GridCom Secure Distribution Network Architecture
GridCom Secure Distribution Network Architecture
2 | Tropos GridCom
- Regulatory compliance requirements: While security standards
for the smart grid are still being developed, it is increasingly clear
that protection of critical cyber assets and of the interests of
stakeholders will place regulatory compliance requirements on
utilities and system operators. As an early example, the NERC CIP
standards were issued for the identification and protection of critical
cyber assets to maintain the operational integrity of the bulk power
system.
Field
1000s sq. mi. area wireless 500 Kbps - 10 Mbps 802.11/PTMP/LTE
aggregation network
Number of nodes
3 | Tropos GridCom
Availability and performance
Availability and performance are unique security requirements for critical sys-
tems that differentiate them from traditional information processing systems,
stemming from the fact that critical systems need to be able to continue to
operate and satisfy business and mission needs under diverse operating
conditions. The overall system architecture needs to be designed to this
requirement to ensure that system integrity and availability are maintained
even under adverse conditions such as external attacks or peak loads. For
example, a mesh architecture that is capable of self-organizing and self-
healing in response to local disturbances is preferable to a star topology
with central points of failure.
4 | Tropos GridCom
Secure network configuration, operation and management
In addition to securing data transmission, it is also crucial to secure the
configuration and management of the network infrastructure and safeguard
its operation. Only authorized network operators must be able to alter the
operation of the network elements comprising the distribution area network.
Detailed logging and audit trails are needed to monitor and trace back sys-
tem configuration changes.
Open standards-based
Tropos’ approach leverages and builds on open-standard security tech-
niques that have undergone extensive review by the security community.
This includes such standards as AES, IEEE 802.1x, IEEE 802.11i, IPsec,
SSL/TLS, and FIPS 140-2. These standards comprise requirements for
authentication, authorization and access control; encryption; key generation,
distribution, management and storage; physical security; and the detection
and mitigation of attacks and include approaches ranging from the physical
layer all the way up to the application layer.
5 | Tropos GridCom
distribution transmission
NISTIR 7628
ZigBee IEC 62351
Smart
Energy NERC CIP
FIPS 140-2
6 | Tropos GridCom
Multi-layer security
Tropos’ approach utilizes multiple security mechanisms operating at
multiple layers of the protocol stack applying a defense-in-depth strategy
that provides layered defense mechanisms such that the impact of failure
in any one mechanism is minimized and so that the adversary’s probability
of success is reduced. To illustrate this principle, suppose, for example,
that there are 3 independent layers of defense, each with a 1% probability
of being penetrated – then the probability that all 3 layers are penetrated
successfully is 0.0001%.
Application HTTPS
Transport SSL/TLS
IPsec
Network Packet filtering firewall
IP ACLs
7 | Tropos GridCom
Multi-application security
Tropos’ network constitutes a common physical infrastructure supporting
a range of applications that often have different data characteristics as
well as security requirements. The Tropos security solution is designed to
be flexible enough to accommodate these differences while ensuring the
logical separation of these traffic flows as well as the integrity of the overall
system.
Mobile GIS/
Mobile workforce
workforce applications
Since the authorization levels and privileges of the users and devices
associated these different applications are distinct, and since these
are logically distinct services, the network needs to be able to maintain
separation of the corresponding flows. This is done using separate
802.11 ESSIDs (Service Set Identifiers) and VLANs that are mapped
to different queues. Each SSID/service has separate (dynamically-
generated) encryption keys and direct communication between endpoints
corresponding to different services can be prohibited by default. In
addition, different quality of service parameters (for example, DiffServ
or 802.1p classifiers) are assigned to different flows ensuring that, for
example, delay-sensitive distribution automation traffic is accorded priority
over more delay-tolerant metering data.
8 | Tropos GridCom
Adaptable
The threat landscape is continually evolving and new cybersecurity threats
targeting critical infrastructure are expected to emerge as the smart grid is
implemented. In addition, the security standards for the smart grid are them-
selves evolving on a number of fronts, including NISTIR 7628 targeted at
smart grid cybersecurity and the NERC CIP standards aimed at securing the
operation of the bulk power system. Furthermore, in view of the long (10+
year) operating lifetimes of grid systems, it is critical to establish an evolvable
framework that supports software upgrades, patch management and critical
fixes over time. Tropos’ software-based approach is designed to be upgrade-
able to meet the evolving threat landscape as well as to meet the security
requirements of new security standards as they are developed.
9 | Tropos GridCom
Hardened physical router hardware
Tropos routers are ruggedized outdoor-optimized routers capable of
withstanding and continuing to operate in the face of a wide range of
challenging outdoor environmental conditions including high winds and
tornadoes, Category-5 hurricanes, high levels of humidity and salt/fog
conditions, extreme temperatures, lightning strikes and power surges. Tropos
router hardware has a demonstrated mean time between failure (MTBF) of
over 30 years.
