In 2010, the whole industrial automation world was stirred by the sudden appearance of the now infamous Stuxnet malware. In 2011 there were more publicly disclosed vulnerabilities than in the previous decade, with attack code readily available for more than a third of them. The need for improved cyber security for industrial networks has never been more apparent. Besides this targeted need, however, there is another reason why cyber security technology like Tofino is needed. That reason is the broader need for reliable networks that are used in mission-critical applications.


Good food paired with good wine brings out the sublime qualities of both.

Industrial Ethernet Pervades Modern Life

Let me explain this by pausing to consider the stunning number of places where Industrial Ethernet is used in today’s society, often hidden in plain view. For example, in things you may come across or interact with on a daily basis, such as traffic lights. You likely don’t think “Industrial Ethernet” when stopped at a red light. That is a good thing, because it means that the Ethernet and IP technology is getting the job done properly! If it wasn’t you would certainly have already noticed.

The reliability of traffic systems is mostly due to the fact that the switches being used are designed for rugged environments, e.g. with a wide range of operating temperatures and with special resistance to strong electromagnetic fields or vibration. This is very different to the switches you can buy at an electronics store for your home network.

In addition to that, the switches also implement special redundancy protocols that help to recover from errors in the network, e.g. the Parallel Redundancy Protocol (PRP) or the Media Redundancy Protocol (MRP). If, for example, an excavator accidentally damages a cable, the switches will automatically compensate. Great, but what does this have to do with security?

In a nutshell, industrial ruggedized networks are tough to bring down. But remember the story of David and Goliath? Even the strongest giant can be defeated with just a small pebble, if it is used correctly. That is where cyber security comes into play.

Fault Tolerance and Cyber Security: Separate Design Considerations?

When I talk to experts who design mission-critical networks, e.g. for power utility or industrial automation systems, fault tolerance and security are usually addressed independently. Totally separate solutions are developed and implemented. Since fault tolerance is generally used to increase the resilience of the network, and security is usually implemented to prevent unauthorized network access, this seems to be a prudent course of action. Or is it?

Implementing fault tolerant networks increases the total network availability because the network can automatically reconfigure to compensate for media or device failure. Security increases the total network availability because it protects from any downtime caused by a cyber attack or network incident.

In addition to that, security technology protects redundant systems from attackers tampering with their protocols and the redundancy technology assures that the secure systems are still available, even after physical failure or a physical attack.


Figure 1: This network is protected by redundant systems, but the protocols used for redundancy could be the target of a cyber attack, if the security appliances were not present.

Instead, no matter where the master link fails, the security appliance passes through the fail status and the redundant link takes over. The result is high availability for a mission critical network.


Figure 2: Summary of Fault Tolerance and Cyber Security Design Elements for High Availability Networks.

Pairing Fault Tolerance and Cyber Security – Ah, just like Good Food with Good Wine!

In the future, network architects will have to rethink their traditional design approach because security and fault-tolerance are interdependent elements of high availability networks.


Plus, just like how good food paired with the right wine brings out the sublime quality of both, a design paradigm that includes both elements takes high availability mission-critical networks to a whole new level.

For more information on the state of industrial fault tolerance technologies, see the White Paper available at the end of this article. For more information on the state of cyber security, see previous Practical SCADA Security blog posts.

Are you a forward thinking network engineer who is designing mission-critical networks for both high redundancy and high security? Or, perhaps your organization is not advanced in one or both of these areas. Let me know your thoughts on pairing high redundancy with high security to achieve high availability.

Related Links

• Webpage: Byres Security Joins Belden
• Webpage: Tofino Product Overview
• Blog: Factory of the Future meets Stuxnet’s Children: Egad!
• Blog: Defense in Depth is Key to SCADA Security – Part 1 of 2
• Blog: Defense in Depth is Key to SCADA Security – Part 2 of 2

New call-to-action

This article is adapted from a Practical SCADA Security blog post at

© Byres Security Inc. 2012 | All Rights Reserved | Byres Security is part of Belden® Hirschmann™