April 2018

Daikin Integration to BACnet, Modbus, KNX, WIFI, Mobile Apps

(Click Message to Learn More)

Securing the Edges of the IOT

In cyberspace, you no longer know who your friends and enemies are.

Toby ConsidineToby Considine
TC9 Inc

The New Daedalus

Contributing Editor

New Products
Site Search
Distech Controls
Past Issues
Reliable Controls
Control Solutions, Inc
Another day, another hack of the IOT (Internet of Things) in the news. This week there were Micrologix 1400 vulnerabilities announced. The week before, CERT released a report of Russian hacking activity on the US power grid. The week before, a list of substantial AMD vulnerabilities relevant to the IOT was released. The obscurity we used to rely on in building controls is gone.

On campuses, we used to worry about bored students. Today there are organized criminal gangs. There have been cities whose power was held for ransom. A recent report stated that "34 separate nations have serious, well-funded cyber-espionage teams targeting friends and foes alike." In cyberspace, you no longer know who your friends and enemies are.

Cloud-based IOT is growing security identity requirements beyond operational capabilities. A key first component of security is knowing who is on the other side of communications. Traditionally, this has relied on installing 3rd party certificates at each end of a conversation. Many IoT end nodes are on private networks and are unable contact certificate providers. (A certificate vouches for identity. Proper use of certificates should include checking with the issuer to see if a certificate has been revoked. An isolated system cannot contact the certificate issuing authority without itself becoming less secure.) California ISO has identified changing and updating certificates on the limited numbers of substations they communicate with as a constant source of risk. The local engineer is often not even aware of the certificates when CAISO calls to remind them it is s time for them to be renewed.

Many leading-edge building control systems are growing into multi-computer systems. These autonomous networks rely on far more network protocols than does the traditional BACnet or SCADA system. The required protocols range from low-level time protocols (NTP) to directory services (LDAP or Active Directory) to system management interfaces. These protocols may be insecure variants that require certificates, i.e., LDAPS, once again creating additional costs of ownership. Security personnel must know each of these interactions to configure the modern corporate firewall. Often, far too often, it can take months to get a full catalogue of this information from the developer or vendor.

Data is a growing barrier to integrating the IOT. IOT data appears very small. The actual requirements of network hand-shaking, of security negotiations, and of routable transmission of packets means that data logging in the clouds rapidly consumes more bandwidth than anticipated. Periodic batch processing of data greatly reduces the communication requirements. Intelligent local processing, including artificial intelligence (AI) techniques, can preserve timely response while only sending unscheduled data when it is useful.

Local data storage requires local databases, which create whole new problems. The problem with local data storage is that it requires local databases. A local database is another system to patch, to secure, and to manage. Local data may document contract performance or system compliance. Local data may be lost when a system fails, and, in the IOT, is likely not to be backed up.

The Purdue model of Computer Integrated Manufacturing (CIM) has long provided the canonical model for Industrial IOT (IIOT) security. That model does little to address the issues of things interacting over wide areas. At NREL, Erfan Ibrahim’s group described a Systematic Security Architecture for Grid Integration that defines the requirements for modern wide-area integration. The reference implementation requires considerable knowledge and detail work to scale to very large systems.

Reliable ControlsSo more points, more security, more data integrity are required with fewer personnel and less work per node.

Artificial intelligence is part of the answer. Sensors and systems will be able to learn the identity of their peers. These identities will replace the Certificates used today. Identities, rights, and interactions will be stored in local databases. Even the right to access the network will be based on these identities.

The databases will use the technologies behind the cryptocurrencies, like Bitcoin, or more properly the cryptoassets. The cryptoasset technologies that will win will be distributed, so the loss of one or more systems will not cause the loss of data. The multi-system hashing that provides “proof of work” for cryptoassets, will track the interactions and telemetry that will be used in regression analysis by AI agents. If a remote party needs to share that data or to see proof of performance, then that data will be requested from the immutable cryptoasset data store.

The only cryptoassets that will thrive in this environment are those that do not require the cloud to operate—for writing crypto-transactions to the cloud will provide merely a less performant and more important cloud database. They will be self-assembling, and able to adapt to system participation changes over time. Where today’s cryptoassets are designed to work hard, to limit coin generation, these future cryptoassets will user lighter weight models in which systems as small as a Raspberry Pi will participate easily.

And they will, of course, be open source, both to enable wide multi-party adoption, and because no one will trust their security if they are not.


The S4 Group
[Click Banner To Learn More]

[Home Page]  [The Automator]  [About]  [Subscribe ]  [Contact Us]


Want Ads

Our Sponsors