SlideShare a Scribd company logo
1 of 23
Download to read offline
Assessment Models to Improve the Usability of
             Security in Wireless Sensor Networks




                                                           Steffen Peter



                                                        IHP
                                               Im Technologiepark 25
                                               15236 Frankfurt (Oder)
                                                     Germany

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany      www.ihp-microelectronics.com   © 2011 - All rights reserved
Outline



• Introduction WSAN4CIP, TAMPRES

• Motivation

• Model-based security assessment approach

• Example for practical security model



IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
WSAN4CIP


• Protection of critical infrastructures
• Potential threats
  – Natural disasters (floods, earthquake)
  – Terrorism, Vandalism, Crime (stealing Iron)
• Providing monitoring capabilities for large scale
  infrastructure requires:
  – Low cost devices
  – No additional infrastructure
  – Robust, self-configuring systems
  – integration in SCADA infrastructures
• WSNs protecting CIP become part of the CIP
  – need to be protected
  –Development and integration of mechanisms to protect the WSN
  IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
WSAN4CIP demonstration sides (1)




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
WSAN4CIP demonstration sides (2)



Briesen (Mark)
                                                                                                         Rosengarten
                                                         Jacobsdorf




   •     Drinking water distribution network
        – Monitoring of a 20km pipeline in Germany
        – Reporting of operating state, alarm conditions and access control.
        –Integration in existing infrastructures


    • Nodes are exposed to physical attacks
       IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
TAMPRES


• Development of novel protection means to ensure
  tamper resistance and improve trustworthiness for
  severely contrained devices

• Enhancing the security of the Future Internet by
  improving the resistance of its weakest link, i.e.
  wireless sensor nodes against physical attacks

• Highly technical project with the goal to implement
  a tamper resistant sensor node with cryptographic
  accelerators and side-channel resistance


IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
General Problem



• Gap between application level (users) and
  technological level (developers)

• Complex trade-offs on technological level often not
  understood on application level

• Particularly true for Wireless Sensor Networks
     –Energy, Memory , Security, Cost – Trade-offs
     –No one-fits-all solution




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Overview: Model-based System Security Assessment

                                                                                           Understood by
                                        Application Requirements                           users

                                     C1: Collecting of (soft) user security requirements
                                     and transforming them to the (hard) model that allows assessment

   Security- and                                    C3: Does the system satisfies the requirements?
Assessment Models                                     Need for adequate models

                                                   Inferring properties of the composed system
                                                      Based on meta-information of the basis components
                         System
  = composition of basis component

                                                  (Automatic) selection of basis components


                                Technological basis components                             services, and
                     C2: Describing individual (security-) properties                      protocols with
                     of the components as meta-information                                 complex trade-offs
 IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com       © 2011- All rights reserved
C1: Collection and Mapping of User Requirements


• Full specification of the application mission
   –Relevant phenomena
   –Selection of sensors
   –Expected lifetime and reliability
• Hide technical details
   –Users typically cannot
    express their security
    needs
• Language easy to use
  for users
   – central catalogue
   – specific catalogues for
     specific domains
  IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Two-Step Requirement Definition Process




                                       Transformation of requirements

- Application type
         (health care, home, industrial)
                                                                                    Attacker model and capabilities
- Required security attributes
         (concealment, integrity, robustness)
- Parameters
            IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com       © 2011- All rights reserved
C2: Describing attributes components and system



• Definition of a (Meta-) component model
     – Hardware and software components
     – Protocols, services


• Security properties as part of the meta information
  of the components
     –Provided by the developers (they know what their
     components are doing)
     –Have to be observed by independent experts


• Has to support composable security
     –sec (comp. A + comp. B) = f(sec(comp A), sec(comp B))

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Component Meta-Model




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
C3: Definition of Security Models



• Should be able to decide whether a system is
  secure for the given requirements

• Inputs are:
     –Technical requirements
     –Properties of the system


• Output:
     –List of conflicts




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Currently implemented Model Approach



• Define requirements, environmental information,
  security properties, attacker properties as properties
  in one large graph
     –Connected via relations (formulas) defining how properties
     depend on and define each other


• Security is expressed as views on specific aspects
     –System is secure is the attribute is free of conflicts on context of
     requirements,


• Starting point is a holistic security model
     –Successive refinement to assess the aspects

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Holistic Security Model (Ontology)




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Focused Views on the Ontology




System properties can be derived                                             Attacker model and capabilities
      from the properties of the                                             can be derived from the user requirements,
               used components                                               and the application context

   IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com       © 2011- All rights reserved
Example for an Attack-centric Security Model

