SPI, GPIO
2
CRC)
PB)
Audio Subsystem:
4x I2S, ASRC, SPDF
4x CAN, FlexTimer, PWM
1x USB 3.0 w/ PHY
4-Lane 6 GHz SerDes
USB 2.0
LCD Controller
These features are essential in IoT applications where many edge of network devices and
sensors will be capturing and transmitting user-specific data between nodes. Since this data
can be directly related or linked to an individual user, it is essential that the data be encrypted.
This is increasingly being regulated and monitored by legislation which extends to the
specification of encryption standards and protocols to be used. The inevitable result will be a
requirement that communication processors used in M2M or IoT applications must have the
capability of performing cryptographic operations, such as hashing, signing and encrypting
data, as well as a secure key storage unit in order to meet regulatory requirements.
Industrial communication links must also be secure, not just from data snooping but also
from unauthorized control which could result in such costly events as taking down a
production line.
However, even if the data transmitted between the network communication links is encrypted,
the physical device may still be vulnerable to attack via an unauthorized modification of the
program software. Therefore, a device must not only provide secure communication, but be
able to operate as a trusted node. A trusted node is a device that the user can fully rely on
to not only protect data, but to ensure it only executes authentic software created for it by
the user.
In the real world trust is typically conferred, and this concept extends in similar fashion to
the digital world. If you get information (data or a command) from a trusted source, you can
assume that it is reliable, valid information. Booting up a trusted device requires a “root of
trust,” which can be an external (typically expensive) device, such as an FPGA or ASIC, or it
can be integrated in the SoC (system-on-chip) itself, as it is in the QorIQ LS1 product family.
In the case of the LS1021A processor, authentication is performed within a preboot loader
that is contained completely in internal ROM. This implementation provides a one-time user
programmable authentication KEY to be used with the preboot loader, creating the trust
needed to prevent unauthorized code/users from manipulating the system. The trusted node
feature is enabled by writing the authentication KEYs and an enable bit, which are one-time
user programmable fuses. Once the Trust mode is enabled, external boot code image(s)
(e.g., boot loader, OS kernels or even bare metal code) will only be executed after it has been
decrypted and authenticated by the preboot loader KEYs. This code then becomes the next
source of trust. Included in the decrypted/authenticated code can be data-like KEYs that can
be used in the trusted communication links. Support for a primary and alternate (secondary)
signed code images to provide additional reliability.
The external code image is encrypted using the same KEY(s) blown into KEY area on the
QorIQ LS1021A processor by the user’s development team with the tool chain provided
to program the device. Hence, the code image is known to be secure when it leaves the
development group.
Once the code image is authenticated by the device, the device operates in the “secure”
state. To maintain the secure operation state, additional security features are available to
detect and prevent unauthorized tampering or manipulation of the code/data in external
memory.
The secure debug controller manages access to the system through the JTAG interface,
which can be closed down unconditionally or be opened in various access modes upon
passing a challenge/response sequence.
The Run-Time integrity checker supports periodic checks of predefined memory regions for
modification (by harmful or defective code) by continuously calculating and comparing hashes
of these memory regions.
An external tamper detection pin can be used to detect physical attacks to the device.
Finally, ARM TrustZone supports the division of the system into secure and nonsecure zones
and controls access privileges between those zones.
All security failures are collected and their severity evaluated by the security monitor that is
part of the secure nonvolatile storage unit, which then executes the respective actions. This
could be the automatic deletion of sensitive information, such as KEYs, and to notify the
operating system of such a violation.
The second block related to security is the cryptographic engine block, which covers
acceleration of the security and encryption algorithms to be implemented. Note, this is
used by the preboot loader to accelerate the decryption/authentication boot process. This
block provides hardware acceleration for the algorithms associated with IPSec, SSL/TLS,
WiMAX and various other standards; many of them with single-pass processing involved
whenever data in the IoT has to be exchanged and transported out of the device. It is a
modular and scalable security core that is optimized to process all it can, and even perform
multi-algorithmic operations (e.g., 3DESHMAC-SHA-1) in a single pass of data. Some of
the algorithms implemented in hardware are XOR, DES, AES and a NIST-certified random
number generator.
Summary
To enable high performance, highly secure network connectivity for industrial control, M2M
and IoT applications, some essential requirements must be satisfied: exceptional reliability,
ensure data is secure, deliver efficient packet processing, and enhanced connectivity support.
The QorIQ LS1021A processor has been engineered to meet these requirements, delivering
exceptional performance efficiency together with an optimized mix of connectivity and
security features.
Example applications
Following are a collection of example use cases for industrial and IoT applications that can be
supported based on the feature set of the QorIQ S1021A processor.
ARM® ARM®
Cortex®-A7 Cortex®-A7
Core Core
FPU NEON FPU NEON
32 KB 32 KB 32 KB 32 KB
D Cache I Cache D Cache I Cache
128 KB
SRAM
512 KB Coherent L2 Cache
CANopen
PROFINET® LCD SAI FlexTimer UCC PHY RS485 PROFIBUS®
RJ45 PHY Ethernet uQE
EtherNet/IP™ Security Controller I2S Module UCC PHY RS485 Modbus
(HDLC,
ETHERNET Powerlink (XoR,
RJ45 PHY Ethernet TDM,
CRC) CAN PHY RS485
4-Lane 6 GHz SerDes
Quad SPI IC
2
DDR
FLASH
Wireless
LS1021A
Gateway (Trusted Node): QorIQ LS1021A Processor
ARM® ARM®
Cortex®-A7 Cortex®-A7
Core Core
FPU NEON FPU NEON
32 KB 32 KB 32 KB 32 KB
D Cache I Cache D Cache I Cache
128 KB
SRAM
512 KB Coherent L2 Cache
4-Lane 6 GHz
Security Controller I2S Module UCC
(HDLC,
SerDes
RJ45 PHY Ethernet (XoR,
TDM,
CRC) SAI FlexTimer CAN
PB)
RJ45 PHY Ethernet I2S Module CAN
DDR
FLASH
Network
LS1021A
Attached Encrypted Storage: QorIQ LS1021A Processor
ARM® ARM®
Cortex®-A7 Cortex®-A7
Core Core
FPU NEON FPU NEON
32 KB 32 KB 32 KB 32 KB
D Cache I Cache D Cache I Cache
128 KB
SRAM
512 KB Coherent L2 Cache
Ethernet (XoR,
TDM,
CRC) SAI FlexTimer CAN
PB)
Ethernet I2S Module CAN
DDR
FLASH