1 / 16

Critical Infrastructure Protection Cristina Alcaraz

Critical Infrastructure Protection Cristina Alcaraz. Department of Computer Science University of Málaga Málaga (Spain). What do we have around us ?. What do we have around us ?. What do we have around us ?. What do we have around us ?. What do we have around us ?.

raziya
Download Presentation

Critical Infrastructure Protection Cristina Alcaraz

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Critical Infrastructure Protection Cristina Alcaraz Department of Computer Science University of Málaga Málaga (Spain)

  2. What do we have around us ?

  3. What do we have around us ?

  4. What do we have around us ?

  5. What do we have around us ?

  6. What do we have around us ? We need protection andcontrol mechanismson failures and threats

  7. How can we protect and control our CIs ?

  8. Through SCADA Systems and Sensor Networks • Same control services as a wired infrastructures but with low installation and maintenance costs • Same functionalities as an RTU – new alternative for the control • Autonomous, smart and independent systems New industrial perspectives and new communication standards, such as: ZigBee PRO, WirelessHART, and ISA100.11.a

  9. SCADA Systems and Sensor Networks

  10. SCADA Systems and Sensor Networks ZigBee PRO WirelessHART ISA 100.11a They have been specified to ensure energy saving, coexistence with other communication systems, communication reliability and security IEEE 802.15.4-2006 2,4GHz a 250kbps/868-915MHz a 20kbps, 15 canales de transmisión, AES-128bits + MAC/MIC, ACL Services: security at link level and transport level, 6LowPAN+ WHARTSecurity: GK, JK, MK, LK, SKm + MIC Application: Industrial Services: TDMA/CSMA, frequencyhopping, blacklisting, redundantpaths, diagnostic,…Security: KPub, KJoin, KN, KS + MIC (CCM*, AES-128bits + Cpub/Cred + nounce) Application: Industrial Services: Stochasticaddressing, routeaggregation, sourcerouting, frequencyagilitySecurity: MK, LK, NK + SKKEApplication: Commercial & industrial

  11. But, is the communication really secure and reliable for monitoring CIs?

  12. Security Analysis Routing over low power and lossy (ROLL) networks – Tsao et al.

  13. Security Analysis Most attacks are launched by malicious authorized insiderswho know the inherent vulnerabilities of the system

  14. Security Analysis Most attacks are launched by malicious authorized insiders who know the inherent vulnerabilities of the system It can also be observed that the three standards can receive the same attacks on the confidentiality ZigBee PRO and WirelessHART receive the same attacks networks on the integrity WirelessHART and ISA100.11a are slightly more vulnerable to denial of services attacks

  15. Where are we working right now ?

  16. Actual Motivation - Overview Control of Cascade Effect -Early Warning Systems Security inSmart Grids

More Related