SlideShare a Scribd company logo
BACnet/SC:
A “Secure” Alternative to
BACnet/IP
Jim Butler
Cimetrics Inc.
About Cimetrics
• BACnet communication products (since 1995)
• BACnet protocol stacks
• Routers, gateways, meter interfaces, …
• Building system analytics (since 2000)
• FDD software (SaaS)
• Professional services
2
BACnet/IP Overview
• Widely used BAS backbone network protocol
• Published in 1999
• Employs UDP for communication on TCP/IP networks
• Static IP addresses are typically used
• DNS is not used
• Can easily span multiple IP subnets
• … but the management of broadcast messages can be tricky in practice
• Can be used in a NAT environment, but not easily
3
Securing BACnet/IP networks
• BACnet/IP has no native security features!
• Common ”secure” deployment options:
• Physically separate BAS network
• Dedicated VLAN(s) or VPN for BAS
4
IP Router
D1 D2 D3 D4
IP Subnet A IP Subnet B
BBMD A BBMD B
6
A Simple BACnet/IP Network
7
IP Router
D1 D2 D3 D4
IP Subnet A IP Subnet B
BBMD A BBMD B
D5
IP Subnet C
Foreign Device
BACnet/IP Foreign Device Registration
8
IP Subnet A IP Subnet B
BBMD A BBMD B
D5
IP Subnet C
Foreign Device
BACnet/IP Broadcast Message Forwarding
99
IP Subnet A IP Subnet B
BBMD A BBMD B
D5
IP Subnet C
Foreign Device
BACnet/IP Broadcast Message Forwarding
IP Subnet D
BBMD D
BBMD E
IP Subnet E
BBMD F
IP Subnet F
101010
IP Subnet A IP Subnet B
BBMD A BBMD B
D5
IP Subnet C
Foreign Device
BACnet/IP Broadcast Message Forwarding
IP Subnet D
BBMD D
BBMD E
IP Subnet E
BBMD F
IP Subnet F
1212121212
IP Subnet A IP Subnet B
BBMD A BBMD B
D5
IP Subnet C
Foreign Device
BACnet/IP Broadcast Message Forwarding
IP Subnet D
BBMD D
BBMD E
IP Subnet E
BBMD F
IP Subnet F
131313131313
BACnet/IP and Network Address
Translation (NAT)
IP Router
with NAT
BACnet
BBMD/Router IP Router
with NAT
BACnet
BBMD/Router
Private IP Network B
Private IP Network A
D1 D2
D3 D4
“Public” IP Network
BACnet/SC Overview
• A “secure” BACnet option for TCP/IP networks
• Will improve network security in any deployment scenario
• Not yet finalized!!!
• Backward-compatible with existing BACnet deployments and devices
• Built on standard IT network protocols: WebSockets and TLS 1.2+
• NAT and firewall friendly
• Static IP addresses are not required
• No more UDP broadcasts and BBMDs
14
What is “secure” about BACnet/SC?
• Encrypted communication (TLS)
• Site-based authentication of devices (TLS)
• New: Carrier for user authorization data (OAuth 2)
15
16
BACnet/SC Logical Network Topology
PP
PP BACnet/SC Primary Hub
BACnet/SC Regular Node
hub connection
Fisher, Isler and Osborne (2018)
BACnet/SC hubs link devices
Peer-to-Peer Direct Connections
17
Fisher, Isler and Osborne (2018)
PP
optional direct connection
18
Hub redundancy
Fisher, Isler and Osborne (2018)
19
Secure communication on unsecure networks
Fisher, Isler and Osborne (2018)
The Facility
PP FF
BACnet/SC
devices
20
Remote access through firewall
Fisher, Isler and Osborne (2018)
21
Integration with “insecure” BACnet devices
Fisher, Isler and Osborne (2018)
Learn more about BACnet/SC
http://www.bacnet.org/Bibliography/B-SC-Whitepaper-
v10_Final_20180710.pdf
2019 ASHRAE Winter Conference: “Securing BACnet Networks: Present
and Future” (Seminar 47)
22
Takeaways
• BACnet/SC will be a “secure” alternative to BACnet/IP.
• BACnet/SC complements VLANs and other existing security methods.
• Security comes at a cost.
23
Backup Slides
24
25
Fisher, Isler and Osborne (2018)
26

More Related Content

What's hot

Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stackstuimrozsm
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
Bertrand Duvivier
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
Nishant Goel
 
Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)
Kanishk Raj
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
Vuz Dở Hơi
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
KHNOG
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
Alan Mark
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
JAIGANESH SEKAR
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
Parthipan Parthi
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
Adeel Rasheed
 
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2Network Troubleshooting - Part 2
Network Troubleshooting - Part 2
SolarWinds
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
Ameer Agel
 
VLAN
VLANVLAN
Route Redistribution
Route RedistributionRoute Redistribution
Route Redistribution
Netwax Lab
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
rajshreemuthiah
 
Vlans
VlansVlans
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
AIRTEL
 

What's hot (20)

VTP
VTPVTP
VTP
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
 
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2Network Troubleshooting - Part 2
Network Troubleshooting - Part 2
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
 
VLAN
VLANVLAN
VLAN
 
Route Redistribution
Route RedistributionRoute Redistribution
Route Redistribution
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Vlans
VlansVlans
Vlans
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
VTP
VTPVTP
VTP
 

Similar to BACnet/SC: A Secure Alternative to BACnet/IP

Is 2020 The Year Of Building Automation Cybersecurity?
Is 2020 The Year Of Building Automation Cybersecurity?Is 2020 The Year Of Building Automation Cybersecurity?
Is 2020 The Year Of Building Automation Cybersecurity?
Memoori
 
NAB2022: Essentials for Media over IP Network Design
NAB2022: Essentials for Media over IP Network DesignNAB2022: Essentials for Media over IP Network Design
NAB2022: Essentials for Media over IP Network Design
Koji Oyama
 
Networking hardware
Networking hardwareNetworking hardware
Networking hardware
Downloadssu Fullmaza
 
Day 17.1 nat pat
Day 17.1 nat pat Day 17.1 nat pat
Day 17.1 nat pat
CYBERINTELLIGENTS
 
Cradlepoint PS6S9000UE - USB to Ethernet Cradle (quantum-wireless.com)
Cradlepoint PS6S9000UE - USB to Ethernet Cradle (quantum-wireless.com)Cradlepoint PS6S9000UE - USB to Ethernet Cradle (quantum-wireless.com)
Cradlepoint PS6S9000UE - USB to Ethernet Cradle (quantum-wireless.com)
Ari Zoldan
 
A comparison of Segment Routing Data-Plane encodings
A comparison of Segment Routing Data-Plane encodingsA comparison of Segment Routing Data-Plane encodings
A comparison of Segment Routing Data-Plane encodings
Gunter Van de Velde
 
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lanละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
Vientiane, Laos
 
versa router teletronics
versa router teletronicsversa router teletronics
versa router teletronics
guestd33e17a
 
IP-Networks for Buses and Trams in Public Transport
IP-Networks for Buses and Trams in Public TransportIP-Networks for Buses and Trams in Public Transport
IP-Networks for Buses and Trams in Public Transport
JuriMartinevski
 
Manuale Router Sitecom Wl577
Manuale Router Sitecom Wl577Manuale Router Sitecom Wl577
Manuale Router Sitecom Wl577guest854c41d
 
FieldServer for OEM Overview
FieldServer for OEM OverviewFieldServer for OEM Overview
FieldServer for OEM Overview
Sierra Monitor Corporation
 
IBC 2014 - Broadcast Presentation
IBC 2014 - Broadcast PresentationIBC 2014 - Broadcast Presentation
IBC 2014 - Broadcast Presentation
Newtec
 
Cisco 1921 review why take it into top list while selecting cisco routers
Cisco 1921 review why take it into top list while selecting cisco routersCisco 1921 review why take it into top list while selecting cisco routers
Cisco 1921 review why take it into top list while selecting cisco routers
IT Tech
 
IBC2022: Tips for Media-over-IP Network Design
IBC2022: Tips for Media-over-IP Network DesignIBC2022: Tips for Media-over-IP Network Design
IBC2022: Tips for Media-over-IP Network Design
Koji Oyama
 
Module (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptxModule (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptx
GeorgeThoreJr
 
Cisco 1921 vs. cisco 1941 vs. cisco 2901
Cisco 1921 vs. cisco 1941 vs. cisco 2901Cisco 1921 vs. cisco 1941 vs. cisco 2901
Cisco 1921 vs. cisco 1941 vs. cisco 2901
IT Tech
 

Similar to BACnet/SC: A Secure Alternative to BACnet/IP (20)

Is 2020 The Year Of Building Automation Cybersecurity?
Is 2020 The Year Of Building Automation Cybersecurity?Is 2020 The Year Of Building Automation Cybersecurity?
Is 2020 The Year Of Building Automation Cybersecurity?
 
NAB2022: Essentials for Media over IP Network Design
NAB2022: Essentials for Media over IP Network DesignNAB2022: Essentials for Media over IP Network Design
NAB2022: Essentials for Media over IP Network Design
 
Networking hardware
Networking hardwareNetworking hardware
Networking hardware
 
Networking hardware (2)
Networking hardware (2)Networking hardware (2)
Networking hardware (2)
 
Networking hardware (2)
Networking hardware (2)Networking hardware (2)
Networking hardware (2)
 
Day 17.1 nat pat
Day 17.1 nat pat Day 17.1 nat pat
Day 17.1 nat pat
 
Cradlepoint PS6S9000UE - USB to Ethernet Cradle (quantum-wireless.com)
Cradlepoint PS6S9000UE - USB to Ethernet Cradle (quantum-wireless.com)Cradlepoint PS6S9000UE - USB to Ethernet Cradle (quantum-wireless.com)
Cradlepoint PS6S9000UE - USB to Ethernet Cradle (quantum-wireless.com)
 
A comparison of Segment Routing Data-Plane encodings
A comparison of Segment Routing Data-Plane encodingsA comparison of Segment Routing Data-Plane encodings
A comparison of Segment Routing Data-Plane encodings
 
Bb0060
Bb0060Bb0060
Bb0060
 
Bb0060
Bb0060Bb0060
Bb0060
 
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lanละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
ละบบเคธือข่ายควมพิวเตอเบื้่งต้น Lan
 
versa router teletronics
versa router teletronicsversa router teletronics
versa router teletronics
 
IP-Networks for Buses and Trams in Public Transport
IP-Networks for Buses and Trams in Public TransportIP-Networks for Buses and Trams in Public Transport
IP-Networks for Buses and Trams in Public Transport
 
Manuale Router Sitecom Wl577
Manuale Router Sitecom Wl577Manuale Router Sitecom Wl577
Manuale Router Sitecom Wl577
 
FieldServer for OEM Overview
FieldServer for OEM OverviewFieldServer for OEM Overview
FieldServer for OEM Overview
 
IBC 2014 - Broadcast Presentation
IBC 2014 - Broadcast PresentationIBC 2014 - Broadcast Presentation
IBC 2014 - Broadcast Presentation
 
Cisco 1921 review why take it into top list while selecting cisco routers
Cisco 1921 review why take it into top list while selecting cisco routersCisco 1921 review why take it into top list while selecting cisco routers
Cisco 1921 review why take it into top list while selecting cisco routers
 
IBC2022: Tips for Media-over-IP Network Design
IBC2022: Tips for Media-over-IP Network DesignIBC2022: Tips for Media-over-IP Network Design
IBC2022: Tips for Media-over-IP Network Design
 
Module (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptxModule (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptx
 
Cisco 1921 vs. cisco 1941 vs. cisco 2901
Cisco 1921 vs. cisco 1941 vs. cisco 2901Cisco 1921 vs. cisco 1941 vs. cisco 2901
Cisco 1921 vs. cisco 1941 vs. cisco 2901
 

More from Cimetrics Inc

BrodcastMinimizingTrafficBACnet.pptx
BrodcastMinimizingTrafficBACnet.pptxBrodcastMinimizingTrafficBACnet.pptx
BrodcastMinimizingTrafficBACnet.pptx
Cimetrics Inc
 
Cybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect Cimetrics
Cimetrics Inc
 
Cybersecurity Summit AHR20 Take Action BACnet International
Cybersecurity Summit AHR20 Take Action BACnet InternationalCybersecurity Summit AHR20 Take Action BACnet International
Cybersecurity Summit AHR20 Take Action BACnet International
Cimetrics Inc
 
Cybersecurity Summit AHR20 Recover Tridium
Cybersecurity Summit AHR20 Recover TridiumCybersecurity Summit AHR20 Recover Tridium
Cybersecurity Summit AHR20 Recover Tridium
Cimetrics Inc
 
Cybersecurity Summit AHR20 Detect KMC
Cybersecurity Summit AHR20 Detect KMCCybersecurity Summit AHR20 Detect KMC
Cybersecurity Summit AHR20 Detect KMC
Cimetrics Inc
 
Cybersecurity Summit AHR20 Identify Totem
Cybersecurity Summit AHR20 Identify TotemCybersecurity Summit AHR20 Identify Totem
Cybersecurity Summit AHR20 Identify Totem
Cimetrics Inc
 
Cybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework CimetricsCybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework Cimetrics
Cimetrics Inc
 
Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide Deck
Cimetrics Inc
 
What BACnet/SC can do to improve BAS cybersecurity, and what it won’t do
What BACnet/SC can do to improve BAS cybersecurity, and what it won’t doWhat BACnet/SC can do to improve BAS cybersecurity, and what it won’t do
What BACnet/SC can do to improve BAS cybersecurity, and what it won’t do
Cimetrics Inc
 
BACnet and Metering
BACnet and MeteringBACnet and Metering
BACnet and Metering
Cimetrics Inc
 
Analytika educational and research facility case study
Analytika educational and research facility case study Analytika educational and research facility case study
Analytika educational and research facility case study
Cimetrics Inc
 
Jefferson University Currents
Jefferson University CurrentsJefferson University Currents
Jefferson University Currents
Cimetrics Inc
 
BE A BTU HUNTER: How Big Data Analytics Can Achieve Energy and OM Savings Whi...
BE A BTU HUNTER: How Big Data Analytics Can Achieve Energy and OM Savings Whi...BE A BTU HUNTER: How Big Data Analytics Can Achieve Energy and OM Savings Whi...
BE A BTU HUNTER: How Big Data Analytics Can Achieve Energy and OM Savings Whi...
Cimetrics Inc
 
Bringing transparency to buildings.
Bringing transparency to buildings.Bringing transparency to buildings.
Bringing transparency to buildings.
Cimetrics Inc
 
IoT Affects BACnet How?
IoT Affects BACnet How?IoT Affects BACnet How?
IoT Affects BACnet How?
Cimetrics Inc
 
5 Benefits of BACnet Data In the Cloud
5 Benefits of BACnet Data In the Cloud5 Benefits of BACnet Data In the Cloud
5 Benefits of BACnet Data In the Cloud
Cimetrics Inc
 
BACnet/IP good field implementation practices
BACnet/IP good field implementation practicesBACnet/IP good field implementation practices
BACnet/IP good field implementation practices
Cimetrics Inc
 
BACnet at Cornell: 20+ Years of Lessons Learned
BACnet at Cornell: 20+ Years of Lessons LearnedBACnet at Cornell: 20+ Years of Lessons Learned
BACnet at Cornell: 20+ Years of Lessons Learned
Cimetrics Inc
 
New England BACnet Users Meeting
New England BACnet Users MeetingNew England BACnet Users Meeting
New England BACnet Users Meeting
Cimetrics Inc
 
Building a BACnet Product
Building a BACnet ProductBuilding a BACnet Product
Building a BACnet Product
Cimetrics Inc
 

More from Cimetrics Inc (20)

BrodcastMinimizingTrafficBACnet.pptx
BrodcastMinimizingTrafficBACnet.pptxBrodcastMinimizingTrafficBACnet.pptx
BrodcastMinimizingTrafficBACnet.pptx
 
Cybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect Cimetrics
 
Cybersecurity Summit AHR20 Take Action BACnet International
Cybersecurity Summit AHR20 Take Action BACnet InternationalCybersecurity Summit AHR20 Take Action BACnet International
Cybersecurity Summit AHR20 Take Action BACnet International
 
Cybersecurity Summit AHR20 Recover Tridium
Cybersecurity Summit AHR20 Recover TridiumCybersecurity Summit AHR20 Recover Tridium
Cybersecurity Summit AHR20 Recover Tridium
 
Cybersecurity Summit AHR20 Detect KMC
Cybersecurity Summit AHR20 Detect KMCCybersecurity Summit AHR20 Detect KMC
Cybersecurity Summit AHR20 Detect KMC
 
Cybersecurity Summit AHR20 Identify Totem
Cybersecurity Summit AHR20 Identify TotemCybersecurity Summit AHR20 Identify Totem
Cybersecurity Summit AHR20 Identify Totem
 
Cybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework CimetricsCybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework Cimetrics
 
Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide Deck
 
What BACnet/SC can do to improve BAS cybersecurity, and what it won’t do
What BACnet/SC can do to improve BAS cybersecurity, and what it won’t doWhat BACnet/SC can do to improve BAS cybersecurity, and what it won’t do
What BACnet/SC can do to improve BAS cybersecurity, and what it won’t do
 
BACnet and Metering
BACnet and MeteringBACnet and Metering
BACnet and Metering
 
Analytika educational and research facility case study
Analytika educational and research facility case study Analytika educational and research facility case study
Analytika educational and research facility case study
 
Jefferson University Currents
Jefferson University CurrentsJefferson University Currents
Jefferson University Currents
 
BE A BTU HUNTER: How Big Data Analytics Can Achieve Energy and OM Savings Whi...
BE A BTU HUNTER: How Big Data Analytics Can Achieve Energy and OM Savings Whi...BE A BTU HUNTER: How Big Data Analytics Can Achieve Energy and OM Savings Whi...
BE A BTU HUNTER: How Big Data Analytics Can Achieve Energy and OM Savings Whi...
 
Bringing transparency to buildings.
Bringing transparency to buildings.Bringing transparency to buildings.
Bringing transparency to buildings.
 
IoT Affects BACnet How?
IoT Affects BACnet How?IoT Affects BACnet How?
IoT Affects BACnet How?
 
5 Benefits of BACnet Data In the Cloud
5 Benefits of BACnet Data In the Cloud5 Benefits of BACnet Data In the Cloud
5 Benefits of BACnet Data In the Cloud
 
BACnet/IP good field implementation practices
BACnet/IP good field implementation practicesBACnet/IP good field implementation practices
BACnet/IP good field implementation practices
 
BACnet at Cornell: 20+ Years of Lessons Learned
BACnet at Cornell: 20+ Years of Lessons LearnedBACnet at Cornell: 20+ Years of Lessons Learned
BACnet at Cornell: 20+ Years of Lessons Learned
 
New England BACnet Users Meeting
New England BACnet Users MeetingNew England BACnet Users Meeting
New England BACnet Users Meeting
 
Building a BACnet Product
Building a BACnet ProductBuilding a BACnet Product
Building a BACnet Product
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

BACnet/SC: A Secure Alternative to BACnet/IP

  • 1. BACnet/SC: A “Secure” Alternative to BACnet/IP Jim Butler Cimetrics Inc.
  • 2. About Cimetrics • BACnet communication products (since 1995) • BACnet protocol stacks • Routers, gateways, meter interfaces, … • Building system analytics (since 2000) • FDD software (SaaS) • Professional services 2
  • 3. BACnet/IP Overview • Widely used BAS backbone network protocol • Published in 1999 • Employs UDP for communication on TCP/IP networks • Static IP addresses are typically used • DNS is not used • Can easily span multiple IP subnets • … but the management of broadcast messages can be tricky in practice • Can be used in a NAT environment, but not easily 3
  • 4. Securing BACnet/IP networks • BACnet/IP has no native security features! • Common ”secure” deployment options: • Physically separate BAS network • Dedicated VLAN(s) or VPN for BAS 4
  • 5. IP Router D1 D2 D3 D4 IP Subnet A IP Subnet B BBMD A BBMD B 6 A Simple BACnet/IP Network
  • 6. 7 IP Router D1 D2 D3 D4 IP Subnet A IP Subnet B BBMD A BBMD B D5 IP Subnet C Foreign Device BACnet/IP Foreign Device Registration
  • 7. 8 IP Subnet A IP Subnet B BBMD A BBMD B D5 IP Subnet C Foreign Device BACnet/IP Broadcast Message Forwarding
  • 8. 99 IP Subnet A IP Subnet B BBMD A BBMD B D5 IP Subnet C Foreign Device BACnet/IP Broadcast Message Forwarding IP Subnet D BBMD D BBMD E IP Subnet E BBMD F IP Subnet F
  • 9. 101010 IP Subnet A IP Subnet B BBMD A BBMD B D5 IP Subnet C Foreign Device BACnet/IP Broadcast Message Forwarding IP Subnet D BBMD D BBMD E IP Subnet E BBMD F IP Subnet F
  • 10. 1212121212 IP Subnet A IP Subnet B BBMD A BBMD B D5 IP Subnet C Foreign Device BACnet/IP Broadcast Message Forwarding IP Subnet D BBMD D BBMD E IP Subnet E BBMD F IP Subnet F
  • 11. 131313131313 BACnet/IP and Network Address Translation (NAT) IP Router with NAT BACnet BBMD/Router IP Router with NAT BACnet BBMD/Router Private IP Network B Private IP Network A D1 D2 D3 D4 “Public” IP Network
  • 12. BACnet/SC Overview • A “secure” BACnet option for TCP/IP networks • Will improve network security in any deployment scenario • Not yet finalized!!! • Backward-compatible with existing BACnet deployments and devices • Built on standard IT network protocols: WebSockets and TLS 1.2+ • NAT and firewall friendly • Static IP addresses are not required • No more UDP broadcasts and BBMDs 14
  • 13. What is “secure” about BACnet/SC? • Encrypted communication (TLS) • Site-based authentication of devices (TLS) • New: Carrier for user authorization data (OAuth 2) 15
  • 14. 16 BACnet/SC Logical Network Topology PP PP BACnet/SC Primary Hub BACnet/SC Regular Node hub connection Fisher, Isler and Osborne (2018) BACnet/SC hubs link devices
  • 15. Peer-to-Peer Direct Connections 17 Fisher, Isler and Osborne (2018) PP optional direct connection
  • 16. 18 Hub redundancy Fisher, Isler and Osborne (2018)
  • 17. 19 Secure communication on unsecure networks Fisher, Isler and Osborne (2018) The Facility PP FF BACnet/SC devices
  • 18. 20 Remote access through firewall Fisher, Isler and Osborne (2018)
  • 19. 21 Integration with “insecure” BACnet devices Fisher, Isler and Osborne (2018)
  • 20. Learn more about BACnet/SC http://www.bacnet.org/Bibliography/B-SC-Whitepaper- v10_Final_20180710.pdf 2019 ASHRAE Winter Conference: “Securing BACnet Networks: Present and Future” (Seminar 47) 22
  • 21. Takeaways • BACnet/SC will be a “secure” alternative to BACnet/IP. • BACnet/SC complements VLANs and other existing security methods. • Security comes at a cost. 23
  • 23. 25 Fisher, Isler and Osborne (2018)
  • 24. 26

Editor's Notes

  1. BACnet/SC: The SC stands for "secure connect".
  2. A little about Cimetrics: we have been involved in the development of the BACnet standard since 1994. Our experience providing BACnet products to the controls industry and to their customers motivated us to develop HVAC analytics software in order to find ways to improve the performance of building systems.
  3. I think that most of you are already generally familiar with BACnet/IP, but I would like to review its general characteristics so that we can see how BACnet/SC differs.
  4. BACnet/IP is like other BACnet data links in that it is easy to add a device to a network. That is one consequence of the fact that BACnet/IP has no native security features, so securing a BACnet/IP network typically involves setting up one or more dedicated VLANs. This works pretty well as long as the VLANs are set up correctly.
  5. Here is a diagram of a simple BACnet/IP network. The devices D1-D4 can directly communicate with each other through the IP routing infrastructure using unicast messages. However, BACnet/IP broadcast messages are blocked by the IP router, so we invented BBMDs in order to forward BACnet broadcasts between IP subnets.
  6. Foreign devices typically reside on IP subnets that don't have a BBMD. They can register with a BBMD in order to fully participate in a BACnet/IP network. In this diagram, foreign device D5 has registered with BBMD "B".
  7. When device D5 wants to send a BACnet broadcast to all of the devices in the BACnet/IP network, it sends the broadcast to BBMD "B", which locally broadcasts the message on IP subnet "B" and forwards the broadcast to BBMD "A", which in turn locally broadcasts the message on IP subnet "A".
  8. BACnet/IP networks can become much more complicated in a big system. In this diagram, the BACnet/IP network consists of devices connected to six different IP subnets. This is an example of a "full mesh" BBMD configuration, because every BBMD is configured to forward broadcasts to every other BBMD. A full mesh configuration does not scale well.
  9. In order to limit the propagation of broadcast traffic, BBMDs can be configured in various ways. In this diagram, BBMD "B" will see all of the broadcast messages in the BACnet/IP network, but BBMD "D" will not see broadcast messages that originate in IP subnets "A", "E", and "F".
  10. Other BBMD configurations are possible, depending on where broadcast messages need to go. Unfortunately we have found that many controls technicians are unfamiliar with how to set up BBMDs in order to optimize the flow of broadcast traffic in a particular system.
  11. It is also possible to use BACnet/IP in an environment in which network address translation is used. Not only does this require the proper configuration of BBMD/Routers, but the NATting IP routers also require special configuration.
  12. Now let's talk about BACnet/SC. First I should mention that the BACnet/SC specification is still under development, but I expect that it will be approved sometime in the latter part of next year. BACnet/SC is a "secure" alternative to BACnet/IP, and it has some other benefits. For example, BBMDs are not used! But most importantly, BACnet/SC uses TLS, a secure transport protocol...
  13. Why do we say that BACnet/SC is "secure"? It provides encrypted communication and device authentication, both of which are enabled by the TLS protocol. Only devices that have an operating certificate signed by the site's certificate authority can join that site's BACnet/SC network.
  14. Let's look at the architecture of a BACnet/SC network. One essential device is the hub. Every other device establishes a secure connection to the hub. The hub is responsible for forwarding all broadcast messages between the other devices. As well, the hub can forward unicast messages; in this respect it differs from a BBMD. Note that the hub can be anywhere that can be reached by the other BACnet/SC devices.
  15. Devices can optionally attempt to establish peer-to-peer connections for exchanging unicast messages. This improves the performance of the network and reduces the dependency on the hub.
  16. Another way to reduce the dependency on the hub is to add a second hub. In the event of a failure of the primary hub, devices will establish a connection to the secondary or failover hub.
  17. Let's look at a few possible deployment scenarios. In this first scenario, BACnet/SC is used to secure the communication between devices connected to networks that are considered to be "unsecure".
  18. In this scenario, BACnet/SC is used to enable communication between Internet-connected devices (such as the operator workstation in this diagram) and a network of BACnet/IP devices that are behind a firewall. Note that the primary and failover hubs are in "the cloud". The OWS and the BACnet router establish a BACnet/SC connection to the primary and failover hubs.
  19. Here is one more scenario, which shows a system containing both BACnet/SC devices and other BACnet devices. BACnet routers provide the glue that connects the different BACnet networks. Since the primary and failover hubs are behind a firewall, the Internet-connected laptop will need some means to establish a BACnet/SC connection to those hubs through the firewall.
  20. If you are interested in learning more about BACnet/SC, there is a white paper that you can freely download from bacnet dot org. BACnet/SC will also be discussed during a seminar in the upcoming ASHRAE conference in January.
  21. Here is what I hope that you will take away from this talk... BACnet/SC will be able to be used instead of BACnet/IP when additional network security is needed. I should emphasize that you can use BACnet/SC with VLANs and other existing network security infrastructure. But of course, security comes at a cost, for example the need for additional device configuration and the maintenance of a certificate authority. Thank you for your attention.
  22. The BACnet/SC protocol stack
  23. Here is a scenario in which multiple retail stores are connected using BACnet/SC over the Internet.