Securing cellular modems in industrial applications

Phoenix Contact Pty Ltd

By Mariam Coladonato, Lead Product Marketing Specialist, Networking and Security, Phoenix Contact USA
Thursday, 17 February, 2022


Securing cellular modems in industrial applications

The traditional cellular network exposes your devices directly to the public internet, and all the risks that are incurred with that access.

Mobile communication follows the same general principle as telephones, wherein the goal is to connect two or more remote users. This is accomplished through the network equipment of a mobile network operator that is responsible for managing the service. However, unlike fixed telephones, there are no copper or optical fibre pairs in the mobile network. Radio transmissions are the final link. The user’s mobile phone or modem communicates through the air with an antenna. This antenna, in turn, communicates with the operator’s central office, which then routes the communication to the corresponding part of the fixed network or through other antennas.

Cellular mobile technology is a public telecommunications service. Its main objective is to facilitate communication without imposing restrictions based on geographic location and displacement. Smartphones and tablets are a prime example of common mobile usage; however, industrial cellular modems have proven to be useful and cost-effective for supervisory control and data acquisition (SCADA) applications for remotely located assets. Industrial cellular modems can facilitate remote monitoring, support and control, M2M applications, data logging and alarming.

With SCADA applications connected through modems into the public network, it is important to understand that the convenience of remote monitoring also comes with great risks. Cellular modems are a powerful tool in an Industrial Internet of Things (IIoT) environment, but there is a risk of malicious or unwanted users stealing sensitive data or, worse, sabotaging, disrupting or even halting operations.

A proper security analysis model in mobile networks is quite broad and complex to define, as the entire infrastructure is ambiguous and converges multiple technologies that can be confusing to the user. However, the following will explain some measures you can take to prevent the possible risks.

Using private Access Point Names (APN)

An APN is the name of an access point that must be configured so that a device can connect to the internet using the networks of cellular vendors. These vendors can also provide private APN plans — which consist of direct access to local area network (LAN) connections — allowing the user to specify a fixed number of network and security parameters. Some of these parameters may include address allocation, authentication through RADIUS servers, completely blocked internet access and more.

At this point, the industrial modem will be connected directly into a private APN network that already prevents any intrusions, such as spam or viruses. It also reduces the access of public IPs directly at the modem, as this is an open-door invitation for malicious users to attempt to log in. However, there is a downside of private APNs: every device or individual needing to connect to the private APN must also pay the private APN fee and set up secure access, such as a virtual private network (VPN), for data access.

Figure 1: Simplified architecture of a cellular network.

Figure 1: Simplified architecture of a cellular network.

VPNs for remote access and monitoring

A VPN can be used when private APNs are not an option. A VPN’s goal is to extend private networks across a public network such as the internet without the extra service fees that the private APN might carry. The most common VPN technology is called IP Security (IPsec); this client-server application uses a tunnel connection that carries data encryption and allows secure communications between two or more networks anywhere in the world. The three key security attributes of the tunnel are:

  • the authentication of users or devices through certificates or pre-shared keys
  • encryption of the data being sent through the tunnel
  • the use of hashing algorithms that identify and drop manipulated or corrupted data.
     

Most industrial cellular modems support some type of VPN tunnel already, so it’s the most feasible option for any industrial application that needs cellular connectivity. The downside is that the VPN set-up could become a technical challenge for the user, as it requires some networking and infrastructure knowledge even before setting up the devices.

Blocking all unused ports

Blocking all additional, unused ports is a security best practice that every SCADA application owner should follow. If there are unused physical ports in the device itself, you must physically block them. This can be accomplished either by locking the control cabinet or using low-cost physical security items. Additionally, if the device itself has the functionality to disable the ports, then you can virtually disable them from the device management page. This prevents any malicious person or unwanted devices from connecting directly.

It is also important to block all unused service or application ports that could open insecure paths to your industrial equipment. Being in an industrial cellular modem, these services could be completely open to the internet. To block these ports, the user must program the security and firewall functionalities inside the specific device. Even industrial modems can support basic firewall functionality. These can be configured with traffic-filtering capabilities for incoming and outgoing data, as well as for restricting all unnecessary ports and protocols. SCADA applications normally have a small number of necessary ports that users would need to reach for day-to-day operations. If the asset owners are properly using a VPN tunnel to the industrial modem, then all applications are available through the secure VPN connection, and everything around the firewall and port forwarding functions should be blocked. For example, every industrial modem user should avoid having the following services open from the internet: FTP, SSH, Telnet, SMTP, DNS, HTTP and HTTPS. These ports are the most commonly used for malicious attacks.

Figure 2: Example of low-cost physical security for unmanaged switches.

Figure 2: Example of low-cost physical security for unmanaged switches.

User authentication and modem management

Data encryption through the VPN and blocking all unwanted ports are great initial steps towards the overall security solution, but they won’t protect against everything. If the user does not change the cellular modem default admin password, then a malicious user could easily access the device itself and its ‘secure’ configuration. With a default password, a malicious user would have full control over the cellular modem’s functionality.

Also, it is a good practice to note that a password should be personal and non-transferable, and it must be guarded properly. Standard security practices recommend using a password that combines uppercase letters, lowercase letters, numbers and special characters.

Additionally, the modem’s configuration port should not be opened directly into the internet. The access to the device itself could be done through the authenticated VPN tunnel or, if supported at the device level, using two-factor authentication. The mechanics are simple: when the user logs into the device configuration page, this tool asks them to authenticate ownership of the account, providing two different factors. The first of these is the admin password. The second can be several things, always depending on the function supported. In the most common case, it is usually a code that is sent to a mobile phone via SMS or an email account. The fundamental essence of this tool is that if you want to log in to one of your devices, you must ‘know something’ and ‘own something’.

Is failover necessary?

Depending on how remote the SCADA application is and what other network infrastructure is available, you can reduce the attack surface for a denial of service (DoS) attack through failover if the cellular modem supports it.

The objective of a DoS attack is to interrupt access to services and resources for an indefinite period of time, aimed at specific networks to make them completely inaccessible to legitimate users. For example, when the industrial cellular modem is saturated by a DoS attack, a user who wants to consult the specific modem will find it unavailable. A DoS attack would overload the device until it collapses. It can also take over the whole bandwidth, preventing the device from processing real requests. To achieve this, the attacker floods the system with information that obviously exceeds the processing capacity.

Industrial cellular modems with failover capabilities won’t prevent the DoS attack from happening, but if it does, the device will drop the cellular communication vector. The failover on the secondary infrastructure is then used to maintain the availability of the industrial communications.

Monitor data usage

Proactive monitoring of device events is an often overlooked aspect of cellular modem security. Actions such as unauthorised access attempts, configuration changes, excessive port scans and more can be recorded, and the user can be alerted about the suspicious activity through email or text message. Additionally, the devices can also forward those logs to a Syslog server or Simple Network Manager Protocol (SNMP) server, which could store and analyse security-related events.

Also, your cellular carrier could provide additional insight through your subscriber identity module (SIM) state and usages through a portal, as all SIM cards are unique.

Enable security on end devices if available

SCADA applications also have other industrial devices such as controllers, sensors and even computers, which are vulnerable by nature. Hence a defence-in-depth strategy should be applied, default passwords should be changed before deployment and physical security such as perimeter fences or closed cabinets with tampering detection should be put in place. These measures are an added layer of security to the overall remote SCADA network.

Conclusion

Unlike many other available network infrastructures, the traditional cellular network exposes your devices directly to the public internet, and all the risks that are incurred with that access. While this gives you efficient and high-speed access to remote sites, device-level security is not a concern for the cellular vendors. They might be protecting their network infrastructure but not considering end devices like smartphones or industrial cellular modems. If these modems are connected to critical applications such as power plants, city water pumps etc, these systems can become targets for malicious attacks through the direct and easy access of the cellular network thanks to the user’s cellular provider. A layered approach is the best practice for SCADA security applications that use industrial cellular modems as means of communication. When purchasing or implementing cellular modems in your critical application, make sure your cellular modems support most of the following security mechanisms: VPNs, firewall, failover, logs and alarming.

Top image: ©stock.adobe.com/au/Treecha

Related Articles

Liberating stranded data via the IIoT

Modern edge-to-cloud IIoT solutions can make it easier to access and use stranded data.

How the IIoT can fast-track Australia's sovereign manufacturing capability

The primary benefit of using automation to enhance sovereign capability is increased productivity...

EtherCAT: leveraging industrial Ethernet for 20 years

EtherCAT is the only industrial fieldbus that leverages Ethernet for both high speed and...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd