Steganographic safety layer over IP

Industrial communications have been evolving and, nowadays, in view of the demands for horizontal and vertical integration, the number of applications consuming safety data over IP networks have also been increasing. In light of this scenario, instead of using a safety fieldbus protocol over IP, this paper proposed the use of some principles from IEC 61784 over a common TCP/IP channel. As the optimization of bandwidth use is a key factor in Internet communication, this paper proposes a lightweight safety layer in terms of both computational and bandwidth costs, with the use of concepts from steganography to provide safety. Through the paper, some measures to allow such a safety communication over TCP/IP are presented and, finally, an evaluation of the proposed protocol for safety data is performed, showing it may be able to reach both SIL3 and SIL4 depending on the BER of the considered communication channel.

[1]  Frank Schiller,et al.  Residual Error Probability of Embedded CRC by Stochastic Automata , 2010, SAFECOMP.

[2]  J C Judge,et al.  Steganography: Past, Present, Future , 2001 .

[3]  Wen-Shyen Chen,et al.  Fast calculation algorithm of the undetected errors probability of CRC codes , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[4]  Kevin Curran,et al.  Biometric Inspired Digital Image Steganography , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).

[5]  Chen Li,et al.  Study on PROFIBUS Frame Transmission Time Property , 2009, 2009 Second International Conference on Information and Computing Science.

[6]  B. Bouman,et al.  SIL classification for intelligent motor control systems in accordance with the ATEX directive , 2008, 2008 5th Petroleum and Chemical Industry Conference Europe - Electrical and Instrumentation Applications.

[7]  Craig Partridge,et al.  Performance of checksums and CRC's over real data , 1998, IEEE/ACM Trans. Netw..

[8]  Robert C. Newman Covert computer and network communications , 2007, InfoSecCD '07.

[9]  Gam D. Nguyen Fast CRCs , 2009, IEEE Transactions on Computers.

[10]  Zhijie Jerry Shi,et al.  Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[11]  Corrinne Pellillo Brase,et al.  Understandable Statistics: Concepts and Methods , 1978 .

[12]  Xiamu Niu,et al.  A Normal-Traffic Network Covert Channel , 2009, 2009 International Conference on Computational Intelligence and Security.

[13]  R. Marfievici,et al.  Industrial Control Communication Framework on an IPv6 Infrastructure , 2006, 2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06).

[14]  Henrik Tobias Brodtkorb A Safety Layer for Foundation Fieldbus , 2001 .

[15]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[17]  Arijit Sur,et al.  Detection of Packet Length Based Network Steganography , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[18]  Craig Partridge,et al.  Performance of checksums and CRCs over real data , 1995, SIGCOMM '95.

[19]  Eric Cole,et al.  Hiding in Plain Sight: Steganography and the Art of Covert Communication , 2003 .

[20]  Mats Björkman,et al.  Exploring Network Security in PROFIsafe , 2009, SAFECOMP.

[21]  Rainer Böhme,et al.  Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.

[22]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .