Industrial Internet Security Framework v 1.0 | Page 85

Security Framework
9 : Protecting Communications and Connectivity
The figure below shows prominent communication and connectivity standards at different OSI layers . An in-depth discussion of connectivity assessment is provided in the ‘ Industrial Internet Connectivity Reference Architecture ’.
Figure 9-3 : Example of IIoT core Communication & Connectivity Standards
9.1.4 CRYPTOGRAPHIC PROTECTION FOR DIFFERENT COMMUNICATIONS AND CONNECTIVITY PARADIGMS
Different information exchange patterns have different security requirements . Widely used patterns in IIoT systems include request-response pattern and publish-subscribe pattern .
The request-response pattern can be used at any layer of the stack . Protocols using this pattern include Java Remote Method Invocation ( Java RMI ), Web Services / SOAP , Remote Procedure Call over Data Distribution Service ( RPC-over-DDS ), Open Platform Communication ( OPC ), Global Platform Secure Channel Protocol and Modbus . They vary in their support for security ; For example , Modbus can ’ t suppress broadcast messages , doesn ’ t provide message checksums and lacks support of authentication and encryption .
The primary types of threats for publish-subscribe communication pattern are unauthorized subscription , unauthorized publication , tampering and replay and unauthorized access to exchanged data . Some implementations of this pattern ( e . g ., classic MQTT and AMQP ) rely on intermediary message brokers store-and-forward messages , but the message broker could be a single point of failure . An alternative approach is broker-free , peer-to-peer implementations such as the DDS standard .
IIC : PUB : G4 : V1.0 : PB : 20160926 - 85 -