SlideShare a Scribd company logo
1 of 23
Download to read offline
Assessment Models to Improve the Usability of
             Security in Wireless Sensor Networks




                                                           Steffen Peter



                                                        IHP
                                               Im Technologiepark 25
                                               15236 Frankfurt (Oder)
                                                     Germany

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany      www.ihp-microelectronics.com   © 2011 - All rights reserved
Outline



• Introduction WSAN4CIP, TAMPRES

• Motivation

• Model-based security assessment approach

• Example for practical security model



IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
WSAN4CIP


• Protection of critical infrastructures
• Potential threats
  – Natural disasters (floods, earthquake)
  – Terrorism, Vandalism, Crime (stealing Iron)
• Providing monitoring capabilities for large scale
  infrastructure requires:
  – Low cost devices
  – No additional infrastructure
  – Robust, self-configuring systems
  – integration in SCADA infrastructures
• WSNs protecting CIP become part of the CIP
  – need to be protected
  –Development and integration of mechanisms to protect the WSN
  IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
WSAN4CIP demonstration sides (1)




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
WSAN4CIP demonstration sides (2)



Briesen (Mark)
                                                                                                         Rosengarten
                                                         Jacobsdorf




   •     Drinking water distribution network
        – Monitoring of a 20km pipeline in Germany
        – Reporting of operating state, alarm conditions and access control.
        –Integration in existing infrastructures


    • Nodes are exposed to physical attacks
       IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
TAMPRES


• Development of novel protection means to ensure
  tamper resistance and improve trustworthiness for
  severely contrained devices

• Enhancing the security of the Future Internet by
  improving the resistance of its weakest link, i.e.
  wireless sensor nodes against physical attacks

• Highly technical project with the goal to implement
  a tamper resistant sensor node with cryptographic
  accelerators and side-channel resistance


IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
General Problem



• Gap between application level (users) and
  technological level (developers)

• Complex trade-offs on technological level often not
  understood on application level

• Particularly true for Wireless Sensor Networks
     –Energy, Memory , Security, Cost – Trade-offs
     –No one-fits-all solution




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Overview: Model-based System Security Assessment

                                                                                           Understood by
                                        Application Requirements                           users

                                     C1: Collecting of (soft) user security requirements
                                     and transforming them to the (hard) model that allows assessment

   Security- and                                    C3: Does the system satisfies the requirements?
Assessment Models                                     Need for adequate models

                                                   Inferring properties of the composed system
                                                      Based on meta-information of the basis components
                         System
  = composition of basis component

                                                  (Automatic) selection of basis components


                                Technological basis components                             services, and
                     C2: Describing individual (security-) properties                      protocols with
                     of the components as meta-information                                 complex trade-offs
 IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com       © 2011- All rights reserved
C1: Collection and Mapping of User Requirements


• Full specification of the application mission
   –Relevant phenomena
   –Selection of sensors
   –Expected lifetime and reliability
• Hide technical details
   –Users typically cannot
    express their security
    needs
• Language easy to use
  for users
   – central catalogue
   – specific catalogues for
     specific domains
  IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Two-Step Requirement Definition Process




                                       Transformation of requirements

- Application type
         (health care, home, industrial)
                                                                                    Attacker model and capabilities
- Required security attributes
         (concealment, integrity, robustness)
- Parameters
            IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com       © 2011- All rights reserved
C2: Describing attributes components and system



• Definition of a (Meta-) component model
     – Hardware and software components
     – Protocols, services


• Security properties as part of the meta information
  of the components
     –Provided by the developers (they know what their
     components are doing)
     –Have to be observed by independent experts


• Has to support composable security
     –sec (comp. A + comp. B) = f(sec(comp A), sec(comp B))

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Component Meta-Model




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
C3: Definition of Security Models



• Should be able to decide whether a system is
  secure for the given requirements

• Inputs are:
     –Technical requirements
     –Properties of the system


• Output:
     –List of conflicts




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Currently implemented Model Approach



