Method for monitoring a tamper protection and monitoring system for a field device having tamper protection
The invention relates to a method for monitoring a tamper protection, a monitoring system for a field device having tamper protection and to a use of a monitoring system.
Field devices, for example in the form of traffic signal installations for traffic control, signal installations for trains, switches etc., are usually connected to a control station or a signal box for the operating and monitoring thereof. In this context, the communication between field device and control station can take place both wire-connected by means of correspondingly run cables or also wirelessly by means of a radio link.
In order to be able to detect a physical manipulation at a field device by a possible attacker, corresponding sensors, for example motion sensors, can be arranged. In order to impede a manipulation of electronic circuits in the field device itself, hardware security-integrated circuits have additionally become known which store cryptographic keys and can perform cryptographic operations. Such integrated circuits usually have a tamper protection, for example in the form of sensors arranged directly on the integrated circuit. These are designed for detecting unauthorized opening of the integrated circuit.
Such a hardware security-integrated circuit has become known, for example, as “trusted platform module”, the data of which can be called up at http://de.wikipedia.org/wiki/trusted_platform_module. Such integrated circuits are installed in PCs or notebooks, for example.
Finally, it has become known from the field of burglar alarm installations and alarm installations for buildings to use contacts at doors and windows and/or motion sensors for signaling a break-in or unauthorized opening or penetration into the building or into a room. In the case of a break-in into a building, for example, an alarm is triggered by a siren or the like and it is also possible to contact a police operations center at the same time. To protect the alarm installation against manipulations, the sensors themselves, used in burglar alarm installations or in alarm installations can be equipped with so-called tamper sensors which detect a manipulation of the burglar alarm installation or of the alarm installation, especially when the housing is opened and/or a sensor is dismantled. The tamper sensors then transfer the information to the alarm installation which, in turn triggers an alarm.
In order to protect parts of a circuit board or an entire circuit board against a manipulation, it has also become known to screw metal plates onto the circuit board in such a manner that a capacitor is formed overall. The capacitance of this capacitor is then continuously monitored so that in the case of a deviation of the normal capacitance value, for example by touching the metal plate or its removal, a change in the capacitance occurs. If a change in the capacitance is found, an alarm can be triggered and a memory on the board which, for example, contains sensitive data, can be deleted so that an attacker cannot obtain access to the sensitive data.
It is an object of the present invention to provide a method for monitoring a tamper protection of a field device and a monitoring system for a field device having tamper protection in which tamper protection is provided for in a simple and cost-effective manner. At the same time, they should be flexibly upgradable and adaptable in a simple and cost-effective manner for a multiplicity of different devices and provide a desired security level against physical manipulation.
This object is achieved by a method for monitoring a tamper protection of a field device, comprising the steps of checking whether a manipulation has taken place at the field device, outputting of a non-manipulation certificate if a negative test result has been determined, transmitting of the non-manipulation certificate, checking of the non-manipulation certificate by a registration device, determining an active status of the field device by the registration device if the non-manipulation certificate is valid, checking of the field device by a monitoring device by inquiring about the status of the field device, and transferring the field device data to the monitoring device, accepting of the field device data by the monitoring device if the field device has an active status.
This object is also achieved by a monitoring system for a field device having tamper protection, especially suitable for carrying out a method as claimed in at least one of claims 1-5, comprising a tamper monitoring device which is designed for monitoring the field device for tamper protection, a registration device for registering and monitoring the status of the field device, a monitoring device for controlling and monitoring the field device, wherein the tamper monitoring device is designed for checking whether a manipulation has occurred at the field device and outputs a non-manipulation certificate if a negative test result has been determined, and wherein the registration device is designed for checking the non-manipulation certificate and determining an active status of the field device in the case of a valid non-manipulation certificate, and wherein the monitoring device is designed for checking a status of the field device, and wherein the monitoring device is designed for accepting field device data if the field device has an active status.
This object is also achieved by using a monitoring system as claimed in at least one of claims 6-10 for monitoring a traffic installation or for monitoring a transformer substation.
One advantage achieved by this means is that a tamper protection can be upgraded in a simple manner and without relatively great expenditure especially also in the case of field devices already being present. A further advantage is that the field device to be monitored can be developed and produced without having to take into consideration specially designed tamper protection measures in the field device itself. As well, the method for monitoring the tamper protection only blocks the field device and/or a security key deposited in the field device so that any data possibly read out of a memory of the field device, especially the security key which may have been read out by an attacker will not be of any use to the latter. A further advantage is that such monitoring of a tamper protection can be used for many different types of field devices which lowers the production costs for respective field devices considerably. The tamper protection only needs to be developed once and not separately for each field device type. In addition, no direct communication is needed between the tamper protection monitoring device and the field device which also saves production costs.
Further advantageous developments of the invention are described in the subclaims.
Suitably, the transmitting of the non-manipulation certificate to the registration device takes place by means of the field device. In this manner, no additional interfaces are needed for transmitting the non-manipulation certificate, it is possible to utilize pre- existing communication channels or lines of the field device. Overall, the production effort for a tamper monitoring device for the field device is thus lowered.
Advantageously, the transmitting of the non-manipulation certificate occurs essentially at the same time as a transmitting of the field device data, wherein especially the non-manipulation certificate and the field device data are transmitted to a common control device comprising the registration device and the monitoring device. The advantage achieved by this means is that it is thus possible to check in a particularly rapid and reliable manner whether a physical manipulation of the field device has taken place.
The transmitting of the non-manipulation certificate is suitably carried out by means of the Internet and/or by means of at least one mobile radio network and/or by means of at least one satellite network. The advantage thus achieved is that as reliably as possible a transmission is thus guaranteed in a simple manner, especially when a number of transmission types are used in parallel. At the same time, conventional transmission paths can be used which are inexpensive since the devices needed for the transmission are available in large numbers.
Suitably, at least the steps of checking whether a manipulation has occurred at the field device, outputting of a non-manipulation certificate if a negative test result has been determined and transmitting of the non-manipulation certificate are carried out at regular time intervals. The advantage is that the status of the corresponding field device is thus determined reliably as being inactive in the case of a lack of the transmission of the non-manipulation certificate.
Advantageously, a control device comprising the registration device and the monitoring device is arranged in the monitoring system. The advantage achieved by this means is that, as result, no additional external interfaces need to be arranged or cables or the like need to be laid in order to check the non-manipulation certificate. At the same time, field device data and non-manipulation certificate can be transmitted between field device and monitoring device on the communication channels already existing which simplifies the operation, control and monitoring of the field device considerably.
The control device is suitably designed in the form of a SCADA control board or of an ERP system. The advantage thus achieved is that a control device is provided in a simple and reliable manner by this means. In addition, such a control device is designed not only for monitoring a tamper protection of a field device but can also handle additional tasks such as, for example a visual display, regulation or the like of other systems or devices.
Suitably, at least one of the devices comprises a communication interface to the Internet, to a mobile radio network and/or to a satellite network. The advantage thus achieved is that by this means as reliable as possible a transmission is guaranteed especially if a number of transmission networks are used in parallel. At the same time, the existing transmission paths can be used which are cost-effective since the devices needed for the transmission are easily available.
Advantageously, the tamper monitoring device has an autonomous power supply. In this manner, a physical manipulation of the tamper monitoring device itself is reduced. At the same time, the fault tolerance of the tamper monitoring device is increased since no external power supply is necessary and thus the tamper monitoring device still monitors the field device in the case of a power failure.
Further features and advantages of the invention are obtained from the subsequent description of exemplary embodiments, referring to the drawing in which, diagrammatically:
a,4b show tamper monitoring devices as claimed in a first and second embodiment;
In
If it has not detected any physical manipulation or a tamper event, the tamper monitoring device 2 issues a non-manipulation certificate or a non-tampering assertion NTA and transmits these (reference symbol 10) to the field device 1 protected by the tamper monitoring device 2. The non-tampering assertion is then transmitted, for example, to a registration device 3 which is designed in the form of a device registry server (reference symbol 11). The latter blocks the field device 1, its security feature or its security credentials which, for example, are present in the form of certificates, keys, passwords or field device accounts, if no non-tampering assertion issued to the tamper monitoring device 2 allocated to the field device 1 is present at the device registry server 3 during a particular time interval or is transmitted to the latter. The status of the field device 1 is then specified as inactive.
