Access Control in Safety Critical Environments

This paper describes an access control system for industrial automation and control systems (IACS) and similar automation systems for smart energy grids. The intended area of applications of the proposed system are control/station and substation networks to protect connected devices and associated safety relevant settings from unauthorized access. The proposed solution for access control introduces a two-stage access control schema. The first stage evaluates policies based on the eXtensible access control markup language (XACML) and the second stage uses knowledge about the system's behavior to prevent malicious or accidental operations that have negative impact on the systems stability. The access control system uses RFC 5755 attribute certificates to store properties of subjects, resources, rsp. objects and system information. The design and implementation of the system considers safety requirements such as timing requirements or availability in order to enable an integration in safety-critical environments.

[1]  Ravi S. Sandhu,et al.  An Attribute Based Framework for Risk-Adaptive Access Control Models , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[2]  D. Richard Kuhn,et al.  Adding Attributes to Role-Based Access Control , 2010, Computer.

[3]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[4]  David M. Nicol,et al.  Next-Generation Access Control for Distributed Control Systems , 2016, IEEE Internet Computing.

[5]  Thomas P. von Hoff,et al.  Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.

[6]  Adriano Valenzano,et al.  Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.

[7]  Dae-Kyoo Kim,et al.  Role-based access control for substation automation systems using XACML , 2015, Inf. Syst..

[8]  Kaiyu Wan,et al.  Context-Aware Security Solutions for Cyber-Physical Systems , 2012, Mobile Networks and Applications.

[9]  David W. Chadwick,et al.  How to Break Access Control in a Controlled Manner , 2006, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06).

[10]  Ludovic Piètre-Cambacédès,et al.  A survey of approaches combining safety and security for industrial control systems , 2015, Reliab. Eng. Syst. Saf..

[11]  Edward J. Coyne,et al.  ABAC and RBAC: Scalable, Flexible, and Auditable Access Management , 2013, IT Professional.

[12]  Joerg Abendroth,et al.  A Mechanism for Requesting Hierarchical documetns in XACML , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[13]  Ludovic Piètre-Cambacédès,et al.  Modeling safety and security interdependencies with BDMP (Boolean logic Driven Markov Processes) , 2010, 2010 IEEE International Conference on Systems, Man and Cybernetics.

[14]  Andrew J. Kornecki,et al.  Safety and security in industrial control , 2010, CSIIRW '10.

[15]  Russ Housley,et al.  An Internet Attribute Certificate Profile for Authorization , 2010, RFC.

[16]  Mauro Onori,et al.  Application of Attribute Based Access Control Model for Industrial Control Systems , 2017 .

[17]  Bernhard Mitschang,et al.  Situation-Aware Access Control for Industrie 4.0 , 2017, ICISSP.

[18]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[19]  John C. Knight,et al.  Safety critical systems: challenges and directions , 2002, Proceedings of the 24th International Conference on Software Engineering. ICSE 2002.

[20]  Ramaswamy Chandramouli,et al.  Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) , 2016, ABAC '16.

[21]  Bruno Crispo,et al.  Performance evaluation of XACML PDP implementations , 2008, SWS '08.