MAC address whitelists and blacklists can be created and administered from
the Tropos Control network management system. Tropos Control centrally
manages whitelists and blacklists and provisions them onto Tropos routers.
Because hackers can spoof the MAC address of a valid endpoint, MAC
address-based authentication should not be the only mechanism used, but
can be an effective element in a layered security architecture.
10 | Tropos GridCom
Tropos routers can filter traffic at the edge of the wireless networks using
filters based on IP source and destination addresses, protocol and TCP/
UDP ports. This means that access can be controlled by application and by
protocol, as well as by endpoint. These policies are enforced at the edge of
the wireless network.
SSID suppression
IEEE 802.11 access points typically broadcast their service set identifier
(SSID) (their network name) to allow client devices to discover the network.
However, for a private network, that is, one where access is limited to a
specified set of users who already know of its existence, SSID broadcast is
undesirable because it announces the network’s availability to unauthorized
persons.
Physical deterrents
Tropos routers are physically hardened and contained within an opaque
commercial-grade environmental casing. They are equipped with indicators
that provide evidence of tampering if any occurs. Further, a variety of
software alarms sent to the Tropos Control Network Management System
can alert network operators if any physical tampering takes place. Tropos
routers also include additional protections such as an encrypted file-system
to guard and protect sensitive stored data.
11 | Tropos GridCom
Tropos 7320 Tropos 6320/6310 Tropos 4210
FIPS 140-2
Tropos routers are FIPS 140-2 compliant. FIPS-approved cryptographic
algorithms are used including AES CBC, AES CCM, SHA-1, RSA, and
Triple-DES CBC Auth-entication techniques used include strong passwords,
WPA-PSK and EAP-TLS, all with a less than 1/1014 probability of success
for a random password/key guess. Cryptographic keys are stored securely
on an encrypted filesystem on-board the routers and all management
of the routers including key generation, distribution and management is
performed using FIPS-approved techniques. The routers comply with FIPS
requirements for zeroization of keys and other critical security parameters
and various self-tests including software and firmware integrity checks.
12 | Tropos GridCom
WPA2 encryption for client-to-mesh router links
In addition to providing access control via standardized authentication
mechanisms, WPA2 also defines encryption between wireless endpoints
and the access point or mesh router using AES ciphers. These provide for
dynamic per-user encryption keys that are derived per-session as part of a
key negotiation process. Tropos routers support 128-bit AES encryption.
WPA2 is necessary but not sufficient to ensure secure end-to-end
transmission. Encryption of mesh traffic is also required (see below)
End-to-end VPNs
To provide the highest levels of security, Tropos recommends the use
of industry-tested VPNs and end-to-end security mechanisms including
those based on SSL and IPsec. VPNs are very challenging or impossible to
overcome even when attacked by serious and sophisticated adversaries.
Building on the lower layer methods we’ve already discussed, Tropos routers
combine unique VPN compatibility and traffic filtering with industry-leading
VPNs.
13 | Tropos GridCom
Using this functionality, a single physical infrastructure can be used to set
up multiple virtual network infrastructures offering different authentication
methods and policies for different applications and user groups. Each SSID/
VLAN combination acts as a separate virtual network that is segregated
from the other SSID/VLAN combinations through an amalgam of physical
and network layer separation mechanisms, including distinct authentication
profiles.
The use of multiple SSIDs mapped to distinct VLANs is one of the most
prevalent and industry-standard building blocks for a secure multi-use
wireless IP mesh network. Beyond security, QoS policies implemented
across multiple VLANs/SSIDs can also be used to ensure that delay-sensitive
applications such as distribution automation receive access precedence and
reserved bandwidth.
14 | Tropos GridCom
Secure mesh router configuration
In addition to configuration via Tropos Control, Tropos routers can be
configured and monitored by a web-based configurator. All configurator
traffic is protected with HTTPS. Network administrators can securely monitor
and configure individual routers from anywhere on the core network. Login is
provided by a certificate-based authentication scheme that can support up
to 20 authorized users. As with Tropos Control, all changes made using the
configurator are logged, providing an audit trail.
FIPS 140-2
The Tropos Control network management system is FIPS 140-2 Level
1 certified, and meets the FIPS requirements for secure storage and
transmission of critical security parameters, identity-based and role-based
authentication of network management users, etc. TLS with AES and RSA
key generation is used to secure communications between Tropos Control
and Tropos routers.
Conclusion
The evolution of the power grid of today into a smart grid will involve the
expansion and integration of advanced communications and information
technology into all aspects of utility operations. One of the key consider-
ations in pursuing this goal is ensuring cybersecurity. Tropos’ GridCom secu-
rity architecture based on the principles of adaptability, open standards and
multi-layer defense strategies provides granular and flexible security policies
to support multiple classes of applications and endpoints and allows the
creation of a highly secure common distribution area networking infrastruc-
ture to support diverse smart grid applications.
15 | Tropos GridCom
Appendix A: NERC CIP 002-009 compliance table (applicable
requirements)
CIP-002-2
Critical Cyber Asset
Identification
CIP-004-2 R4: Access (R4.1, R4.2) Individual user accounts and passwords
Personnel and Training Role-based authentication tied to RADIUS
Access allowance and revocation controls
CIP-006-2
Physical Security of
Critical Cyber Assets
CIP-007-2 R2: Ports and services (R2.1, R2.2) Firewall/VPN packet filtering rulesets to block/permit specific
Systems Security R3: Security patch management ports and services
Management R5: Account management Security Advisories and Fixes released
(R5.12, R3) Secure remote upgrade capability
R6: Security status monitoring Role-based authentication tied to RADIUS
(R6.1, R6.2, R6.3) Monitoring and logging of authorized access and unauthorized
access attempts
Audit trails of user account access activity and configuration changes
Enforcement of strong passwords
Detection and reporting of security-related events (failed
login attempts, denial of service attacks, evil twins, etc.)
Automated alerts on security-related events
CIP-008-2 R2: Cyber security incident Monitoring and logging of authorized access and
Incident Reporting documentation unauthorized login attempts
and Response Planning Detection and reporting of security-related events (failed
login attempts, denial of service attacks, evil twins, etc.)
Audit trails of user account access activity and configuration changes
CIP-009-2
Cyber Security — Recovery
Plans for Critical Cyber
Assets
16 | Tropos GridCom
Appendix B: Summary of FIPS 140-2 security requirements
Cryptographic Required and optional interfaces. Specifications Data ports for unprotected critical security
Module Ports of all interfaces and of all input and out parameters logically or physically separated from
and Interface data paths. other data ports.
Finite State Model Specification of finite state model. Required states and optional states. State transition diagram and
specification of state transitions.
Physical Security Production grade Locks or tamper Tamper detection and Tamper detection and
equipment. evidence. reponse for covers and envelope. EFP or
doors. EFT.
Operational Single operator. Exe- Referenced PPs evalu- Referenced PPs plus Referenced PPs plus
Environment cutble code. Approved ated at EAL2 with trusted path evaluated trusted path evaluated
integrity technique. specified discretionary at EAL3 plus security at EAL4.
access control mech- policy modeling.
anisms and auditing.
Cryptographic Key management mechanisms: random number and key gereation, key establishment, key
Key Management distribution, key entry/output, key storage, and key zeroization.
Secret and private keys established using manual Secret and private keys established using manual
methods may be entered or output in plaintext methods shall be entered or output encrypted
form. or with split knowledge procedures.
EMI/EMC 47 CFR FCC Part 15, Subpart B, Class A (Business use). 47 CFR FCC Part 15, Subpart B, Class B (Home use).
Applicable FCC requirements (for radio).
Self-Tests Power-up tests: cryptographic algorithm test, software/firmware integrity tests, critical functions tests.
Conditional tests.
Design Assurance Configuration man- CM system. Secure High-level language Formal model. Detailed
agement (CM). Secure distribution. Functional implementation. explanation (informal
installation and gen- specification. proofs). Preconditions
eration. Design and and postconditions.
policy correspondence.
Guidance documents.
Mitigation of Specification of mitigation of attacks for which no testable requirements are currently available.
Other Attacks
17 | Tropos GridCom
References
1. Michael Assante, Vice President and Chief Security Officer, NERC, Letter
to Industry Stakeholders,
http://www.nerc.com/fileUploads/File/News/CIP-002-Identification-Let-
ter-040709.pdf
2. NERC Critical Infrastructure Protection Standards CIP 002-009,
1KHA - 001 242 - SEN - 1001 - 10.2012 © Copyright 2012 ABB. All rights reserved.
http://www.nerc.com/page.php?cid=2|20
3. Guidelines for Smart Grid Cybersecurity, NIST Internal Report 7628,
http://csrc.nist.gov/publications/PubsNISTIRs.html
4. ‘Security Requirements for Cryptographic Modules’, Fed-
eral Information Processing Standards Publication FIPS 140-2,
http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
ABB Inc.
Tropos Wireless Communication Systems
555 Del Rey Avenue
Sunnyvale, CA 94085
Phone: +1 408.331.6800
E-Mail: [email protected]
www.abb.com/tropos