Conference PaperPDF Available

Covert and Side Channels in Buildings and the Prototype of a Building-aware Active Warden

Authors:

Abstract and Figures

Covert channels and side channels are barely discussed topics in the area of building automation. We show that both channels exist in buildings and define a building in the context of multilevel security (MLS). Additionally, we present a system called the building-aware active warden to eliminate covert/side storage channels in building automation systems (BAS). Active wardens aim to remove malicious (covert) elements in communications and are a well-known means from the area of network covert channels and steganography. Within the last years, new models, such as the network-aware active warden, were developed. The presented building-aware active warden is an adaption of the concept of a network-aware active warden to building automation. Building-aware active wardens modify or drop building automation commands as well as building information requests from users based on their security levels to enhance a building's security. We extended an interoperable system for building automation supporting hardware from two vendors for the purpose of a building-aware active warden and for providing an unified application programming interface.
Content may be subject to copyright.
Covert and Side Channels in Buildings and
the Prototype of a Building-aware Active Warden
Steffen Wendzel1,2
1Faculty of Mathematics and Computer Science, University of Hagen, Germany
2Faculty of Computer Science, Augsburg University of Applied Sciences, Germany
Abstract—Covert channels and side channels are barely dis-
cussed topics in the area of building automation. We define
a building in the context of multilevel security (MLS) and
show that covert channels and side channels exist in building
automation. Additionally, we present a system called the building-
aware active warden to eliminate covert/side storage channels
in building automation systems (BAS). Active wardens aim to
remove malicious (covert) elements in communications and are
a well-known means from the area of network covert channels
and steganography. Within the last years, new models, such as
the network-aware active warden, were developed. The presented
building-aware active warden is an adoption of the concept of a
network-aware active warden to building automation. Building-
aware active wardens modify or drop building automation
commands as well as building information requests from users
based on their security levels to enhance a building’s security.
We extended an interoperable system for building automation
supporting hardware from two vendors for the purpose of
a building-aware active warden and for providing an unified
application programming interface.
I. INTRODUCTION
Covert channels and side channels in building automation
systems are still unhandled threats. We propose an active war-
den as an approach to handle such malicious communication
channels. The diversity of the involved topics caused us to
provide brief introductions before we describe the main idea
of an building-aware active warden.
Covert Channels and Side Channels: A covert channel is
a communication channel that was never designed to be used
as a communication channel [1]. Thus, using network covert
channels it is possible to send information in a way prohibited
by a security policy [2]. Network covert channels can be used
to keep a low profile when transferring illicit information
[3]). Network covert storage channels utilize storage attributes
of network protocols while network covert timing channels
modify the timing behavior of network data (e.g. packet
ordering/intervals) [3].
In contrast to covert channels, side channels leak infor-
mation without an explicit sender [4] (e.g. cryptographic
algorithms can leak key information through their cpu con-
sumption, memory consumption or timing behavior).
A number of publications (e.g. [5], [6], [7], [8]) describe
how to implement covert channels in network packets and
packet timings. However, means against covert channels are
available as well (e.g. [5], [9], [10], [11], [12], [13], [14], [15]).
Building Automation: Building automation systems (BAS)
are systems within buildings which are used to control and
monitor the building [16], mainly in the context of heating,
ventilation and air-conditioning (HVAC). For instance, build-
ing automation systems are used to optimize a room’s indoor
climate, to automatically open/close windows, to control the
ligthening and to monitor access requests to rooms. Due
to the increasing number of automated buildings and their
increasing capabilities, the importance and need for secu-
rity in such environments increases. Security in networked
building automation systems (BAS) was discussed in previ-
ous publications: [17] analyzed security aspects of fieldbus
systems in building automation. [18] introduced EIBSec, a
secure version of the EIB protocol using AES and providing
confidentiality, integrity, data freshness, authentication, key
management and key distribution functionality. The authors
also explained possible economic impacts of security threats
in BAS by giving the example of a BAS user who turns on
a building’s lighting at night. [16] gives a more detailed view
on building automation security by analyzing general aspects
(such as intrusion detection) and also mentioned the possible
threat of side channels (a detailed discussion of side channels
was not presented).
Active Wardens: A traffic normalizer is a gateway with the
capability to prevent malicious communication (e.g. caused by
botnet software). Traffic normalization is usually implemented
as part of a firewall system [19] and is capable of blocking and
modifying network packets. For instance, a typical technique
of a normalizer is to clear bits in network packets [20].
Since a traffic normalizer actively modifies traffic, it is
called an active warden [21]. A passive warden does only
monitor events (e.g. network traffic) to alert in case malicious
communication (e.g. steganographic information transfer) is
taking place. Active wardens with support for so-called active
mapping reduce the problem of data that can be interpreted
in multiple ways [22] by mapping a network (including its
policies). Lewandowski et. al. presented an idea based on
active mapping that is called the network-aware active warden
[22]. Such systems contain knowledge about the network
topology as well as they are capable to apply stateful traffic
inspection to eliminate covert channels [23].
Our approach of a building-aware active warden is based on
the idea of the network-aware active warden. In contrast to the
network-aware active warden, our system does not only have
knowledge of a network topology (in this case, the network
topology of a building), but is also aware of a building’s users,
their roles and security levels. In contrast to a firewall system,
we do not only block requests, but also modify them in order
to allow partial requests to the BAS as long as they conform
with the security policy.
We extend the existing approaches in BAS security by
investigating covert channels and side channels in automated
buildings. Additionally, we describe the design and imple-
mentation of the building-aware active warden for the net-
work communication within the BAS by extending existing
approaches with the concept of multilevel security (MLS).
The building-aware active warden aims to prevent malicious
communication within the BAS. We analyze the differences
between the existing approaches for BAS security and the
building aware-active warden. Open problems in eliminating
side channels and covert channels in buildings are discussed
as well.
The remainder of this paper is organized as follows. Section
II introduces the problem of covert channels and side channels
in building automation systems and explains our adoption of
multilevel security (MLS) to building automation systems.
Section III discusses the design and implementation of the
building-aware active warden while Section IV discusses the
results of our approach and explains a covert timing channel
not eliminated by our concept. Section V concludes.
II. COV ERT CH AN NE LS A ND SIDE CHANNELS IN
BUILDING AUTOMATION
We define a building as a multilevel secure (MLS) system.
While this is not meaningful for small homes, the situation
differs for public buildings and company buildings. Thus,
our approach focuses on larger buildings where the concept
of MLS can be applied. Since multilevel security systems
must contain a set of levels, we adopt these levels from
the organizational structure of a given company or public
institution. In our model, as usual in multilevel security, a
high security level dominates the lower security level. For
associating persons with levels, we link levels in organizational
charts to MLS levels. If, for instance, a company contains three
classes of associated people: The CEO, some managers, and
other staff, there must be three security levels (more can be
applied, if necessary). Fig. 1 shows a sample MLS structure
applied to an organizational chart.
Fig. 1. Sample organizational chart with MLS levels.
Regarding to the Bell-LaPadula model, we must ensure that
two rules can be applied to the building’s security levels [2]:
1) There must be no way to write confidential data from a
higher level to a lower level (no write-down, NWD).
2) There must be no way to read confidential data from a
higher level by a lower level (no read-up, NRU). If an
attacker can bypass one of these rules, a covert channel
or a side channel can be created.
In building automation, a side channel occurs when a
low-level user (e.g. an employee) can monitor behavior of
higher levels. Example 1: An employee uses a side-channel
to monitor whether the company’s director is turning on his
office’s lighting and thus is currently located in his office. This
can either represent a write-down, i.e. the user can eavesdrop
events occurring in the BAS, or a read-up, i.e. the user is able
to request information of a higher level using the BAS.
Acovert channel occurs when a high-level user sends infor-
mation to a low-level user, which is less likely because such
information can in most cases be transferred without the BAS.
However, a covert channel can occur in large organizations.
Example 2: Alice and Bob cooperate to steal money and
are located in different floors of the same building. Alice can
use the BAS (e.g. by turning on the light in Bob’s room) to
signal Bob to raise attention (e.g. by creating some smoke
for a fire alarm). While the building is getting evacuated,
Alice can steal the money while not being linked to the fire
alarm which was raised in another floor. Thus, Bob will be
aspersed but can probably prove that he was at the location of
the fire at the moment the money was stolen. Example 3: A
(previously payed) warden could signal a prisoner (by turning
off the lighting in the prisoner’s cell) that he will not be in
the prisoner’s floor for a few moments. The prisoner can try to
escape within this time and the BAS write-down is no obvious
detectable communication.
In our model, an attacker is either internal (i.e. an employee
with direct access to the BAS interface) or external (i.e. only
remote (web) access to the BAS is provided). The goal of
the adversary is (1) to obtain confidential data (e.g. detecting
the location of inhabitants or whether someone is currently in
the office) either by a read-up or a write-down using a side
channel, or (2) to send confidential data to a lower level by
using a covert channel by bypassing the NRU or NWD rule.
In our model, each person is linked to some devices as
shown in Fig. 2. Thus, it is obviously easy to apply the
mentioned MLS rules NWD and NRU. However, if two
persons with different security levels share a device (e.g. two
persons of two security levels both need access to the meeting
room and both have access to the lighting in the meeting
room), a conflict comes up (Fig. 2): If the device in such
a shared room is linked to the higher security level, the low-
level person is not allowed to access the device. If, on the
other hand, the device is linked to the low level, the low-level
user is able to obtain information via side channels. To solve
this conflict, temporary permissions for low-level persons or
temporary level-downgrades for the devices located in a room
are thinkable.
Fig. 2. Shared devices on the same level (e.g. both persons have access to
the conference room).
An additional problem occurs when users of a given MLS
level are allowed to access all devices at their security level.
For instance, a level 2 accountant can access level 2 research
data. A solution for these kind of problems is to additionally
apply role based access control (RBAC) as described in the
next section.
Due to the low-level improvements such as EIBSec [18],
the eavesdropping on the lower communication level by ex-
ternal attackers can be prevented since they cannot send/read
encrypted frames to the building automation network. For
internal attackers, such problems can also be solved by using
asymmetric cryptography. At the moment, symmetric algo-
rithms are used since the chips in the devices are not powerful
enough to handle asymmetric algorithms in acceptable time
[18]. However, this problem will be solved by more powerful
hardware. Thus, our focus relies on the higher communication
level (the middleware) where we concentrate on both, the
prevention of write-downs (eavesdropping) as well as the
prevention of read-ups due to prohibited information requests.
III. DES IG N AN D IMP LE ME NTATION OF A HIGH-LEVE L
APP ROAC H
A first prototype was implemented to illustrate the useful-
ness of our security approach. The prototype is based on a
previously developed middleware (described later in this Sect.)
which can handle both, the HomeMatic automation system
(www.homematic.com) by eq-3 and the CurrentCost energy
consumption monitoring system (www.currentcost.com) by
CurrentCost Ltd. Both systems are end-user systems but can
be used to verify our approach nevertheless.
As already discussed, the focus of our building-aware active
warden is on higher communication levels and not on the direct
network access level. Therefore, the building-aware active war-
den is required to be located between the building’s end-user
software and the building automation system itself (see Fig. 3).
In our case, it is implemented as a network service running on
a stand-alone system. Our prototype is designed for building
automation systems containing a coordinator instead of peer
components, i.e. there is a single interface the active warden
can use to interact with the BAS. Other BAS architectures
(multi-agent based) will be taken into account in future work.
Nowadays, users have – in many cases – direct access to
a (part of the) building control software (e.g. to the Home-
Matic web-interface) without any multilevel-secure protection
means. Before we continue, a short exemplary introduction
shall be provided for one system (the HomeMatic). The Home-
Matic system contains multiple components (cf. Fig. 4): A
Fig. 3. A building-aware active warden is the gateway between users and
building automation.
user-accessible control interface, a central control unit (CCU),
and a number of sensors and actuators used to monitor and
control a building. The system works as follows: A sensor (e.g.
temperature sensor) sends its value (e.g. measurement value
of the current temperature) to the CCU. The CCU displays
the current value on the user-interface (e.g. IPhone-interface
or web-interface). On the other hand, a user can control the
building via the control interface: The user clicks a button to
trigger an event (e.g. turning on an electrical device), which
is registered by the CCU. The CCU forwards the command to
the actuator and the actuator executes the command.