• Define requirements, environmental information,
  security properties, attacker properties as properties
  in one large graph
     –Connected via relations (formulas) defining how properties
     depend on and define each other


• Security is expressed as views on specific aspects
     –System is secure is the attribute is free of conflicts on context of
     requirements,


• Starting point is a holistic security model
     –Successive refinement to assess the aspects

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Holistic Security Model (Ontology)




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Focused Views on the Ontology




System properties can be derived                                             Attacker model and capabilities
      from the properties of the                                             can be derived from the user requirements,
               used components                                               and the application context

   IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com       © 2011- All rights reserved
Example for an Attack-centric Security Model

• Based on Attack Trees
     – A system is secure if all attacks:
          1.      can be prevented (property of the system), or
          2.      Do not apply (property of the system requirements)

                                                             System
                                                             Security
                                                                                                propagation
                         …Attacks…                                            …Attacks…

Require-
 ments/                                                                                                             System
Attacker                                                                                                           Properties
 modell




  IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany       www.ihp-microelectronics.com       © 2011- All rights reserved
General Architecture




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Envisioned WSN Design Process




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Example for a Component Selection Tool: configKit

                                                -Selection of hardware
                                                -Selection of required functions
                                                -Definition of security properties




                                                           -Each change of inputs
                                                           immediately updates the result
                                                             Fast and easy refinement process



                                                           -Proposed software configuration
                                                           -Including prediction of footprint
IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany     www.ihp-microelectronics.com   © 2011- All rights reserved
Example for a Component Selection Tool

                                                -Selection of hardware
                                                -Selection of required functions
                                                -Definition of security properties




                                                           -Each change of inputs
                                                           immediately updates the result
                                                             Fast and easy refinement process



                                                           -Proposed software configuration
                                                           -Including prediction of footprint
IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany     www.ihp-microelectronics.com   © 2011- All rights reserved
Conclusions



• Assessment models can help to validate the fulfillment
  of user requirements for a given system
     Proposed approach shows the general feasibility

• Challenges remain:
  -How to elicit the requirements from the user and to
   transform them to objective properties
  -Find models for a-priori reasoning of security-related
   behavior and conflicts
  -How to describe properties of components so that
    they support composition of security

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Thank You




                                                  Questions?




                                                                                          Web: www.wsan4cip.eu
                                                                                                www.tampres.eu

                                                                       peter@ihp-microelectronics.com



IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com             © 2008 - All rights reserved

More Related Content

What's hot

Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security Malachi Jones
 
Evolution of protective systems in petro chem
Evolution of protective systems in petro chemEvolution of protective systems in petro chem
Evolution of protective systems in petro chemGlen Alleman
 
It 443 lecture 1
It 443 lecture 1It 443 lecture 1
It 443 lecture 1elisha25
 
Demilitarized network to secure the data stored in industrial networks
Demilitarized network to secure the data stored in  industrial networks Demilitarized network to secure the data stored in  industrial networks
Demilitarized network to secure the data stored in industrial networks IJECEIAES
 
Security Risk Management- moeshesh
Security Risk Management- moesheshSecurity Risk Management- moeshesh
Security Risk Management- moesheshMohamed Shishtawy
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models7wounders
 
VigilantPlant | excellence in Safety & Availability
VigilantPlant | excellence in Safety & AvailabilityVigilantPlant | excellence in Safety & Availability
VigilantPlant | excellence in Safety & AvailabilityYokogawa
 
CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013Ian Sommerville
 
safety_critical_applications_and_customer_concerns
safety_critical_applications_and_customer_concernssafety_critical_applications_and_customer_concerns
safety_critical_applications_and_customer_concernsRufino Olay III
 
Embedded os
Embedded osEmbedded os
Embedded oschian417
 
Embedded Systems Portfolio: Guarantor of Technogenic Safety
Embedded Systems Portfolio: Guarantor of Technogenic Safety Embedded Systems Portfolio: Guarantor of Technogenic Safety
Embedded Systems Portfolio: Guarantor of Technogenic Safety Edgewood Services
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded SystemsMohamed Tarek
 

What's hot (19)

Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
 
Evolution of protective systems in petro chem
Evolution of protective systems in petro chemEvolution of protective systems in petro chem
Evolution of protective systems in petro chem
 
Iec61508 guide
Iec61508 guideIec61508 guide
Iec61508 guide
 
Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...
 
