Vertical Integration 13-9
As. the.timeline.in. Figure. 13.2.shows,. most.of. these. developments. were. concluded.long. before.the.
Internet.became.known.and.was.widely.employed.by.the.broad.public..It.is.thus.no.wonder.that.security.
considerations.never.played.a.prominent.role.in.automation.before.the.end.of.the.1990s.[D97,PS00].
e
.most.promising.approach.to.cope.with.the.heterogeneity.of.the.networks.is.a.hierarchical.security.
model.following.the.defense-in-depth.approach..Figure.13.6.shows.the.three.typical.interconnection.
zones.in.the.company.network..e.zones.are.separated.from.each.other.by.dedicated.network.nodes.
that.can.be.used.as.anchor.points.for.the.security.strategy..e.inner.connection.node.(access.point).to.
the.actual.eldbus.is.the.gateway.or.proxy.already.discussed.in.Section.13.3.
As
.existing.standards.cannot.be.changed,.the.only.viable.option.for.the.eld.level.is.to.use.the.eld-
bus
.simply.as.a.transport.channel.and.to.tunnel.secure.packets.over.standard.eldbus.protocols.and.
services.[SS02]..Such.an.application-level.approach.could.easily.achieve.end-to-end.security,.which.is.
desired.in.most.applications,.anyway..Unfortunately,.it.is.likely.to.cause.problems.with.interoperability.
unless.all.nodes.in.the.network.adhere.to.this.enhanced.standard,.i.e.,.a.mixture.of.secure.and.insecure.
devices.would.normally.not.be.feasible..In.addition,.the.limited.messages.size.in.some.eldbuses.leaves.
only.little.room.for.the.additional.data.blocks.required.by.ecient.security.extensions..is.problem.is.
similar.to.the.one.encountered.in.IP.tunneling.discussed.in.Section.13.3.
e
.access.point.itself.has.so.far.been.the.focal.point.of.interest.for.most.researchers..Given.the.lack.
of.general.eld-level.security,.it.is.the.only.part.of.the.automation.system.(apart.from.the.Internet.side).
where.security.can.easily.be.applied..One.very.common.approach.is.to.combine.the.access.point.with.a.
rewall,.which.is.the.most.widely.employed.security.measure.in.the.design.of.network.interconnections.
today.even.in.the.eld.of.automation.[D97]..Indeed,.the.term.“rewall”.is.nowadays.frequently.used.as.a.
synonym.for.network.security..In.practice,.however,.their.application.is.not.so.straightforward..Owing.
to.the.inherently.asymmetric.operation.of.a.rewall.(transparent.from.the.private.network,.opaque.
from.outside),.it.is.dicult.to.place.a.standard.rewall.in.front.of.a.eldbus.access.point;.it.is.better.to.
tightly.integrate.the.rewall.into.the.access.point.and.use,.e.g.,.port.forwarding.to.control.the.trac.
[PS00]..On.top.of.this,.the.access.point.is.also.the.ideal.point.to.control.and.manage.access.to.the.eldbus.
zone..A.suitable.model.for.handling.access.rights.is.role-based.access.control,.where.all.communication.
partners.(users,.devices,.tools).are.associated.with.particular.roles.depending.on.the.context.of.the.data.
exchange..In.the.IT.world,.this.concept.is.widely.employed,.and.it.can.also.be.used.in.an.automation.
context.[WB04].
Security
.in.the.Internet.nally.is.a.well-researched.topic.with.a.large.number.of.meanwhile.very.
mature.solutions..In.fact,.for.nearly.all.Internet.application.layer.protocols,.secure.versions.exist,.or.
conventional.insecure.protocols.can.be.used.on.top.of.a.secure.transport.layer..is.standard.mecha-
nism
.of.rst.establishing.an.encrypted.channel.between.communication.partners.is.called.Transport.
Internet
Intranet
Fieldbus
AP
Firewall, network address translation
Firewall, role-based access
Reduced security, proprietary solutions
Controlled access (maintenance staff)
Frequent, automated attacks (port scans)
Standard IT solutions: VLANs, SSH, TLS
Main threat: malicious software
Restricted, controlled user group
FIGURE 13.6 Defense-in-depth.security.model.for.vertically.integrated.company.networks.
© 2011 by Taylor and Francis Group, LLC