10
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations. Modbus is an application protocol that allows communication between millions of automation devices. Unfortunately, Modbus lacks basic security mechanisms, and this leads to multiple vulnerabilities, due to both design and implementation. This issue enables certain types of attacks, for example, man in the middle attacks, eavesdropping attacks, and replay attack. The exploitation of such flaws may greatly influence companies and the general population, especially for attacks targeting critical infrastructural assets, such as power plants, water distribution and railway transportation systems. In order to provide security mechanisms to the protocol, the Modbus organization released security specifications, which provide robust protection through the blending of Transport Layer Security (TLS) with the traditional Modbus protocol. TLS will encapsulate Modbus packets to provide both authentication and message-integrity protection. The security features leverage X.509v3 digital certificates for authentication of the server and client. From the security specifications, this study addresses the security problems of the Modbus protocol, proposing a new secure version of a role-based access control model (RBAC), in order to authorize both the client on the server, as well as the Modbus frame. This model is divided into an authorization process via roles, which is inserted as an arbitrary extension in the certificate X.509v3 and the message authorization via unit id, a unique identifier used to authorize the Modbus frame. Our proposal is evaluated through two approaches: A security analysis and a performance analysis. The security analysis involves verifying the protocol’s resistance to different types of attacks, as well as that certain pillars of cybersecurity, such as integrity and confidentiality, are not compromised. Finally, our performance analysis involves deploying our design over a testnet built on GNS3. This testnet has been designed based on an industrial security standard, such as IEC-62443, which divides the industrial network into levels. Then both the client and the server are deployed over this network in order to verify the feasibility of the proposal. For this purpose, different latencies measurements in industrial environments are used as a benchmark, which are matched against the latencies in our proposal for different cipher suites.

          Related collections

          Most cited references35

          • Record: found
          • Abstract: not found
          • Article: not found

          An experimental investigation of malware attacks on SCADA systems

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Attack taxonomies for the Modbus protocols

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Guide to industrial control systems (ICS) security

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                14 October 2019
                October 2019
                : 19
                : 20
                : 4455
                Affiliations
                [1 ]Ceit, Manuel Lardizabal 15, 20018 Donostia/San Sebastián, Spain sarrizabalaga@ 123456ceit.es (S.A.)
                [2 ]Universidad de Navarra, Tecnun, Manuel Lardizabal 13, 20018 Donostia/San Sebastián, Spain
                Author notes
                [* ]Correspondence: sfigueroa@ 123456ceit.es ; Tel.: +34-943-213076 (ext. 2910)
                Author information
                https://orcid.org/0000-0002-5687-1927
                https://orcid.org/0000-0003-3799-1410
                Article
                sensors-19-04455
                10.3390/s19204455
                6832255
                31615147
                d6eb1af9-6e36-4a47-9706-000959e47a5f
                © 2019 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 15 August 2019
                : 11 October 2019
                Categories
                Article

                Biomedical engineering
                modbus,rbac,access control,authentication,authorization,iiot,operational technologies (ot)

                Comments

                Comment on this article