It 443 lecture 1
It 443 lecture 1It 443 lecture 1
It 443 lecture 1
 
DSDConference07
DSDConference07DSDConference07
DSDConference07
 
Demilitarized network to secure the data stored in industrial networks
Demilitarized network to secure the data stored in  industrial networks Demilitarized network to secure the data stored in  industrial networks
Demilitarized network to secure the data stored in industrial networks
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Security Risk Management- moeshesh
Security Risk Management- moesheshSecurity Risk Management- moeshesh
Security Risk Management- moeshesh
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models
 
VigilantPlant | excellence in Safety & Availability
VigilantPlant | excellence in Safety & AvailabilityVigilantPlant | excellence in Safety & Availability
VigilantPlant | excellence in Safety & Availability
 
CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013
 
safety_critical_applications_and_customer_concerns
safety_critical_applications_and_customer_concernssafety_critical_applications_and_customer_concerns
safety_critical_applications_and_customer_concerns
 
Embedded operating systems
Embedded operating systemsEmbedded operating systems
Embedded operating systems
 
Enea OSE Datasheet
Enea OSE DatasheetEnea OSE Datasheet
Enea OSE Datasheet
 
Embedded os
Embedded osEmbedded os
Embedded os
 
Embedded Systems Portfolio: Guarantor of Technogenic Safety
Embedded Systems Portfolio: Guarantor of Technogenic Safety Embedded Systems Portfolio: Guarantor of Technogenic Safety
Embedded Systems Portfolio: Guarantor of Technogenic Safety
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded Systems
 
Introduction to embedded systems
Introduction to embedded systemsIntroduction to embedded systems
Introduction to embedded systems
 

Viewers also liked

Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meetingfcleary
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704fcleary
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meetingfcleary
 
Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectivesfcleary
 
Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meetingfcleary
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meetingfcleary
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meetingfcleary
 
Posecco cluster meeting
Posecco cluster meetingPosecco cluster meeting
Posecco cluster meetingfcleary
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meetingfcleary
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trustfcleary
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1fcleary
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides amsfcleary
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meetingfcleary
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisifcleary
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meetingfcleary
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1fcleary
 

Viewers also liked (19)

Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meeting
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meeting
 
Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectives
 
Tdl
TdlTdl
Tdl
 
Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meeting
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 
Syssec
SyssecSyssec
Syssec
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meeting
 
Posecco cluster meeting
Posecco cluster meetingPosecco cluster meeting
Posecco cluster meeting
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meeting
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides ams
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisi
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meeting
 
Nessos
NessosNessos
Nessos
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
 

Similar to Wsanacip tampres cluster meeting

IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkNathan Wallace, PhD, PE
 
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Schneider Electric
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82majolic
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...TI Safe
 
Smarter Manufacturing through Equipment Data-Driven Application Design
Smarter Manufacturing through Equipment Data-Driven Application DesignSmarter Manufacturing through Equipment Data-Driven Application Design
Smarter Manufacturing through Equipment Data-Driven Application DesignKimberly Daich
 
btech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptxbtech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptxSattiBabu16
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysMarcel Winandy
 
Reference Architecture for Electric Energy OT.pdf
Reference Architecture for Electric Energy OT.pdfReference Architecture for Electric Energy OT.pdf
Reference Architecture for Electric Energy OT.pdfimjamadarp19
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2Nguyen Binh
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systemsPeter Wood
 
A Behavior-based Approach to Secure and Resilient Industrial Control Systems
A Behavior-based Approach to Secure and Resilient Industrial Control SystemsA Behavior-based Approach to Secure and Resilient Industrial Control Systems
A Behavior-based Approach to Secure and Resilient Industrial Control SystemsFörderverein Technische Fakultät
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+DesignAlfred Ouyang
 
Automotive communication systems: from dependability to security
Automotive communication systems: from dependability to securityAutomotive communication systems: from dependability to security
Automotive communication systems: from dependability to securityRealTime-at-Work (RTaW)
 
Automotive communication systems: from dependability to security
Automotive communication systems: from dependability to securityAutomotive communication systems: from dependability to security
Automotive communication systems: from dependability to securityNicolas Navet
 

Similar to Wsanacip tampres cluster meeting (20)

Industrial networks safety & security - e+h june 2018 ben murphy
Industrial networks safety & security - e+h june 2018   ben murphyIndustrial networks safety & security - e+h june 2018   ben murphy
Industrial networks safety & security - e+h june 2018 ben murphy
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
Ensuring your plant is secure
Ensuring your plant is secureEnsuring your plant is secure
Ensuring your plant is secure
 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
 
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
Smarter Manufacturing through Equipment Data-Driven Application Design
Smarter Manufacturing through Equipment Data-Driven Application DesignSmarter Manufacturing through Equipment Data-Driven Application Design
Smarter Manufacturing through Equipment Data-Driven Application Design
 
btech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptxbtech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptx
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
Reference Architecture for Electric Energy OT.pdf
Reference Architecture for Electric Energy OT.pdfReference Architecture for Electric Energy OT.pdf
Reference Architecture for Electric Energy OT.pdf
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Secure Embedded Systems
Secure Embedded SystemsSecure Embedded Systems
Secure Embedded Systems
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systems
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
A Behavior-based Approach to Secure and Resilient Industrial Control Systems
A Behavior-based Approach to Secure and Resilient Industrial Control SystemsA Behavior-based Approach to Secure and Resilient Industrial Control Systems
A Behavior-based Approach to Secure and Resilient Industrial Control Systems
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
Automotive communication systems: from dependability to security
Automotive communication systems: from dependability to securityAutomotive communication systems: from dependability to security
Automotive communication systems: from dependability to security
 
Automotive communication systems: from dependability to security
Automotive communication systems: from dependability to securityAutomotive communication systems: from dependability to security
Automotive communication systems: from dependability to security
 

More from fcleary

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report fcleary
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meetingfcleary
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meetingfcleary
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus wsfcleary
 
Assert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingAssert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingfcleary
 
Nessos cluster meeting
Nessos cluster meetingNessos cluster meeting
Nessos cluster meetingfcleary
 
Amsterdam logistics fcleary
Amsterdam logistics  fclearyAmsterdam logistics  fcleary
Amsterdam logistics fclearyfcleary
 

More from fcleary (7)

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meeting
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus ws
 
Assert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingAssert4soa 2nd cluster meeting
Assert4soa 2nd cluster meeting
 
Nessos cluster meeting
Nessos cluster meetingNessos cluster meeting
Nessos cluster meeting
 
Amsterdam logistics fcleary
Amsterdam logistics  fclearyAmsterdam logistics  fcleary
Amsterdam logistics fcleary
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Wsanacip tampres cluster meeting

