(714) 671-9000
  • Products
    • Industrial Ethernet
      Unmanaged Switches
      10/100Mbps
      10/100Mbps PoE
      Gigabit
      Gigabit PoE
      10 Gigabit
      10 Gigabit PoE
      Managed Switches
      10/100Mbps
      10/100Mbps PoE
      Gigabit
      Gigabit PoE
      10 Gigabit
      10 Gigabit PoE
      Industrial Rackmount Switches
      Unmanaged
      Managed
      Industrial Routers
      Dynamic Product Filter
      BABA Compliant
    • Media Converters
      Unmanaged
      10/100TX to 100FX
      10/100/1000TX to 1000FX
      10G
      Ethernet Extenders
      Industrial
      PoE
      Rackmount Chassis
    • Serial Communication
      Serial to Ethernet
      RS232
      RS422/485
      RS232/422/485
      Serial to Wireless
      Serial Media Converters
      RS232 To RS422/485
      Serial Repeaters
      RS232 to CAT5
      Serial to Fiber
      Fieldbus Gateway
      Modbus Gateway
      Multiport Serial Cards
      PCIe RS232
      PCIe RS422/485
      uPCI RS232
      uPCI RS422/485
      uPCI RS232/422/485
      Industrial USB
      USB to Serial
      USB to Ethernet
      USB Hub
      USB Expansion Cards
    • Sena
      Bluetooth
      Accessories
    • Wireless
      AP/Bridges/Repeaters
      Din Rail Mounted
      IP67 Rated
      Wireless Routers
      Industrial IoT Gateways
      Wireless Bridge
    • SFP Modules
      100Mbps
      Gigabit
      10G SFP
      10G XFP
    • Accessories
      Industrial Ethernet
      Cables
      Adapters
      Mounting
      Wireless
      Mounting
      Antennas
      Cables
      PoE Injectors
      SFPs
      Cables
      Media Converters
      Cables
      Adapters
      Mounting
      Chassis Power Supplies
      Serial Communication
      Cables
      Adapters
      Antenna
      Power Supplies
      DIN-Rail Mounted
    • Power Supplies
      Industrial Din-Rail
      Power Adapters
    • PoE
      Unmanaged Switches
      10/100Mbps
      Gigabit
      10 Gigabit
      Managed Switches
      10/100Mbps
      Gigabit
      10 Gigabit
      Media Converters
      10/100Mbps
      Gigabit
      Injectors
    • Specialty Solutions
      60 Watt PoE++
      90 Watt PoE++
      90 Watt Injectors & Media Converters
      90 Watt PoE++ Industrial Switches
      M12 Switches
      Compact Devices
      Industrial Ethernet Switches
      Industrial Media Converters
      Conformal Coating
      Class 1 Div 2
      IEC 61850-3
      EN 50155
    • Low Voltage PoE
      Managed
      10/100 Mbps
      Gigabit
      10 Gigabit
      Unmanaged
      10/100 Mbps
      Gigabit
      10 Gigabit
    • Software Solutions
      Connect VPN
      Antaira NMS
  • Support
    • Request Customer Service
    • Request Technical Support
    • Request RMA
    • Request Product Info
    • Request Volume Pricing
    • 30 Day Evaluation Program
    • NMS Request Form
    • Product Notices
    • Warranty Policy
  • Resources
    • Product Selector
    • Product Filter
    • Literature
    • Industries
    • Media
    • Technical Writing
    • Press Releases
    • E-Newsletter
  • Where To Buy
  • About
    • About Antaira
    • Patented Tech
    • Events
    • Contact Us
  • Login
  • 0
    • Europe

    • Asia

    • Poland

    • Russia


Security in Remote Monitoring Systems for IIoT Applications



Increasingly, machine manufacturers or automation system integrators look for solutions that allow them to easily and quickly monitor installed equipment and systems on-site. Such remote supervision allows to reduce implementation costs and offer a package of added services to control process parameters and anticipate possible faults before they occur. An important element is the security of data transmission, so that it is resistant to attempts to interfere with the operation of the monitored system, ensuring the integrity and reliability of transmitted data. So let's take a look at an exemplary implementation of the ARS and AGS router series from Antaira Technologies. The system allows free shaping of the monitoring system topology. Various process data or video streaming can be transmitted. An exemplary implementation is shown in Figure 1.

Advanced remote monitoring systems use routers that use VPN encrypted transmission channels and servers in the cloud. Such a solution allows to bypass the limitations imposed by the firewall or NAT, as well as allows to use static IP addresses on the side of the monitored device and surveillance station.

What affects the security of these solutions? We can list a number of norms and standards that systematize cybersecurity. The most popular are NIST 800-53, NERC CIP for power generation or IEC 62443. They give a number of recommendations for system designers, network component manufacturers, as well as users – defining a catalogue of good practices for safe industrial automation systems. System protection means resemble multi-level protection of a strategic object and are sometimes called “Defense in Depth” or “Castle Approach”. They are divided into three aspects – physical, technical, and administrative.

Physical security is ensured by securing the infrastructure, especially cloud servers and end point routers. The locations of the servers are protected against third party interference. Both hardware and software are constantly updated, and their operating status is monitored on an ongoing basis. Applications are optimized and validated for safety. Another important element is to secure the router by introducing multiple access levels, forcing strong periodically changed passwords, analyzing packets in terms of their structure and filtering, rules and QoS rules. An important element is also the self-diagnosis and implementation of the Watch-dog timer, allowing for an automatic reset in case of communication problems. From a technical point of view, an important element is to secure the transmission channel. Confirmation of compliance with these standards are ISO 27001 and AICPA safety certificates. Let's take a look at one of the most secure VPN implementations using the Open VPN protocol. We can distinguish three levels of security when establishing communication between end points:

• Authentication – Checking if the server and client are the ones we actually want to connect to. This can be done with a login and password or with authentication keys. The second method is safer and is used in industrial systems. This prevents someone from obtaining an authorization element (e.g. a password) or trying to impersonate a VPN server. Thanks to TLS, a server always has its own key, issued certificate and CA certificate. On the client's side, there must also be a copy of the relevant CA certificate. The authentication must end successfully on both sides – the server (cloud) and the client (router).
• End Points Authorization – Verification, whether a given client has the right to access the VPN network. As above, it can be done on the basis of a password - a set of keys.
• Cipher – Consists in encrypting the transmission in such a way that it cannot be read and modified.

There are also other mechanisms that are designed to increase the security of the transmission. In OpenVPN, there is a keyed-Hash Message Authentication Code (HMAC) mechanism that uses a separate key to sign each control packet when starting transmission. Data that is not properly signed with such a key is automatically rejected. Another form is multicomponent authentication, where an interesting and secure implementation is AWS MFA (Amazon Multi-Factor Authentication).

For secure communication, a method was needed to effectively authenticate its participants and ensure its integrity. For this purpose, public key infrastructure has been created, i.e. a set of elements enabling the creation of keys, certificates, their signing, revocation and verification. The entire service is handled by trusted companies called Certificate Authorities. When creating a VPN connection, the cloud server generates a key pair consisting of a private key and a public key, together with a request to sign a certificate (CSR). CSR is an encoded text file that contains the public key and other information that will be included in the certificate. After the CSR is generated, the server sends it to the certification authority, which checks whether the information contained therein is correct and if so, digitally signs the certificate with a private key and sends it back. In addition, it is worth paying attention to the security – the certificate's purpose. Thanks to this, even if we have a certificate signed by our CA, but it is not a server type, we will not run our own server. This makes it impossible for a client with a valid client certificate to impersonate a cloud VPN server. The authorization process ensures that only authorized devices can establish communication and that the transmission is encrypted and protected against modification by third parties. The authentication and authorization processes are as follows:

• A router connects to a server and presents its CA-signed certificate, the server verifies its correctness with the CA certificate.
• The server presents its CA-signed certificate and the client verifies it on the basis of the CA certificate.
• The server encrypts the transmission to the client with a public client key and the client decrypts it with their private key.
• The client encrypts the transmission to the server with a public server key and the server decrypts it with its private key.
• The server uses its private key to sign (ensure integrity and certainty of origin) data to the client, and the client verifies it with a public server key.
• Client signs data to the server with their private key and the server verifies it with the client's public key.

Remote monitoring systems allow you to control any machine or system from anywhere in the world. The manufacturer or integrator can monitor the operating parameters of a system installed in a place hundreds or thousands of kilometres away in real time. This allows for remote optimization and early detection of problems without the need to send a service technician on site. The security of such solutions is one of the key elements and is ensured by multi-level hardware and software protection. Current solutions provide a high level of security with easy and cheap implementation. Browse Antaira's website to learn more about our wireless routers and Power over Ethernet (PoE) switches.



Figure 1
(Surveillance and Monitoring System)

The article uses information from https://openvpn.net



      • Europe

      • Asia

      • Poland

      • Russia

ANTAIRA TECHNOLOGIES, LLC.    |    7660 Dean Martin Dr., Suite 201, Las Vegas, NV 89139    |    TELEPHONE: +1-714-671-9000 (USA)    |    E-MAIL: INFO@ANTAIRA.COM
SITEMAP
© 2022 PRIVACY POLICY
ANTAIRA TECHNOLOGIES, LLC.
7660 Dean Martin Dr., Suite 201, Las Vegas, NV 89139
TELEPHONE: +1-714-671-9000 (USA)
E-MAIL: INFO@ANTAIRA.COM
SITEMAP
© 2022 PRIVACY POLICY