Fig. 4. Communication of HomeMatic. Each device can either be a sensor
or an actuator.
Our approach prevents such direct access by giving direct
access only to the building-aware active warden. All end-
user software only has indirect access via the active warden’s
unified API. In other words, there is no need to provide
end-users and end-user software direct access to the building
management system anymore, and all applications are forced
to use the active warden’s API. We discuss the implementation
details in Sect III-B.
A drawback of this approach is the fact that not all
interactions are based on high-level software, e.g. a switch
turning on/off the light in a room cannot be routed through
the building-aware active warden. However, this drawback can
be neglected since covert channels based on direct interactions
require a low-level person’s direct access to a high-level device
(e.g. lighting switch in a manager’s room) and can only be
solved by low-level protection means (physical access control
(PAC) [24] as well as the use of encryption, such as with the
previously mentioned EIBSec [18]).
Ma˜
na et. al. already developed a role-based access control
(RBAC) middleware for embedded systems (specially building
automation) [25] and the IT4SE project developed a similar
RBAC middleware called the home analytical system interface
(HASI) for building automation with a focus on privacy for
energy awareness-related applications [26]. We extended the
HASI middleware to implement the building-aware active
warden. Therefore, we decided to link users to security levels
and to implement verifications for the previously described
NRU and NWD rules.
Our building-aware active warden is based on a local
database used as an information source for evaluating the
policy-conformity of a user’s request via the API. The database
contains information about a building’s users, their levels (in
MLS context), their associated rooms and their associated
devices.
For instance, a user X is linked to the role “head of IT”
and is linked to a high security level LH. User X has access
to every room and every device with an associated level
LHand additionally associated with the role “head of IT”.
On the other hand, a user Y is linked to the role “trainee”
and is therefore linked to a lower level. He has access to a
few rooms and can control and monitor only few devices, but
cannot access rooms associated with a higher security level or
associated with another role. However, a user can be associated
with multiple roles, if necessary.
A. Architecture and Normalization
The architecture of the building-aware active warden is
shown in Fig. 5 and based on the design of HASI presented in
[26]. The building-aware active warden differs from HASI’s
original model by providing the capability of altering traffic
(instead of only blocking it like a firewall) and by addressing
covert channel specific problems by applying the previously
described multilevel secure (MLS) context.
The HASI multilayer architecture provides an interface for
applications on the Unified Application Programming Interface
(UAPI) layer, e.g. for energy consumption monitoring appli-
cations. The UAPI layer handles the communication with the
building-aware active warden. Since an application using the
API and the active warden are not necessarily located on the
same system, the communication within both layers is done
via a SSL encrypted connection. The UAPI layer additionally
abstracts all low-level socket actions and all multiplexing, i.e.
it is capable of handling multiple applications at the same time.
We implemented a simple communication protocol based on
HASI’s communication protocol for the interaction between
the user’s applications and the building-aware active warden.
By receiving and verifying a user’s identification, the active
warden can associate a user’s role, a user’s level and associated
rights with the current connection. These information are (as
described previously in Sect. III) used to apply modifications.
To get the current list of hardware available within all asso-
ciated buildings, a user’s application needs to send a Hardware
Listing Request (HLR) using the API. If the active warden
receives a HLR, it verifies the permissions of the authenticated
user associated with the connection. All hardware information
a user has read-permission for is then read from the hardware
Fig. 5. Architecture of the building-aware active warden.
layer and transferred to the UAPI. If a device, a room, a floor
or a whole building is not accessible for a given user (the
related role and MLS level), access will not be granted and
information about these elements is not included in the HLR
response message (e.g. most employees will only be allowed to
control building automation objects in their own office rooms).
If a status information request (e.g. requesting the current
temperature value of a temperature sensor) or a modification
request (e.g. “turn off lighting in the meeting room”) is
received, an access verification (for modification rights of the
user and the associated role and level) is done by the active
warden too.
A request is normalized by the active warden in a way that
only the allowed parts of a request will be executed. To imple-
ment these features, modification requests contain a building
identifier, the number of included hardware parameters (n), n
hardware identifiers, nrequest types (e.g. floating point value
or integer value), and nvalues.
B. Implementation
As mentioned earlier, we developed a implementation of
an inter-operable building automation architecture based on
HASI by Rist et. al. [27] – a system with focus on energy-
awareness for interoperable building automation. We extended
the approach by adding the functionality to alter a user’s
requests and to link a user to a security level within the
MLS concept. The already developed support for two building
automation/monitoring systems (HomeMatic as well as Cur-
rentCost) was kept and the API and middleware layers were
only required to be extended for our purposes.
The system is implemented in Python using a MySQL
backend and is designed to run on low-cost hardware. Low-
cost hardware prevents the drawback of consuming too much
energy in BAS environments which aim to reduce the overall
energy consumption.
The API supports different hardware-related request types
dependent on the underlying requirements of each component.
For instance, a power switch for a device can either be
turned on or off, thus, switches can be controlled using a
boolean parameter. On the other hand, there are floating point
parameters. For instance, a user can request to set the heating
level in a room using a floating point value as parameter.
For setting new values, the active warden not only verifies
the permission of a user to set the state of a device but also
ensures the policy-conformity of a value. If, for instance, the
light is requested to be turned on at 2AM while the policy
defines that working is not allowed between 1AM and 4AM,
the active warden will drop that request.
Like other active wardens, the building-aware active warden
also applies modifications to a user’s requests. We imple-
mented such modifications for two situations: (1) The user
wants to apply a number of settings to different hardware
components. In case, the user is only allowed to apply a subset
of the rules, the request is modified in a way that it only
contains the allowed components. (2) If a floating value (such
as setting the heating level in a room to 70%) is not allowed,
but a can be allowed in a limited way, the request is modified
(e.g. setting the heating level to 30% instead of 70%).
C. Emergency Situations
In our security model, the granted access for individuals is
limited due to security levels and roles. However, in emergency
situations (e.g. fire), a user should be able to get access to
every exit door and window. To achieve this goal, we propose
the implementation of an emergency functionality such as
a special button in every floor or even in every room –
such a button must not necessarily use the provided security
architecture but can send direct low-level control commands
to the BAS instead.
The emergency button can give the users control to all
devices required to leave the building on a fast way without
taking care of security roles and levels. Such an approach does
not prevent covert channels or side channels but the safety of
inhabitants is a mandatory requirement which we rate higher
than limiting malicious communication channels.
IV. RES ULT S
In this section, different aspects achieved through our side
and covert channel prevention concept using our prototype im-
plementation of a building-aware active warden are evaluated.
Enforcing high-level access: While some existing low-
level security approaches provide varying features (e.g. data
encryption or protection for replay attacks), no global approach
to limit malicious communication can be provided by low-
level systems. Thus, our system administratively prohibits
direct low-level access for future applications and therefore
limits the threat of covert/side channels by applying RBAC as
well as MLS features to the BAS. Since the building-aware
active warden enforces policy-conformity, different threads
which are already addressed by other authors (such as limiting
economic impacts of turning on the lighting at night [18]) are
limited as well.
Read-ups and write-downs: The presented system is able
to eliminate “read-ups” by low-level applications which are
based on our active warden middleware. The threat of write-
downs can also be eliminated if the NWD rule of the Bell-
LaPadula model is enforced.
To finalize example 1 of section II: The employee has no
longer access to information of his manager’s office due to
the applied BLP model. Example 2 is also handled since the
active-warden can deny the communication between Alice and
Bob due to the BLP model as well as due to RBAC. The same
situation occurs for example 3 since BLP and RBAC prevent
all non BAS-administrators to control the prisoner cell’s BAS
components.
However, in practical situations, e.g. in a company where
a leader wants to control all devices of a building, the NWD
rule cannot be applied completely. A possible solution to at
least reduce the threat of covert channels in such a case can
be provided nevertheless using RBAC: A high-level process
is forced to use a shared low-level resource for signaling
covert information, and the process can only do so if its role
is associated with the required low-level receiver’s role. The
write-down to other low-level resources not associated with a
given role is prevented. Thus, if the high-level sender and the
low-level receiver are not associated with the same role and a
shared device, the write-down is prevented.
The Problem of covert timing channels: While our
approach is designed for storage channels (both, covert storage
channels and side storage channels), there are problems for
preventing timing channels. In case of shared resources, such
as the devices in a meeting room which is used by processes
of multiple MLS layers, “storage” information can be set
invisible to low-level processes if the room is in use of high-
level processes (e.g. the low-level process cannot monitor and
control the devices for the duration of a meeting). However,
a high-level process can alter a timing information by making
those rooms “invisible” for arbitrary time intervals (the low-
level process can detect such alternations in the context of
elapsing time, which results in a covert timing channel).
Hu presented an approach called “fuzzy time” to reduce
the capacity of covert timing channels in 1991 [10]. The
capacity was reduced by introducing fuzzy time values (i.e.
timing values with slightly incorrect values) by the VAX
security kernel to virtual machines. We do not expect that
the approach of “fuzzy time” can be successfully applied to
building automation in practice since the timing intervals used
in building automation (e.g. opening and closing windows) are
already long in comparison to timings of kernel events in the
VAX security kernel. Such a limitation would only result in a
minimal reduction of the already low capacity timing channels
in a BAS (e.g., opening and closing windows can take multiple
seconds). Due to that already limited capacity, we consider
BAS timing channels as a limited threat. By applying various
covert timing channel detection algorithms (such as by Berk
et. al. [9] or Zander et. al. [3]) we expect similar detectability
for BAS as already exist for network timing channels. On
the other hand, covert timing channels can become a threat if
multiple protocols are used simultaneously, i.e. multiple shared
devices are used at the same time, as described by Wendzel
and Keller for covert storage channels [28]. However, while
such techniques are thinkable for covert timing channels, their
possibilities are – in comparison to covert storage channels
and their micro protocols – very limited. Currently there are
neither publications nor implementations focusing on the idea
of protocol switching covert timing channels.
Low-level storage and timing channels: However, we
expect the existence of low-level covert storage channels and
covert timing channels which are not in our scope, since they
require a direct media access for both, sender and receiver.
For instance, a covert channel’s sender could write a PDU to
the wire (e.g. an EIB frame) and signal hidden information
by altering unused frame attributes. Since such low-level
covert channels require a direct media access, existing low-
level protection means (as mentioned in Sect. I) can hinder
the creation of such channels by forcing authentication and
encryption as well as by providing limited access. Due to our
high-level approach, no user or application must be granted a
direct access to the wire since indirect API access is provided.
Legacy software: Our high-level approach can be imple-
mented in BAS step by step since legacy applications which
require a direct BAS access can be used in parallel. This
allows backward-compatibility but old applications which are
not controlled by the middleware can enable covert channels
and side channels.
V. CONCLUSION AND FUTURE WORK
This work described the possibility to create side channels
and covert channels within building automation systems (BAS)
and explained the concept of a building-aware active warden
aiming to eliminate those channels.
We explained the usefulness of defining a BAS as multilevel
secure (MLS) system since we can prevent covert storage
channels and side storage channels by applying the Bell-
LaPadula model. To apply MLS, we link the hierarchy of
organizations (as given by organizational charts) to the levels
of users (e.g. employees) and additionally make use of an
existing RBAC concept for building automation systems.
Future work will include the adoption of our middleware
to building automation systems currently not supported by
the building-aware active warden (such as multi-agent based
architectures). Additionally, we aim to prove the usefulness
of other covert channel prevention, limitation and detection
means in the context of building automation. An important
step in this direction would be to find ways to limit and detect
covert timing channels in buildings.
ACK NOW LE DG EM EN TS
The author would like to thank J¨
org Keller for his valuable
contributions and guidance, and Thomas Rist who lead the
development of the HASI middleware which served as the
base for the development of the building-aware active warden.
