Industrial wireless applications are being used more and more by leading manufacturers and operators to improve availability and reduce costs. That sounds great, but before considering it for your facility, you might be wondering how difficult it is to make sure industrial wireless networks are secure.
The good news is that the best practices, technologies and products available now make it straightforward for engineering teams to implement wireless applications securely.
This two-part article explains how a Defense in Depth approach, combined with WLAN protection and detection strategies, work together for secure wireless network design.
Protection strategies are an important part of a Defense in Depth approachto industrial wireless security.
Defense in Depth is Critical for ICS Security
Wireless applications are no different that wired applications when it comes to an essential ICS security best practice – Defense in Depth (DiD). DiD is a holistic approach that is built on three core concepts:
- Multiple layers of defense: A variety of security solutions are used so if one layer is bypassed, another will provide the needed defense.
- Differentiated layers of defense: Each security layer is slightly different so an attacker can?t automatically get through all layers of defense.
- Threat-specific layers of defense: Each defense is designed for the specific context and threat, allowing protection based on the behavior and context of the systems using these protocols.
Whether a threat is an accidental internal incident or a deliberate external attack, a DiD approach will detect, isolate and control it. The wireless defense strategies outlined in the rest of this article series work together to provide the layers of protection needed to make sure your WLAN is secure.
Protection Technique #1 –Utilize IEEE 802.11i, WPA2 and VLANs
A challenge with WLAN transmission paths is that they can broadcast outside a company’s property boundaries. Thus attackers don?t need direct, physical access to an industrial network in order to interfere with its operation and capture critical and confidential information.
That sounds scary, but in fact industry cooperation has led to standards, IEEE 802.11i / WPA2, that protect the confidentiality and integrity of wireless data. All current products on the market must comply with these standards, ensuring that control system communications are authentic and that attackers cannot extract sensitive data.
In regards to WPA2, be sure to implement its Enterprise mode for strong device authentication. Unlike personal networks, WPA2 (Enterprise mode) provides different keys for different devices, with the keys managed in a central database such as RADIUS. Lost or stolen devices can be disconnected from the network simply by removing their information from the database.Furthermore, with WPA2 (Enterprise mode), individual devices can be assigned to different virtual LANs (VLANs) so that devices with different roles can be clearly differentiated. This segmentation makes it difficult for an attacker to gain further access to a network should a single device be compromised – an example of DiD.
Protection Technique #2 – Apply Protected Management Frames
Another aspect of wireless communications that you want to protect is management frames. These are network packets that organize the internal operation of the network and they are exceptionally vulnerable to forgery and wiretapping.
Devices use management frames to log on and off the network, initiate new key exchanges and report when they roam from one access point to another. Information can be captured from wiretapped management frames, and forged management frames can be sent out with a wrong sender identity. An attacker can disrupt the operation of the network by disconnecting a victim device from the network.
To combat such attacks, Protected Management Frames (PMF) encrypt and protect management frames against forgery. They extend the mechanism for authentication and encryption present in WPA2 to management frames. By using products with the PMF capability you make it impossible for misused management functions to attack a network.
Protection Technique #3 – Limit Communication Using Firewalls
Even the most effective WLAN encryption doesn't offer protection when a security incident originates inside the network. But, by selectively limiting communication to only what is required to run the industrial application, you establish additional barriers that limit the impact of internal attacks.
This type of limitation is another Defense in Depth mechanism that considerably increases the all-around security of a network. Tried- and-true strategies for limiting communication within the network are:
- Protect WLAN data by implementing a configurable Layer 2 firewall at the Ethernet level. To do this you need to make sure you are using Access Points with a built-in Layer 2 firewall. The best ones can filter routed and bridged traffic as well as packet filter traffic between WLAN clients.
- Apply stateful Deep Packet Inspection (DPI) to secure protocols. After the Layer 2 firewall rules are applied, the DPI firewall inspects the content of the contained messages and applies more detailed rules. For example, a Modbus DPI firewall can determine if the Modbus message is a read or a write message and then drop all write messages. Good DPI firewalls can also “sanity check” traffic for strangely formatted messages or unusual behaviors.
Be aware that Deep Packet Inspection is sometimes known by other terms, such as content inspection or protocol whitelisting. It is not a widely available capability; our Tofino Security product line is one of the few out there with the capability.
Protection is a Key Strategy for Securing Industrial Wireless Applications
Industrial wireless benefits such as improved uptime, reduced costs, faster and more accurate data collection are readily achievable today. Protecting data, devices and the control network is possible using the techniques described in this article.
- All new wireless products comply with IEEE 802.11i and WPA2 for data confidentiality and integrity. Check any wireless currently in use to make sure they comply with these two standards. If you have products that support the predecessor to WPA2, which is WEP, your network is at risk.
- Use WPA-enterprise mode for authentication of individual wireless devices.
- Implement VLANs to segment the network, restricting the impact of device compromise to a subsection of the control network
- Use products with Protected Management Frames (PMF) capability and make sure it is enabled
- Limit communication between WLAN clients to specific peers or protocols using a Layer 2 firewall built-in to Access Points
- Further protect key production cells or critical equipment using a DPI firewall
Our next article will examine the second pillar of secure wireless network design – anomaly detection strategies.
Are you using wireless communication for applications in your facility? Why or why not? I look forward to hearing from you.
This article is based on the White Paper “A Construction Kit for Secure Wireless” written by Dr. Tobias Heer. Dr. Heer is the manager of embedded software development and functions for our Hirschmann industrial networking group.
Industrial Wireless Resources
- Website: Belden Industrial Wireless Overview
- Blog: Industrial Wireless Network Design for Mobile ICS Monitoring
- Blog: Realize IIoT Benefits with Industrial Wireless Technology
- White Paper: Selecting the Right Antenna for Industrial Wireless Applications
- White Paper: Parallel Redundancy Protocol Notably Improves Industrial Wireless Reliability
Belden Products for Secure Industrial Wireless
- YouTube video: Hirschmann OpenBAT-R: Wireless Industrial Ethernet Solutions
- Webpage: Hirschmann BAT Wireless Solutions
- Webpage: Hirschmann Operating Software for WLANs (HiLCOS)
- Product Bulletin: Hirschmann ClearSpace and ESD Protection
- Webpage: Tofino Xenon Industrial Firewall
- Product Bulletin: Tofino Modbus TCP Enforcer Loadable Security Module
Industrial Cyber Security Resources