If a valid non-tampering assertion is present, the status of the field device 1 is deposited as active in the registration device 3. In the meantime and/or also thereafter, the field device 1 transmits (reference symbol 12) field device data, for example control data or feedback data of the field device 1 to the monitoring device 4. The monitoring device 4 can be constructed, for example, as control computer, as stored-programmable controller, as SCADA control board, as ERP system or the like. The monitoring device 4 then tests in a further step (reference symbol 13) whether the status of the field device 1 is active. For this purpose, the monitoring device 4 inquires about the status of the field device 1 at the registration device 3. The registration device 3 transmits (reference symbol 14) the status to the monitoring device 4. If the status of the field device 1 is valid, the monitoring device 4 accepts the field device data transmitted to the monitoring device 4 from the field device 1 and can transmit control data for the field device 1 (reference symbol 15).
Should a physical manipulation be performed at the field device 1, for example by an attacker, this is detected by the tamper monitoring device 2. The tamper monitoring device 2 thereupon issues no further non-tampering assertions and no more non-tampering assertions will thus be transmitted to the field device 1, either. If then the registration device 3 receives no further non-tampering assertions from the field device 1, the status of the field device 1 is deposited as inactive by the registration device 3 after a certain predeterminable time interval. Even if an attacker should thus succeed in reading out keys for encryption from the field device 1 itself by a physical manipulation, he cannot use these for accessing the monitoring device 4 since the monitoring device 4 firstly detects or has detected the status of the field device 1 as inactive by interrogation at the registration device 3 and thus no longer accepts any field device data from the field device 1 and also transmits no further control data to the field device 1.
Essentially,
a, 4b show tamper monitoring devices according to a first and a second embodiment.
In
The tamper monitoring device 2 monitors by means of the sensors 104a whether tampering is taking place, that is to say a physical manipulation of the field device 1. In this context, the sensors can be designed, for example, as motion sensors, light sensors, contacts, wire netting or similar. As long as no physical manipulation is found by the tamper monitoring device 2, the tamper monitoring device issues a non-tampering assertion. In this context, the non-tampering assertion can be designed, for example, as a data structure which contains an identification number of the tamper monitoring device 2 and time information and/or a counter value. The data structure can be encrypted and provided with a cryptographic checksum, for example in the form of a digital signature or a message authentication code. The cryptographic checksum can be calculated by means of a cryptographic key stored in the tamper monitoring device 2 and provided by means of the interface 105. The interface 105 is designed to be wire-connected in
In this context, a non-tampering assertion can also contain at least one of the following information items: an identification information item of the tamper monitoring device 2, additional information relating to the field device 1 which is monitored by the tamper monitoring device 2, a status of the field device 1, an information item about a physical manipulation, for example a note relative to a housing opening of a temperature in the case of too high a temperature difference or the like, furthermore a time information and/or a signature for authentication and securing integrity.
In
Although the present invention has been described above by means of preferred exemplary embodiments, it is not restricted to these but can be modified in many ways.
For example, the tamper monitoring device can be constructed as a separate device which is arranged at the field device to be monitored or a plurality of field devices to be monitored. In this context, the tamper monitoring device can be constructed as so-called intermediate unit, that is to say mounted between the field device to be monitored and a fixed arrangement, for example a wall, a rail or the like. The tamper monitoring device can be constructed in a separate additional housing, for example for a circuit board. It is also possible to install or to integrate the tamper monitoring device and the sensors possibly present for a tamper monitoring device into the field device to be monitored itself.
In the description and particularly in the claims, a non-manipulation certificate is to be understood to be not only essentially a non-tampering confirmation message or a non- tampering assertion but also a message which specifies that a physical manipulation of the field device monitored has taken place. If a physical manipulation is found, a manipulation certificate can thus be issued if a positive test result has been determined. In order to be able to process these in the sense of the invention, particularly as shown in the claims and in the figure descriptions, the field device, monitoring device and the registration device can be designed accordingly.
Furthermore, the registration device can be designed in such a manner that it is connected to a certification station. In this context, the certification station can provide the registration device with a certificate revocation list in which a field device certificate of the field device monitored by the tamper monitoring device is listed. As an alternative, the field device certificate can be provided by an online certificate status protocol replier or by an online certificate status protocol responder. This provides for an online transmission of the certificate revocation list.
Number | Date | Country | Kind |
---|---|---|---|
102011007572.0 | Apr 2011 | DE | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2012/056517 | 4/11/2012 | WO | 00 | 10/17/2013 |