  • 1. Assessment Models to Improve the Usability of Security in Wireless Sensor Networks Steffen Peter IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011 - All rights reserved
  • 2. Outline • Introduction WSAN4CIP, TAMPRES • Motivation • Model-based security assessment approach • Example for practical security model IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 3. WSAN4CIP • Protection of critical infrastructures • Potential threats – Natural disasters (floods, earthquake) – Terrorism, Vandalism, Crime (stealing Iron) • Providing monitoring capabilities for large scale infrastructure requires: – Low cost devices – No additional infrastructure – Robust, self-configuring systems – integration in SCADA infrastructures • WSNs protecting CIP become part of the CIP – need to be protected –Development and integration of mechanisms to protect the WSN IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 4. WSAN4CIP demonstration sides (1) IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 5. WSAN4CIP demonstration sides (2) Briesen (Mark) Rosengarten Jacobsdorf • Drinking water distribution network – Monitoring of a 20km pipeline in Germany – Reporting of operating state, alarm conditions and access control. –Integration in existing infrastructures • Nodes are exposed to physical attacks IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 6. TAMPRES • Development of novel protection means to ensure tamper resistance and improve trustworthiness for severely contrained devices • Enhancing the security of the Future Internet by improving the resistance of its weakest link, i.e. wireless sensor nodes against physical attacks • Highly technical project with the goal to implement a tamper resistant sensor node with cryptographic accelerators and side-channel resistance IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 7. General Problem • Gap between application level (users) and technological level (developers) • Complex trade-offs on technological level often not understood on application level • Particularly true for Wireless Sensor Networks –Energy, Memory , Security, Cost – Trade-offs –No one-fits-all solution IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 8. Overview: Model-based System Security Assessment Understood by Application Requirements users C1: Collecting of (soft) user security requirements and transforming them to the (hard) model that allows assessment Security- and C3: Does the system satisfies the requirements? Assessment Models Need for adequate models Inferring properties of the composed system Based on meta-information of the basis components System = composition of basis component (Automatic) selection of basis components Technological basis components services, and C2: Describing individual (security-) properties protocols with of the components as meta-information complex trade-offs IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 9. C1: Collection and Mapping of User Requirements • Full specification of the application mission –Relevant phenomena –Selection of sensors –Expected lifetime and reliability • Hide technical details –Users typically cannot express their security needs • Language easy to use for users – central catalogue – specific catalogues for specific domains IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 10. Two-Step Requirement Definition Process Transformation of requirements - Application type (health care, home, industrial) Attacker model and capabilities - Required security attributes (concealment, integrity, robustness) - Parameters IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 11. C2: Describing attributes components and system • Definition of a (Meta-) component model – Hardware and software components – Protocols, services • Security properties as part of the meta information of the components –Provided by the developers (they know what their components are doing) –Have to be observed by independent experts • Has to support composable security –sec (comp. A + comp. B) = f(sec(comp A), sec(comp B)) IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 12. Component Meta-Model IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 13. C3: Definition of Security Models • Should be able to decide whether a system is secure for the given requirements • Inputs are: –Technical requirements –Properties of the system • Output: –List of conflicts IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 14. Currently implemented Model Approach • Define requirements, environmental information, security properties, attacker properties as properties in one large graph –Connected via relations (formulas) defining how properties depend on and define each other • Security is expressed as views on specific aspects –System is secure is the attribute is free of conflicts on context of requirements, • Starting point is a holistic security model –Successive refinement to assess the aspects IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 15. Holistic Security Model (Ontology) IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 16. Focused Views on the Ontology System properties can be derived Attacker model and capabilities from the properties of the can be derived from the user requirements, used components and the application context IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 17. Example for an Attack-centric Security Model • Based on Attack Trees – A system is secure if all attacks: 1. can be prevented (property of the system), or 2. Do not apply (property of the system requirements) System Security propagation …Attacks… …Attacks… Require- ments/ System Attacker Properties modell IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 18. General Architecture IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 19. Envisioned WSN Design Process IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 20. Example for a Component Selection Tool: configKit -Selection of hardware -Selection of required functions -Definition of security properties -Each change of inputs immediately updates the result Fast and easy refinement process -Proposed software configuration -Including prediction of footprint IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 21. Example for a Component Selection Tool -Selection of hardware -Selection of required functions -Definition of security properties -Each change of inputs immediately updates the result Fast and easy refinement process -Proposed software configuration -Including prediction of footprint IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 22. Conclusions • Assessment models can help to validate the fulfillment of user requirements for a given system Proposed approach shows the general feasibility • Challenges remain: -How to elicit the requirements from the user and to transform them to objective properties -Find models for a-priori reasoning of security-related behavior and conflicts -How to describe properties of components so that they support composition of security IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 23. Thank You Questions? Web: www.wsan4cip.eu www.tampres.eu peter@ihp-microelectronics.com IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2008 - All rights reserved