REFERENCES
[1] B. W. Lampson, “A note on the confinement problem,Commun. ACM,
vol. 16, no. 10, pp. 613–615, 1973.
[2] R. Anderson, Security Engineering - A Guide to Building Dependable
Distributed Systems, 2nd ed. Wiley, 2008.
[3] S. Zander, G. Armitage, and P. Branch, “Covert channels and coun-
termeasures in computer network protocols,” IEEE Comm. Magazine,
vol. 45, no. 12, pp. 136–142, Dec 2007.
[4] E. Brickell, G. Graunke, M. Neve, and J.-P. Seifert, “Software mitiga-
tions to hedge aes against cache-based software side channel vulnera-
bilities,” Cryptology ePrint Archive, Report 2006/052, 2006.
[5] S. Cabuk, C. E. Brodley, and C. Shields, “IP covert timing channels:
design and detection,” in ACM Conference on Computer and Commu-
nications Security, V. Atluri, B. Pfitzmann, and P. D. McDaniel, Eds.
ACM, 2004, pp. 178–187.
[6] C. G. Girling, “Covert channels in LANs,” IEEE Transactions on
Software Engineering, vol. 13, pp. 292–296, February 1987.
[7] T. G. Handel and M. T. Sandford, II, “Hiding data in the OSI network
model,” in Proceedings of the First International Workshop on Informa-
tion Hiding. London, UK: Springer-Verlag, 1996, pp. 23–38.
[8] B. Jankowski, W. Mazurczyk, and K. Szczypiorski, “Information hiding
using improper frame padding,” eprint arXiv:1005.1925, 2010.
[9] V. Berk, A. Giani, and G. Cybenko, “Detection of covert channel
encoding in network packet delays,” Department of Computer Science
- Dartmouth College, Tech. Rep., 2005.
[10] W.-M. Hu, “Reducing timing channels with fuzzy time,” in 1991 Symp.
on Security and Privacy, IEEE Computer Society, 1991, pp. 8–20.
[11] M. H. Kang, I. S. Moskowitz, and S. Chincheck, “The pump: A decade
of covert fun,” in ACSAC. IEEE Computer Society, 2005, pp. 352–360.
[12] R. A. Kemmerer, “Shared resource matrix methodology: an approach
to identifying storage and timing channels,” ACM Transactions on
Computer Systems, vol. 1, no. 3, pp. 256–277, 1983.
[13] P. A. Porras and R. A. Kemmerer, “Covert flow trees: A technique for
identifying and analyzing covert storage channels,” in IEEE Symp. on
Security and Privacy, 1991, pp. 36–51.
[14] S. J. Murdoch, “Covert channel vulnerabilities in anonymity systems,”
Ph.D. dissertation, University of Cambridge (Computer Laboratory),
2007.
[15] Y. A. H. Fadlalla, “Approaches to resolving covert storage channels in
multilevel secure systems,” Ph.D. dissertation, University of Brunswick,
July 1996.
[16] W. Granzer, F. Praus, and W. Kastner, “Security in building automation
systems,” Industrial Electronics, IEEE Transactions on, vol. 57, no. 11,
pp. 3622–3630, November 2010.
[17] C. Schwaiger and A. Treytl, “Smart card based security for fieldbus
systems,” in Emerging Technologies and Factory Automation, 2003.
Proceedings. ETFA ’03. IEEE Conference, vol. 1, 2003, pp. 398–406.
[18] W. Granzer, W. Kastner, G. Neugschwandtner, and F. Praus, “Security
in networked building automation systems,” in Factory Communication
Systems, 2006 IEEE International Workshop on, 2006, pp. 283–292.
[19] G. Malan, D. Watson, F. Jahanian, and P. Howell, “Transport and appli-
cation protocol scrubbing,” in Proc. of the INFOCOM 2000. Nineteenth
Annual Joint Conference of the IEEE Computer and Communications
Societies., 2000, pp. 1381–1390.
[20] M. Handley, V. Paxson, and C. Kreibich, “Network intrusion detection:
Evasion, traffic normalization, and end-to-end protocol semantics,” in
10th USENIX Security Symposium, vol. 10, 2001, pp. 115–131.
[21] A. Singh, O. Nordstr ¨
om et al., “Stateless model for the prevention of
malicious communication channels,” International Journal of Computers
and Applications, vol. 28, pp. 285–297, 2006.
[22] G. Lewandowski, N. Lucena, and S. Chapin, “Analyzing network-aware
active wardens in IPv6,” in Information Hiding, ser. LNCS, J. Camenisch
et al., Eds., vol. 4437. Springer Berlin / Heidelberg, 2007, pp. 58–77.
[23] N. Lucena, G. Lewandowski, and S. Chapin, “Covert channels in
IPv6,” in Privacy Enhancing Technologies, ser. LNCS, G. Danezis and
D. Martin, Eds. Springer Berlin / Heidelberg, 2006, vol. 3856, pp.
147–166.
[24] D. Ritter, B. Isler, H.-J. Mundt, and S. Treado, “Access control in
BACnet,BACnet Today, November 2006.
[25] A. Ma ˜
na, C. Rudolph, M. Hoffmann, A. Badii, S. Engberg, R. Nair,
D. Thiemert, M. Matthess, and J. Sch¨
utte, “Towards semantic resolution
of security in ambient environments,” in Developing Ambient Intelli-
gence. Springer Paris, 2008, pp. 13–22.
[26] S. Wendzel, T. Rist, E. Andr´
e, and M. Masoodian, “A secure interop-
erable architecture for building-automation applications,” ser. ISABEL
’11. ACM, 2011, pp. 8:1–8:5.
[27] T. Rist, S. Wendzel, M. Masoodian, P. Monigatti, and E. Andr´
e,
“Creating awareness for efficient energy use in smart homes,” in Zus.
der Beitr¨
age zum Usability Day IX, 2011, pp. 162–168.
[28] S. Wendzel and J. Keller, “Low-attention forwarding for mobile network
covert channels,” in Proc. of the 12th Conference on Communications
and Multimedia Security, 2011, pp. 122–133.
... Network Layer Perception Layer BACNET [16] XMPP [17] CoAP [18] MQTT v3.1.1 [7] IEEE 802.15.4 [41], [42], [43] Network traffic characteristics [23], [24] Smart buildings [19] Smart water plants [20] Smart cars [44] Sensors, actuators [14], [19], [20], [21] Smart lights/bulbs [39], [40] For the perception layer, in [14] authors introduced three different sensorbased covert channels that provide a trade-off between the achievable covert channel bandwidth and undetectability. They present covert channels that require read-and write-access for sensor registers as well as a covert channel that transfers data by just triggering sensor readings so that the malicious behavior cannot be distinguished from typical, normal sensor usage. ...
... The earliest known approach for IoT-based covert channels was published for the Building Automation and Control Networks (BACnet) protocol in 2012 [16]. ...
Article
Message Queuing Telemetry Transport (MQTT) is a publish-subscribe protocol which is currently popular in Internet of Things (IoT) applications. Recently its 5.0 version has been introduced and ensuring that it is capable of providing services in a secure manner is of great importance. It must be noted that holistic security analysis should also evaluate protocol’s susceptibility to network covert channels. That is why in this paper we present a systematic overview of potential data hiding techniques that can be applied to MQTT 5.0. We are especially focusing on network covert channels that, in order to exchange secrets, exploit characteristic features of this MQTT version. Finally, we develop proof-of-concept implementations of the chosen data hiding techniques and conduct their performance evaluation in order to assess their feasibility in practical setups.
... Closely related to this work is our own previous work on the elimination of covert channels using a traffic normalizer to enforce multi-level security (MLS) for BACnet [Wen12a,WKR12]. We moreover presented a protocol-independent middleware that ensures MLS to prevent the monitoring of inhabitants as well as it normalizes actuator commands for BAS (e.g., preventing to raise the temperature in a room to 28°C if only 22°C is allowed) [Wen12b]. In comparison to previous work, we present the first traffic normalization for BAS capable i) to counter typical attacks known from TCP/IP networks, ii) to ensure compliance, and iii) to increase robustness against vulnerability tests and fuzzing attacks. ...
... An attacker can spoof Router-Available-to-Network messages, i.e. messages indicating the availability of a router, with the goal to redirect selected traffic over itself in order to gain confidential monitoring data (e.g., presence sensor data of a given room to plan a physical break-in [Wen12b]). ...
Conference Paper
Full-text available
Different concepts of IT security, like communication encryption, have already been applied to building automation systems (BAS). However, no research is available to mitigate malicious or incompliant network traffic in BAS. Both aspects are covered by traffic normalizers. We present the first work-in-progress research on traffic normalization for building automation networks exemplified using building automation control and network (BACnet) protocol.
... Mit EIBSec wurden IPSec-ähnliche Features für EIB eingeführt [4]. Des Weiteren existieren Middleware-Ansätze zur Abkapselung von Hardware-Spezifika und zur Integration von Role-based Access Control [7], sowie zur Vermeidung von verdeckten Kanälen und von Seitenkanälen in der GA [14,15]. ...
... Kann sich ein Angreifer die Möglichkeit schaffen, mehrere Sensoren zu übernehmen und über seinen Controller zu überwachen, so ist es ihm möglich, über längere Zeiträume Profile der Nutzung von Räumen und Gebäudeteilen erstellen. Dies bietet ihm beispielsweise die Möglichkeit, einen Einbruch genau auf Abwesenheitszeiten abzustimmen [14]. ...
Conference Paper
Full-text available
Dieser Artikel aus dem Februar 2013 beschreibt Wardriving und Fingerprinting für Smart Homes und Smart Buildings: HomeMatic, Adhoco ZigBee, Bush-Jaeger KNX Touchpad.
... Cabaj et al. [29] stated that most of the published papers regarding covert channels in IoT utilized data-hiding techniques in some IoT protocols. For example, some storage covert channels exploit the extensible messaging and presence Protocol [30], one timing covert channel and two storage covert channels use the building automation and control networking protocol [31] and two timing covert channels and six storage covert channels exploit the constrained application protocol (CoAP) [32], an extended work which includes power consumption analysis of these covert channels of CoAP, which is given in [33]. Moreover, Smith [34] indicated that while CoAP is widely used in IoT, it has mostly been ignored in covert channel research. ...
Article
Full-text available
The advanced development of computer networks and communication technologies has made covert communications easier to construct, faster, undetectable and more secure than ever. A covert channel is a path through which secret messages can be leaked by violating a system security policy. The detection of such dangerous, unwatchable, and hidden threats is still one of the most challenging aspects. This threat exploits methods that are not dedicated to communication purposes, meaning that traditional security measures fail to detect its existence. This review has introduced a brief introduction of covert channel definitions, types and developments, with a particular focus on detection techniques using machine learning (ML) approaches. It provides a thorough review of the most common covert channels and ML techniques that are used to counter them, as well as addressing their achievements and limitations. In addition, this paper introduces a comparative experimental study for some common ML approaches that are commonly used in this field. Accordingly, the performance of these classifiers was evaluated and reported. The paper concludes that our information is still at risk, nothing is said to be secured and more work on the detection of covert channels is required.
... Recently, there several works have been published that deploy data hiding techniques in some IoT protocols, like several storage covert channels in the Extensible Messaging and Presence Protocol (XMPP) [12], two storage and one timing covert channels in the Building Automation and Control Networking Protocol (BACnet) [13], six storage and two timing covert channels in the Constrained Application Protocol (CoAP) [14], etc. Wendzel et al. [15] have shown that one can hide data in a cyber-physical system (e.g., smart building), by slightly modifying some of its components, like sensors, controllers, actuators, etc., as well as by storing secret data in unused registers. ...
Article
Full-text available
Network covert channels are a part of the information hiding research area that deals with the secret transfer of information over communication networks. Covert channels can be utilized, for instance, for data leakage and stealthy malware communications. While data hiding in communication networks has been studied within the last years for several major communication protocols, currently no work is available that investigates covert channels for the publish-subscriber model. To fill this gap, we present the first comprehensive study of covert channels in a protocol utilizing the publish-subscriber model, i.e., the Message Queuing Telemetry Transport (MQTT) protocol which is widely deployed in Internet of Things (IoT) environments. In particular, we describe seven direct and six indirect covert channels and we evaluate and categorize them using the network information hiding patterns approach. Finally, in order to prove that MQTT-based covert channels are practically feasible and effective, we implement the chosen data hiding scheme and perform its experimental evaluation.
... The authors of [34] developed detection and mitigation tools for covert storage and covert timing channel attacks with a BACNet Firewall Router (BFR) -which is available for download. Other papers propose traffic normalization methods like [63] against covert channels and side channels, and [64] exemplified using BACnet. Other works focused more on detection. ...
Preprint
Full-text available
Smart Buildings are networks of connected devices and software in charge of automatically managing and controlling several building functions such as HVAC, fire alarms, lighting, shading and more. These systems evolved from mostly electronic and mechanical elements to complex systems relying on IT and wireless technologies and networks. This exposes smart buildings to new risks and threats that need to be enumerated and addressed. Research efforts have been done in several areas related to security in smart buildings but a clear overview of the research field is missing. In this paper, we present the results of a systematic literature review that provides a thorough understanding of the state of the art in research on the security of smart buildings. We found that the field of smart buildings security is growing significantly in complexity due to the many protocols introduced recently and that the research community is already studying. We also found an important lack of empirical evaluations, though evaluations on testbeds and real systems seems to be growing. Finally, we found an almost complete lack of consideration of non-technical aspects, such as social, organisational, and human factors, which are crucial in this type of systems, where ownership and liability is not always clear.
... Discussion of IDS in BAS by notes the benefits of anomaly detection IDS, due to its reduced overhead on the network compared to a signature based approach, which must store signatures and therefore recognises only the "known unknowns". Both network flows (Krejvci et al., 2012) and packet inspection (Wendzel et al., 2012) methods have been implemented using BACnet and KNX respectively, with recognisable patterns identified using network flows, particularly on a week-to-week comparison. The activity profile of BAS is dependent on the service in use, with lighting, water management and access control systems having peaks during business hours, and troughs out of business hours; in comparison monitoring systems such as CCTV have a different network pattern. ...
Conference Paper
Full-text available
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media. Through the use of IP-based communication and encapsulated protocols, BAS are increasingly being connected to corporate networks and also being remotely accessed for management purposes, both for convenience and emergency purposes. These protocols, however, were not designed with security as a primary requirement, thus the majority of systems operate with substandard or non-existent security implementations, relying on security through obscurity. Research has been undertaken into addressing the shortfalls of security implementations in BAS, however defining the threats against BAS, and detection of these threats is an area that is particularly lacking. This paper presents an overview of the current security measures in BAS, outlining key issues, and methods that can be improved to protect cyber physical systems against the increasing threat of cyber terrorism and hacktivism. Future research aims to further evaluate and improve the detection systems used in BAS through first defining the threats and then applying and evaluating machine learning algorithms for traffic classification and IDS profiling capable of operating on resource constrained BAS.
... While Granzer et al. were the first authors to mention side channel attacks, our own previous work describes the existence and use of covert and side channels within BAS (cf. [Wen12,WKR12]). Side channels within BAS allow inhouse adversaries to monitor events in the building. For instance, an employee could try to monitor events in floors or areas of a building he has no access to. ...
Conference Paper
Full-text available
A building automation system (BAS) is the IT equipment within a building that monitors and controls the building (e.g., measuring temperature in a room to configure the heating level within the same room). We discuss the potential and the use of botnets in the context of BAS. Our botnet concept and scenario is novel in the sense that it takes advantage of the phyiscal capabilities of a building and as it has to adapt to a specialized environment being highly deterministic, predictable, simplistic and conservative. These properties make anomalies easy to detect. Smart building botnets allow the monitoring and remote control of (critical) building automation infrastructure in public and private facilities, such as airports or hospitals. We discuss why building automation botnets could thus enable attackers to cause various critical damage on whole regions and economies. Hiding the command and control communication is a highly beneficial step to adapt botnets to the BAS environment. We show that this is not necessarily a big hurdle and can be solved using existing covert channel techniques.
Thesis
Full-text: http://www.wendzel.de/dr.org/files/Papers/thesis_with_cover.pdf Network information hiding is the research discipline that deals with the concealment of network transmissions or their characteristics. It serves as an umbrella for multiple research domains, namely network covert channel research, network steganography research, and traffic obfuscation research. The focus of this thesis lies primarily on network steganography and network covert channel research. This thesis was motivated by the fact that network information hiding requires a better scientific foundation. When the author started to work on this thesis, scientific re-inventions of hiding techniques were common (similar or equal techniques were published under different names by different scientific sub-communities). This is, at least partially, rooted in the non-unified terminology of the domain, and in the sheer fact that the ever-increasing number of publications in the domain is hardly knowable. Moreover, experimental results and descriptions for hiding techniques are hardly comparable as there is no unified standard for describing them. This is a contrast to other scientific domains, such as Chemistry, were (de facto) standards for experimental descriptions are common. Another problem is that experimental results are not replicated while other scientific domains have shown that replication studies are a necessity to ensure the quality of scientific results. Finally, there is an imbalance between known hiding techniques and their countermeasures: not enough countermeasures are known to combat all known hiding techniques. To address these issues, this thesis motivates and proposes methodological adjustments in network information hiding and lays the foundation for an improved fundamental terminology and taxonomy. Moreover, hiding techniques are surveyed and summarized in the form of abstract descriptions, called hiding patterns, which form an extensible taxonomy. These hiding patterns are then used as a tool to evaluate the novelty of research contributions in a scientific peer-review process. Afterwards, this thesis addresses the problem of inconsistent descriptions of hiding techniques by proposing a unified description method for the same, including hiding patterns as a core component of every description. This thesis also introduces the WoDiCoF testbed as a framework to perform replication studies. Afterwards, the concept of countermeasure variation is introduced to address the problem of not having countermeasures available for certain hiding patterns. Finally, the proposed pattern-based taxonomy is enhanced to demonstrate the extensibility of the taxonomy and to integrate payload-based hiding techniques which were not foreseen in the earlier version of the taxonomy.
Chapter
Die Digitalisierung von Unternehmen ist unter anderem von zwei besonders aktuellen Themenfeldern, dem Internet of Things (IoT) und den Smart Contracts, betroffen. Wir befassen uns in diesem Kapitel mit Sicherheitsaspekten dieser beiden Themenfelder. Es handelt sich hierbei um ein Kapitel mit zusammenfassendem Charakter, das gewonnene Erfahrungen eigener Publikationen und Forschungsprojekte in den Kontext von Unternehmen setzt, um dem Leser einen Überblick über diese Themen zu ermöglichen. Insbesondere zeigen wir Reaktionsmöglichkeiten für selektierte Risiken auf, die im Zusammenhang mit diesen beiden Technologien stehen.
Conference Paper
Full-text available
Enriching Building Automation Systems (BAS) with new services formerly provided by separate subsystems promises synergies, but increases demands on the BAS ar- chitecture. In particular, the integration of security sub- systems significantly tightens security requirements on the protocol of a networked control system. First, this paper gives a survey on security in BAS. Possible threats and attacks are discussed. Weaknesses in the security mecha- nisms of important open networked BAS (LonWorks, BAC- net, KNX/EIB) are summarized. Then, a security exten- sion to KNX/EIB is presented. It includes several security mechanisms that guarantee data integrity, confidentiality and freshness, as well as authentication to provide secure process data and management communication. Relevant configuration related issues such as key management and distribution are also addressed.
Conference Paper
Full-text available
Hiding information in network traffic may lead to leakage of confidential information. In this paper we introduce a new steganographic system: the PadSteg (Padding Steganography). To authors' best knowledge it is the first information hiding solution which represents inter-protocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communication. PadSteg utilizes ARP and TCP protocols together with an Etherleak vulnerability (improper Ethernet frame padding) to facilitate secret communication for hidden groups in LANs (Local Area Networks). Basing on real network traces we confirm that PadSteg is feasible in today's networks and we estimate what steganographic bandwidth is achievable while limiting the chance of disclosure. We also point at possible countermeasures against PadSteg.
Article
Full-text available
Building automation systems are traditionally concerned with the control of heating, ventilation, and air conditioning, as well as lighting and shading, systems. They have their origin in a time where security has been considered as a side issue at best. Nowadays, with the rising desire to integrate security-critical services that were formerly provided by isolated subsystems, security must no longer be neglected. Thus, the development of a comprehensive security concept is of utmost importance. This paper starts with a security threat analysis and identifies the challenges of providing security in the building automation domain. Afterward, the security mechanisms of available standards are thoroughly analyzed. Finally, two approaches that provide both secure communication and secure execution of possibly untrusted control applications are presented.
Article
Tiiis paper describes fuzzy time. This is a collection of techniques that reduces the bandwidths of covert timing channels by making all clocks available to a process noisy. Developed in response to the problems posed by high-speed hardware timing channels, fuzzy time has been implemented in the VAX security kernel. The VAX security kernel is a virtual-machine monitor security kernel for the VAX architecture designed to meet the requirements of the Al rating from the National Computer Security Center.
Article
The use of malicious communication channels is becoming an integral part of malicious software agents and tools including those employed for remote access tools and distributed denial of service tools. These malicious software agents use the unused fields of ICMP and TCP/IP packets to establish malicious communication channels. Since TCP/IP comprises 96% of the traffic, the paper identifies the idle fields in TCP/IP and ICMP messages and proposes the use of a stateless model to protect against the misuse of these unused fields. This paper also presents the advantages of using a stateless model over firewalls and IDS. The proposed modifications are recommended highly for the end hosts and it has been shown that the proposed modifications are computationally inexpensive.
Article
Gigantically comprehensive and carefully researched, Security Engineering makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice. Better, Ross Anderson offers a lot of thoughts on how information can be made more secure (though probably not absolutely secure, at least not forever) with the help of both technologies and management strategies. His work makes fascinating reading and will no doubt inspire considerable doubt--fear is probably a better choice of words--in anyone with information to gather, protect, or make decisions about. Be aware: This is absolutely not a book solely about computers, with yet another explanation of Alice and Bob and how they exchange public keys in order to exchange messages in secret. Anderson explores, for example, the ingenious ways in which European truck drivers defeat their vehicles' speed-logging equipment. In another section, he shows how the end of the cold war brought on a decline in defenses against radio-frequency monitoring (radio frequencies can be used to determine, at a distance, what's going on in systems--bank teller machines, say), and how similar technology can be used to reverse-engineer the calculations that go on inside smart cards. In almost 600 pages of riveting detail, Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. A terrific read for security professionals and general readers alike. --David Wall Topics covered: How some people go about protecting valuable things (particularly, but not exclusively, information) and how other people go about getting it anyway. Mostly, this takes the form of essays (about, for example, how the U.S. Air Force keeps its nukes out of the wrong hands) and stories (one of which tells of an art thief who defeated the latest technology by hiding in a closet). Sections deal with technologies, policies, psychology, and legal matters.
Article
Covert channels are mechanisms for communicating in-formation in ways that are difficult to detect. Data exfiltration can be an indication that a computer has been compromised by an attacker even when other in-trusion detection schemes have failed to detect a suc-cessful attack. Covert timing channels use packet inter-arrival times, not header or payload embedded informa-tion, to encode covert messages. This paper investigates the channel capacity of Internet-based timing channels and proposes a methodology for detecting covert timing channels based on how close a source comes to achiev-ing that channel capacity. A statistical approach is then used for the special case of binary codes.
Conference Paper
A covert channel is a communication path that allows transferring information in a way that violates a system security policy. Because of their concealed nature, detecting and preventing covert channels are obligatory security practices. In this paper, we present an examination of network storage channels in the Internet Protocol version 6 (IPv6). We introduce and analyze 22 different covert channels. In the appendix, we define three types of active wardens, stateless, stateful, and network-aware, who differ in complexity and ability to block the analyzed covert channels.