• Based on Attack Trees
     – A system is secure if all attacks:
          1.      can be prevented (property of the system), or
          2.      Do not apply (property of the system requirements)

                                                             System
                                                             Security
                                                                                                propagation
                         …Attacks…                                            …Attacks…

Require-
 ments/                                                                                                             System
Attacker                                                                                                           Properties
 modell




  IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany       www.ihp-microelectronics.com       © 2011- All rights reserved
General Architecture




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Envisioned WSN Design Process




IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Example for a Component Selection Tool: configKit

                                                -Selection of hardware
                                                -Selection of required functions
                                                -Definition of security properties




                                                           -Each change of inputs
                                                           immediately updates the result
                                                             Fast and easy refinement process



                                                           -Proposed software configuration
                                                           -Including prediction of footprint
IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany     www.ihp-microelectronics.com   © 2011- All rights reserved
Example for a Component Selection Tool

                                                -Selection of hardware
                                                -Selection of required functions
                                                -Definition of security properties




                                                           -Each change of inputs
                                                           immediately updates the result
                                                             Fast and easy refinement process



                                                           -Proposed software configuration
                                                           -Including prediction of footprint
IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany     www.ihp-microelectronics.com   © 2011- All rights reserved
Conclusions



• Assessment models can help to validate the fulfillment
  of user requirements for a given system
     Proposed approach shows the general feasibility

• Challenges remain:
  -How to elicit the requirements from the user and to
   transform them to objective properties
  -Find models for a-priori reasoning of security-related
   behavior and conflicts
  -How to describe properties of components so that
    they support composition of security

IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com   © 2011- All rights reserved
Thank You




                                                  Questions?




                                                                                          Web: www.wsan4cip.eu
                                                                                                www.tampres.eu

                                                                       peter@ihp-microelectronics.com



IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany   www.ihp-microelectronics.com             © 2008 - All rights reserved

More Related Content

What's hot

Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security Malachi Jones
 
Evolution of protective systems in petro chem
Evolution of protective systems in petro chemEvolution of protective systems in petro chem
Evolution of protective systems in petro chemGlen Alleman
 
It 443 lecture 1
It 443 lecture 1It 443 lecture 1
It 443 lecture 1elisha25
 
Demilitarized network to secure the data stored in industrial networks
Demilitarized network to secure the data stored in  industrial networks Demilitarized network to secure the data stored in  industrial networks
Demilitarized network to secure the data stored in industrial networks IJECEIAES
 
Security Risk Management- moeshesh
Security Risk Management- moesheshSecurity Risk Management- moeshesh
Security Risk Management- moesheshMohamed Shishtawy
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models7wounders
 
VigilantPlant | excellence in Safety & Availability
VigilantPlant | excellence in Safety & AvailabilityVigilantPlant | excellence in Safety & Availability
VigilantPlant | excellence in Safety & AvailabilityYokogawa
 
CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013Ian Sommerville
 
safety_critical_applications_and_customer_concerns
safety_critical_applications_and_customer_concernssafety_critical_applications_and_customer_concerns
safety_critical_applications_and_customer_concernsRufino Olay III
 
Embedded os
Embedded osEmbedded os
Embedded oschian417
 
Embedded Systems Portfolio: Guarantor of Technogenic Safety
Embedded Systems Portfolio: Guarantor of Technogenic Safety Embedded Systems Portfolio: Guarantor of Technogenic Safety
Embedded Systems Portfolio: Guarantor of Technogenic Safety Edgewood Services
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded SystemsMohamed Tarek
 

What's hot (19)

Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
 
Evolution of protective systems in petro chem
Evolution of protective systems in petro chemEvolution of protective systems in petro chem
Evolution of protective systems in petro chem
 
Iec61508 guide
Iec61508 guideIec61508 guide
Iec61508 guide
 
Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...
 
It 443 lecture 1
It 443 lecture 1It 443 lecture 1
It 443 lecture 1
 
DSDConference07
DSDConference07DSDConference07
DSDConference07
 
Demilitarized network to secure the data stored in industrial networks
Demilitarized network to secure the data stored in  industrial networks Demilitarized network to secure the data stored in  industrial networks
Demilitarized network to secure the data stored in industrial networks
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Security Risk Management- moeshesh
Security Risk Management- moesheshSecurity Risk Management- moeshesh
Security Risk Management- moeshesh
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models
 
VigilantPlant | excellence in Safety & Availability
VigilantPlant | excellence in Safety & AvailabilityVigilantPlant | excellence in Safety & Availability
VigilantPlant | excellence in Safety & Availability
 
CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013
 
safety_critical_applications_and_customer_concerns
safety_critical_applications_and_customer_concernssafety_critical_applications_and_customer_concerns
safety_critical_applications_and_customer_concerns
 
Embedded operating systems
Embedded operating systemsEmbedded operating systems
Embedded operating systems
 
Enea OSE Datasheet
Enea OSE DatasheetEnea OSE Datasheet
Enea OSE Datasheet
 
Embedded os
Embedded osEmbedded os
Embedded os
 
Embedded Systems Portfolio: Guarantor of Technogenic Safety
Embedded Systems Portfolio: Guarantor of Technogenic Safety Embedded Systems Portfolio: Guarantor of Technogenic Safety
Embedded Systems Portfolio: Guarantor of Technogenic Safety
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded Systems
 
Introduction to embedded systems
Introduction to embedded systemsIntroduction to embedded systems
Introduction to embedded systems
 

Viewers also liked

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report fcleary
 
Engineering for Connected Patients in the IoT Era
Engineering for Connected Patients in the IoT EraEngineering for Connected Patients in the IoT Era
Engineering for Connected Patients in the IoT EraMongoDB
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meetingfcleary
 
Parcial power point herram web 2.0 25 jul
Parcial power point   herram web 2.0 25 jul Parcial power point   herram web 2.0 25 jul
Parcial power point herram web 2.0 25 jul Gloria Nelsy Zerda Diaz
 
Nessos cluster meeting
Nessos cluster meetingNessos cluster meeting
Nessos cluster meetingfcleary
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus wsfcleary
 
The french language
The french languageThe french language
The french languageJon Muir
 
Assert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingAssert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingfcleary
 
DeMolay Conclave Opening
DeMolay Conclave Opening DeMolay Conclave Opening
DeMolay Conclave Opening Regan Bright
 
NOTAS DEFINITIVAS HIDRAULICA APLICADA 1-2013
NOTAS DEFINITIVAS HIDRAULICA APLICADA 1-2013NOTAS DEFINITIVAS HIDRAULICA APLICADA 1-2013
NOTAS DEFINITIVAS HIDRAULICA APLICADA 1-2013eduardopulidosanchez
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisifcleary
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides amsfcleary
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meetingfcleary
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1fcleary
 
Data Modelling and Knowledge Engineering for the Internet of Things
Data Modelling and Knowledge Engineering for the Internet of ThingsData Modelling and Knowledge Engineering for the Internet of Things
Data Modelling and Knowledge Engineering for the Internet of ThingsCory Andrew Henson
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research DirectionsRavindra Dastikop
 

Viewers also liked (20)

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report
 
Engineering for Connected Patients in the IoT Era
Engineering for Connected Patients in the IoT EraEngineering for Connected Patients in the IoT Era
Engineering for Connected Patients in the IoT Era
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meeting
 
Parcial power point herram web 2.0 25 jul
Parcial power point   herram web 2.0 25 jul Parcial power point   herram web 2.0 25 jul
Parcial power point herram web 2.0 25 jul
 
Nessos cluster meeting
Nessos cluster meetingNessos cluster meeting
Nessos cluster meeting
 
HIPS Brochure
HIPS BrochureHIPS Brochure
HIPS Brochure
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus ws
 
The french language
The french languageThe french language
The french language
 
Assert4soa 2nd cluster meeting
Assert4soa 2nd cluster meetingAssert4soa 2nd cluster meeting
Assert4soa 2nd cluster meeting
 
DeMolay Conclave Opening
DeMolay Conclave Opening DeMolay Conclave Opening
DeMolay Conclave Opening
 
Funcion renal
Funcion renalFuncion renal
Funcion renal
 
Yehyounewest2
Yehyounewest2Yehyounewest2
Yehyounewest2
 
NOTAS DEFINITIVAS HIDRAULICA APLICADA 1-2013
NOTAS DEFINITIVAS HIDRAULICA APLICADA 1-2013NOTAS DEFINITIVAS HIDRAULICA APLICADA 1-2013
NOTAS DEFINITIVAS HIDRAULICA APLICADA 1-2013
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisi
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides ams
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meeting
 
The super 6
The  super 6The  super 6
The super 6
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
 
Data Modelling and Knowledge Engineering for the Internet of Things
Data Modelling and Knowledge Engineering for the Internet of ThingsData Modelling and Knowledge Engineering for the Internet of Things
Data Modelling and Knowledge Engineering for the Internet of Things
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research Directions
 

Similar to Wsanacip tampres cluster meeting

IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkNathan Wallace, PhD, PE
 
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Schneider Electric
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82majolic
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...TI Safe
 
Smarter Manufacturing through Equipment Data-Driven Application Design
Smarter Manufacturing through Equipment Data-Driven Application DesignSmarter Manufacturing through Equipment Data-Driven Application Design
Smarter Manufacturing through Equipment Data-Driven Application DesignKimberly Daich
 
btech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptxbtech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptxSattiBabu16
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysMarcel Winandy
 
Reference Architecture for Electric Energy OT.pdf
Reference Architecture for Electric Energy OT.pdfReference Architecture for Electric Energy OT.pdf
Reference Architecture for Electric Energy OT.pdfimjamadarp19
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2Nguyen Binh
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systemsPeter Wood
 
A Behavior-based Approach to Secure and Resilient Industrial Control Systems
A Behavior-based Approach to Secure and Resilient Industrial Control SystemsA Behavior-based Approach to Secure and Resilient Industrial Control Systems
A Behavior-based Approach to Secure and Resilient Industrial Control SystemsFörderverein Technische Fakultät
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+DesignAlfred Ouyang
 
Automotive communication systems: from dependability to security
Automotive communication systems: from dependability to securityAutomotive communication systems: from dependability to security
Automotive communication systems: from dependability to securityNicolas Navet
 
Automotive communication systems: from dependability to security
Automotive communication systems: from dependability to securityAutomotive communication systems: from dependability to security
Automotive communication systems: from dependability to securityRealTime-at-Work (RTaW)
 

Similar to Wsanacip tampres cluster meeting (20)

Industrial networks safety & security - e+h june 2018 ben murphy
Industrial networks safety & security - e+h june 2018   ben murphyIndustrial networks safety & security - e+h june 2018   ben murphy
Industrial networks safety & security - e+h june 2018 ben murphy
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
Ensuring your plant is secure
Ensuring your plant is secureEnsuring your plant is secure
Ensuring your plant is secure
 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
 
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
Smarter Manufacturing through Equipment Data-Driven Application Design
Smarter Manufacturing through Equipment Data-Driven Application DesignSmarter Manufacturing through Equipment Data-Driven Application Design
Smarter Manufacturing through Equipment Data-Driven Application Design
 
btech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptxbtech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptx
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
Reference Architecture for Electric Energy OT.pdf
Reference Architecture for Electric Energy OT.pdfReference Architecture for Electric Energy OT.pdf
Reference Architecture for Electric Energy OT.pdf
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Secure Embedded Systems
Secure Embedded SystemsSecure Embedded Systems
Secure Embedded Systems
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systems
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
A Behavior-based Approach to Secure and Resilient Industrial Control Systems
A Behavior-based Approach to Secure and Resilient Industrial Control SystemsA Behavior-based Approach to Secure and Resilient Industrial Control Systems
A Behavior-based Approach to Secure and Resilient Industrial Control Systems
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
Automotive communication systems: from dependability to security
Automotive communication systems: from dependability to securityAutomotive communication systems: from dependability to security
Automotive communication systems: from dependability to security
 
Automotive communication systems: from dependability to security
Automotive communication systems: from dependability to securityAutomotive communication systems: from dependability to security
Automotive communication systems: from dependability to security
 

More from fcleary

Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meetingfcleary
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meetingfcleary
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meetingfcleary
 
Posecco cluster meeting
Posecco cluster meetingPosecco cluster meeting
Posecco cluster meetingfcleary
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meetingfcleary
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meetingfcleary
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meetingfcleary
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1fcleary
 
Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectivesfcleary
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704fcleary
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trustfcleary
 
Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meetingfcleary
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meetingfcleary
 
Amsterdam logistics fcleary
Amsterdam logistics  fclearyAmsterdam logistics  fcleary
Amsterdam logistics fclearyfcleary
 

More from fcleary (17)

Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meeting
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meeting
 
Posecco cluster meeting
Posecco cluster meetingPosecco cluster meeting
Posecco cluster meeting
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meeting
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meeting
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1
 
Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectives
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704
 
Syssec
SyssecSyssec
Syssec
 
Nessos
NessosNessos
Nessos
 
Tdl
TdlTdl
Tdl
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
 
Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meeting
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
 
Amsterdam logistics fcleary
Amsterdam logistics  fclearyAmsterdam logistics  fcleary
Amsterdam logistics fcleary
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Wsanacip tampres cluster meeting

  • 1. Assessment Models to Improve the Usability of Security in Wireless Sensor Networks Steffen Peter IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011 - All rights reserved
  • 2. Outline • Introduction WSAN4CIP, TAMPRES • Motivation • Model-based security assessment approach • Example for practical security model IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 3. WSAN4CIP • Protection of critical infrastructures • Potential threats – Natural disasters (floods, earthquake) – Terrorism, Vandalism, Crime (stealing Iron) • Providing monitoring capabilities for large scale infrastructure requires: – Low cost devices – No additional infrastructure – Robust, self-configuring systems – integration in SCADA infrastructures • WSNs protecting CIP become part of the CIP – need to be protected –Development and integration of mechanisms to protect the WSN IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 4. WSAN4CIP demonstration sides (1) IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 5. WSAN4CIP demonstration sides (2) Briesen (Mark) Rosengarten Jacobsdorf • Drinking water distribution network – Monitoring of a 20km pipeline in Germany – Reporting of operating state, alarm conditions and access control. –Integration in existing infrastructures • Nodes are exposed to physical attacks IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 6. TAMPRES • Development of novel protection means to ensure tamper resistance and improve trustworthiness for severely contrained devices • Enhancing the security of the Future Internet by improving the resistance of its weakest link, i.e. wireless sensor nodes against physical attacks • Highly technical project with the goal to implement a tamper resistant sensor node with cryptographic accelerators and side-channel resistance IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 7. General Problem • Gap between application level (users) and technological level (developers) • Complex trade-offs on technological level often not understood on application level • Particularly true for Wireless Sensor Networks –Energy, Memory , Security, Cost – Trade-offs –No one-fits-all solution IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 8. Overview: Model-based System Security Assessment Understood by Application Requirements users C1: Collecting of (soft) user security requirements and transforming them to the (hard) model that allows assessment Security- and C3: Does the system satisfies the requirements? Assessment Models Need for adequate models Inferring properties of the composed system Based on meta-information of the basis components System = composition of basis component (Automatic) selection of basis components Technological basis components services, and C2: Describing individual (security-) properties protocols with of the components as meta-information complex trade-offs IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 9. C1: Collection and Mapping of User Requirements • Full specification of the application mission –Relevant phenomena –Selection of sensors –Expected lifetime and reliability • Hide technical details –Users typically cannot express their security needs • Language easy to use for users – central catalogue – specific catalogues for specific domains IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 10. Two-Step Requirement Definition Process Transformation of requirements - Application type (health care, home, industrial) Attacker model and capabilities - Required security attributes (concealment, integrity, robustness) - Parameters IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 11. C2: Describing attributes components and system • Definition of a (Meta-) component model – Hardware and software components – Protocols, services • Security properties as part of the meta information of the components –Provided by the developers (they know what their components are doing) –Have to be observed by independent experts • Has to support composable security –sec (comp. A + comp. B) = f(sec(comp A), sec(comp B)) IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 12. Component Meta-Model IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 13. C3: Definition of Security Models • Should be able to decide whether a system is secure for the given requirements • Inputs are: –Technical requirements –Properties of the system • Output: –List of conflicts IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 14. Currently implemented Model Approach • Define requirements, environmental information, security properties, attacker properties as properties in one large graph –Connected via relations (formulas) defining how properties depend on and define each other • Security is expressed as views on specific aspects –System is secure is the attribute is free of conflicts on context of requirements, • Starting point is a holistic security model –Successive refinement to assess the aspects IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 15. Holistic Security Model (Ontology) IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 16. Focused Views on the Ontology System properties can be derived Attacker model and capabilities from the properties of the can be derived from the user requirements, used components and the application context IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 17. Example for an Attack-centric Security Model • Based on Attack Trees – A system is secure if all attacks: 1. can be prevented (property of the system), or 2. Do not apply (property of the system requirements) System Security propagation …Attacks… …Attacks… Require- ments/ System Attacker Properties modell IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 18. General Architecture IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 19. Envisioned WSN Design Process IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 20. Example for a Component Selection Tool: configKit -Selection of hardware -Selection of required functions -Definition of security properties -Each change of inputs immediately updates the result Fast and easy refinement process -Proposed software configuration -Including prediction of footprint IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 21. Example for a Component Selection Tool -Selection of hardware -Selection of required functions -Definition of security properties -Each change of inputs immediately updates the result Fast and easy refinement process -Proposed software configuration -Including prediction of footprint IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 22. Conclusions • Assessment models can help to validate the fulfillment of user requirements for a given system Proposed approach shows the general feasibility • Challenges remain: -How to elicit the requirements from the user and to transform them to objective properties -Find models for a-priori reasoning of security-related behavior and conflicts -How to describe properties of components so that they support composition of security IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2011- All rights reserved
  • 23. Thank You Questions? Web: www.wsan4cip.eu www.tampres.eu peter@ihp-microelectronics.com IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany www.ihp-microelectronics.com © 2008 - All rights reserved