Skip to main content

Exploring Network Security in PROFIsafe

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2009)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5775))

Included in the following conference series:

Abstract

Safety critical systems are used to reduce the probability of failure that could cause danger to person, equipment or environment. The increasing level of vertical and horizontal integration increases the security risks in automation. Since the risk of security attacks can not be treated as negligible anymore, there is a need to investigate possible security attacks on safety critical communication.

In this paper we show that it is possible to attack PROFIsafe and change the safety-related process data without any of the safety measures in the protocol detecting the attack. As a countermeasure to network security attacks, the concept of security modules in combination with PROFIsafe will reduce the risk of security attacks, and is in line with the security concept defense-in-depth.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sirkka, L., Jämsä, J.: Future trends in process automation. Annual Reviews in Control 31, 211–220 (2007)

    Article  Google Scholar 

  2. Dzung, D., Naedele, M., Von Hoff, T., Crevatin, M.: Security for industrial communication systems. Proceedings of the IEEE 93(6), 1152–1177 (2005)

    Article  Google Scholar 

  3. Tanenbaum, A.S.: Computer Networks, 4th edn. Pearson Education International, London (2003)

    MATH  Google Scholar 

  4. Treytl, A., Sauter, T., Schwaiger, C.: Security measures for industrial fieldbus systems - state of the art and solutions for ip-based approaches. In: IEEE International Workshop on Factory Communication Systems, September 2004, pp. 201–209 (2004)

    Google Scholar 

  5. Harada, M.: Security management of factory automation. In: SICE, 2007 Annual Conference, September 2007, pp. 2914–2917 (2007)

    Google Scholar 

  6. IEC: IEC 61784-3-3. Industrial communication networks - Profiles - Part 3-3: Functional safety fieldbuses - Additional specifications for CPF 3. International Electrotechnical Commission (2007)

    Google Scholar 

  7. Treytl, A., Sauter, T., Schwaiger, C.: Security measures in automation systems-a practice-oriented approach. In: 10th IEEE Conference on Emerging Technologies and Factory Automation, September 2005, vol. 2, p. 9 (2005)

    Google Scholar 

  8. Baud, M., Felser, M.: Profinet io-device emulator based on the man-in-the-middle attack. In: 11th IEEE Conference on Emerging Technologies and Factory Automation, pp. 437–440 (2006)

    Google Scholar 

  9. Åkerberg, J., Björkman, M.: Exploring security in profinet io. 33rd Annual IEEE International Computer Software and Applications Conference (2009) (in press)

    Google Scholar 

  10. Granzer, W., Reinisch, C., Kastner, W.: Denial-of-service in automation systems. In: 13th IEEE Conference on Emerging Technologies and Factory Automation, pp. 468–471 (2008)

    Google Scholar 

  11. Granzer, W., Reinisch, C., Kastner, W.: Key Set Management in Networked Building Automation Systems using Multiple Key Servers. In: Proc. 7th IEEE International Workshop on Factory Communication Systems (WFCS 2008), May 2008, pp. 205–214 (2008)

    Google Scholar 

  12. Neumann, P.: Virtual automation network - reality or dream. In: IEEE International Conference on Industrial Technology, December 2003, vol. 2, pp. 994–999 (2003)

    Google Scholar 

  13. Neumann, P.: Communication in industrial automation-what is going on? Control Engineering Practice 15, 1332–1347 (2006)

    Article  Google Scholar 

  14. Neumann, P., Poeschmann, A., Messerschmidt, R.: Architectural concept of virtual automation networks. In: IFAC World Congress (2008)

    Google Scholar 

  15. IEC: IEC 61784-3. Industrial communication networks - Profiles - Part 3: Functional safety fieldbuses - General rules and profile definitions. International Electrotechnical Commission (2007)

    Google Scholar 

  16. PNO: PROFIsafe - Profile for Safety Technology on PROFIBUS DP and PROFINET IO. Version 2.0. Order No: 3.192. PROFIBUS Nutzerorganisation e.V. (2005)

    Google Scholar 

  17. IEC: IEC 62280-1. Railway applications - Communication, signaling and processing systems - Part 1: Safety-related communication in closed transmission systems. International Electrotechnical Commission (2002)

    Google Scholar 

  18. IEC: IEC 62280-2. Railway applications - Communication, signaling and processing systems - Part 2: Safety-related communication in open transmission systems. International Electrotechnical Commission (2002)

    Google Scholar 

  19. IEC: IEC 61508. Functional safety of electrical/electronic/programmable electronic safety-related systems - Part 1: General requirements. International Electrotechnical Commission (1998)

    Google Scholar 

  20. PNO: PROFINET Security Guideline, Version 1.0. PROFIBUS Neutzerorganisation e.V. (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Åkerberg, J., Björkman, M. (2009). Exploring Network Security in PROFIsafe. In: Buth, B., Rabe, G., Seyfarth, T. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2009. Lecture Notes in Computer Science, vol 5775. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04468-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04468-7_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04467-0

  • Online ISBN: 978-3-642-04468-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics