Tim Draelos, Mark Harris, Pres Herrington, and Dick Kromer Monitoring Technologies Department Sandia National Laboratories

Similar documents
@ST1. JUt EVALUATION OF A PROTOTYPE INFRASOUND SYSTEM ABSTRACT. Tom Sandoval (Contractor) Los Alamos National Laboratory Contract # W7405-ENG-36

OPTIMIZING CHEMICAL SENSOR ARRAY SIZES

and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof.

A VERSATILE DIGITAL VIDEO ENGINE FOR SAFEGUARDS AND SECURITY APPLICATIONS

Development of Web Applications for Savannah River Site

In-Field Programming of Smart Meter and Meter Firmware Upgrade

Adding a System Call to Plan 9

Entergy Phasor Project Phasor Gateway Implementation

Graphical Programming of Telerobotic Tasks

NIF ICCS Test Controller for Automated & Manual Testing

NATIONAL GEOSCIENCE DATA REPOSITORY SYSTEM

Go SOLAR Online Permitting System A Guide for Applicants November 2012

On Demand Meter Reading from CIS

Electronic Weight-and-Dimensional-Data Entry in a Computer Database

Large Scale Test Simulations using the Virtual Environment for Test Optimization

ESNET Requirements for Physics Reseirch at the SSCL

REAL-TIME MULTIPLE NETWORKED VIEWER CAPABILITY OF THE DIII D EC DATA ACQUISITION SYSTEM

GA A22720 THE DIII D ECH MULTIPLE GYROTRON CONTROL SYSTEM

Leonard E. Duda Sandia National Laboratories. PO Box 5800, MS 0665 Albuquerque, NM

FY97 ICCS Prototype Specification

Bridging The Gap Between Industry And Academia

Washington DC October Consumer Engagement. October 4, Gail Allen, Sr. Manager, Customer Solutions

The NMT-5 Criticality Database

Real Time Price HAN Device Provisioning

SmartSacramento Distribution Automation

Advanced Synchrophasor Protocol DE-OE-859. Project Overview. Russell Robertson March 22, 2017

FSEC Procedure for Testing Stand-Alone Photovoltaic Systems

PJM Interconnection Smart Grid Investment Grant Update

IN-SITU PROPERTY MEASUREMENTS ON LASER-DRAWN STRANDS OF SL 5170 EPOXY AND SL 5149 ACRYLATE

Intelligent Grid and Lessons Learned. April 26, 2011 SWEDE Conference

ACCELERATOR OPERATION MANAGEMENT USING OBJECTS*

METADATA REGISTRY, ISO/IEC 11179

Integrated Volt VAR Control Centralized

Saiidia National Laboratories. work completed under DOE ST485D sponsored by DOE

CHANGING THE WAY WE LOOK AT NUCLEAR

Testing PL/SQL with Ounit UCRL-PRES

MULTIPLE HIGH VOLTAGE MODULATORS OPERATING INDEPENDENTLY FROM A SINGLE COMMON 100 kv dc POWER SUPPLY

Protecting Control Systems from Cyber Attack: A Primer on How to Safeguard Your Utility May 15, 2012

Site Impact Policies for Website Use

Portable Data Acquisition System

LosAlamos National Laboratory LosAlamos New Mexico HEXAHEDRON, WEDGE, TETRAHEDRON, AND PYRAMID DIFFUSION OPERATOR DISCRETIZATION

High Scalability Resource Management with SLURM Supercomputing 2008 November 2008

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement

Optimizing Bandwidth Utilization in Packet Based Telemetry Systems. Jeffrey R Kalibjian

Clusters Using Nonlinear Magnification

DOE EM Web Refresh Project and LLNL Building 280

Centrally Managed. Ding Jun JLAB-ACC This process of name resolution and control point location

Cross-Track Coherent Stereo Collections

EMPLOYER CONTRIBUTION AGREEMENT

Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC

BWXT Y-12 Y-12. A BWXT/Bechtel Enterprise COMPUTER GENERATED INPUTS FOR NMIS PROCESSOR VERIFICATION. Y-12 National Security Complex

Final Report for LDRD Project Learning Efficient Hypermedia N avi g a ti o n

MAS. &lliedsignal. Design of Intertransition Digitizing Decomutator KCP Federal Manufacturing & Technologies. K. L.

PJM Interconnection Smart Grid Investment Grant Update

GA A22637 REAL TIME EQUILIBRIUM RECONSTRUCTION FOR CONTROL OF THE DISCHARGE IN THE DIII D TOKAMAK

HELIOS CALCULATIONS FOR UO2 LATTICE BENCHMARKS

COMPUTATIONAL FLUID DYNAMICS (CFD) ANALYSIS AND DEVELOPMENT OF HALON- REPLACEMENT FIRE EXTINGUISHING SYSTEMS (PHASE II)

The APS Control System-Network

KCP&L SmartGrid Demonstration

ALAMO: Automatic Learning of Algebraic Models for Optimization

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

ADAPTIVE MESH REFINEMENT IN CTH

v /4 Quick Short Test Report Technical Publication Transfer Test Hughes Tucson Support Systems Operation MIL-D-28001A (SGML) CTN Test Report AFTB-ID

for use with the WINDOW 4.1 Computer Program

WISP. Western Interconnection Synchrophasor Program. Vickie VanZandt & Dan Brancaccio NASPI Work Group Meeting October 17-18, 2012

New Distribution Capability (NDC)

ENDF/B-VII.1 versus ENDFB/-VII.0: What s Different?

INCLUDING MEDICAL ADVICE DISCLAIMER

IMS/IDC Operational Manuals Part of the Framework Governing the O&M Activity in the IMS network

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Entrust SSL Web Server Certificate Subscription Agreement

NFRC Spectral Data Library #4 for use with the WINDOW 4.1 Computer Program

FPKIPA CPWG Antecedent, In-Person Task Group

MISO. Smart Grid Investment Grant Update. Kevin Frankeny NASPI Workgroup Meeting October 17-18, 2012

Implementation of the AES as a Hash Function for Confirming the Identity of Software on a Computer System

Alignment and Micro-Inspection System

The Data Dictionary: A View Into the CTBT Knowledge. Base

A COMBINED PLC AND CPU APPROACH TO MULTIPROCESSOR CONTROL

DISCUSSION OF RELIABLE MULTICAST DEPLOYMENT PROGRESS FOR THE CONTINUOUS DATA PROTOCOL. Deborah A. Agarwal

GA A26400 CUSTOMIZABLE SCIENTIFIC WEB-PORTAL FOR DIII-D NUCLEAR FUSION EXPERIMENT

Southern Company Smart Grid

Collaborating with Human Factors when Designing an Electronic Textbook

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

R. P. Evans (INEEL) J. G. Keller (INEEL) A. G. Stephens (ISU) J. Blotter (ISU) May 17, 1999 May 20, 1999

Software Design and Operational Model

DECISION OF THE EUROPEAN CENTRAL BANK

Correlation and Phishing

Request for Proposal for Technical Consulting Services

A REMOTE CONTROL ROOM AT DIII-D

Uniform Biological Material Transfer Agreement

COMMERCIAL FURNACES CERTIFICATION PROGRAM

- Q807/ J.p 7y qj7 7 w SfiAJ D--q8-0?dSC. CSNf. Interferometric S A R Coherence ClassificationUtility Assessment

Substation Secondary Asset Health Monitoring and Management System

Apple Inc. Certification Authority Certification Practice Statement. Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA

Big Data Computing for GIS Data Discovery

5A&-qg-oOL6c AN INTERNET ENABLED IMPACT LIMITER MATERIAL DATABASE

CA Unified Infrastructure Management

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

REAL-TIME CONTROL OF DIII D PLASMA DISCHARGES USING A LINUX ALPHA COMPUTING CLUSTER

Transcription:

DATA SURETY DEMONSTRATONS Tim Draelos, Mark Harris, Pres Herrington, and Dick Kromer Monitoring Technologies Department Sandia National Laboratories Sponsored by U.S. Department of Energy Office of Nonproliferation and National Security Office of Research and Development Contract DE-AC04-94AL85000 (Jd e0 F - 9 s89 20 H ABSTRACT The use of data surety within the nternational Monitoring System is designed to offer increased trust of acquired sensor data at a low cost. The demonstrations discussed in the paper illustrate the feasibility of hardware authentication for sensor data and commands in a retrofit environment and a new system and of the supporting key management system. The individual demonstrations are summarized below. Demonstration of hardware authenticationfor communication authentication in a retrofit environment. Data authentication at the sensor is not required for existing installations until a planned upgrade is performed. Until that occurs, communication authentication is recommended at the earliest convenient point before the external communications interface at the station. We have demonstrated a low-cost solution to add digital signatures to all data channels in the existing Alpha protocol data stream at a station. Commercial off-the-shelf hardware is used (Sun SPARCstation with a FORTEZZA card). A simple command authentication system using the proposed command message format was also demonstrated. Demonstration of hardware authentication in a new system. For new installations, data authentication is required at the sensor. At the Symposium, we will demonstrate a lowcost solution to sign all data channels at the remote digitizers of the DOE Prototype nfrasound Array at Los Alamos, NM. Commercial off-the-shelf hardware is used (FORTEZZA card). A command authentication system using the proposed command message format was also demonstrated. Demonstration of key managementfor sensor data and command authentication. Demonstration of a proposed MS key management system included the following elements: 1.. 2. 3. 4. 5. 6. 7. DC private/public key pair generation and public key distribution Sensor private/public key pair generation Sensor public key acquisitionhegistration Sensor public key certification Sensor public key certificate distribution and verification Sensor private key and public key usage Remote sensor key updates n particular, the demonstration illustrates the simplicity of daily MS personnel tasks necessary for proper and secure management of keys. Key Words: Authentication, Key Management, nfrasound, Sensor, Upgrade Sandia is a muitiprogram laboratory operated by Sandia Coraoratian. a Lockheed Martin Company, for & United States Department of Energunder contract DE-AC04-94AL850&). ff msmm \

DSCLAMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise dots not necessarily constitute or imply its endorsement, m m- mendation, or favoring by the United States Government or any agency thereof. The views and opinions of authors exprcsscd herein do not necessarily state or reflect those of the United States Government or any agency thereof.

D S CLAM ER Portions of this document may be illegible electronic image products. mages are produced from the best available original document.

DATA SURETY DEMONSTRATONS OBJECTVE The implementation of data authentication within the nternational Monitoring System (MS) is scheduled to begin in calendar year 1999. The objective of this work was to clarify the specifications recommended in Task Leader Guidelines on Authentication (CTBTmC/l7WGB/TUS2/Revl and CTBTflCW7WGBflU92) [1, 21 and determine the impacts that these specifications will have on present and planned monitoring stations. Although each demonstration targeted a specific area, some specifications were common to all. RESEARCH ACCOMPLSHED Common usage of the term data authentication implies a mechanism to verify the authenticity and integrity of electronic data. Application of this mechanism provides assurance that the source of the data and the data have not been modified since the application of a digital signature. A digital signature is a bit stream appended to a message which establishes for the recipient the source and integrity of that message. The Digital Signature Algorithm (DSA) was recommended for the MS. n this approach, the private key is known only to the data collecting sensor system (so impersonation is not possible) and certified public keys (associated with that unique private key) are distributed to all authorized data users. Demonstrations were carried out in three areas of concern regarding the likely requirements for data authentication at MS stations and the associated task of managing the private and public keys required for authentication. Demonstration of hardware authenticationfor communication authentication in a retrofit environment, The implementation of data authentication within the nternational Monitoring System (MS) is scheduled to begin in calendar year 1999. According to the Task Leader Guidelines on Authentication (CTBT/PC//WGB/TL/52/ Revl) [11: For existing stations, authentication should be implemented at upgrading. When upgrading is substantially delayed, communication authentication is recommended by authentication at the earliest convenient point before the external communication interface. Data Communication Authentication A system has been developed at Sandia National Laboratories to demonstrate communication authentication. This system provides an example of a cost effective solution to authenticate all data channels in an existing Alpha protocol data stream at a station. The demonstration system consists of a Station Authenticator, our model for the authentication equipment at the station, and an NDC Simulator that is used to monitor authentication performance (Figure 1). The Station Authenticator consists of commercial off-the-shelf hardware (Sun SPARCstation 5 with a FORTEZZA card) running commercial and custom software. n this system Alpha data is sent from the existing station equipment to the Station Authenticator, where it is signed and forwarded to the NDC. The standard Alpha protocol is used with the exceptions that a signature frame count is inserted in the station specific bits of the status field of the Channel Sub-Frame, and the description fields of the Data Frame are used to communicate key change information. All data channels are signed using the same private key by a single FORTEZZA card. Command Authentication Most stations in the MS will be capable of receiving remote commands for the purpose of system maintenance and calibration. Untimely execution of these commands could adversely affect data quality and MS performance could be degraded by a coincidental action at a set of stations. To minimize this threat, external commands to MS stations are required to be signed at the point of origin and verified at the stations.

Station Equipment Station NDC Simulator Science Horizons, rnc. Sun SPARCstation 5 auth 1 Sun SPARCstation 20 auth2 Figure 1. Data authentication system overview. Alpha protocol data flows from the Station Equipment (Alphasend) to the Station Authenticator (alphaauth) to the NDC Simulator (DLMan). The Station Authenticator and NDC Simulator are installed on the station LAN. A command authentication system using the proposed command message format [3] was developed for this demonstration. This software consists of a command formatting tool that is run on the NDC Simulator and a command receiver which runs on the Station Authenticator (Figure 2). Station NDC Simulator Figure 2. Command authentication system overview. The Command Tool (cmdtool) on the NDC simulator is used to enter a command for a station and channel. The Command Manager (cmdman) on the Station Authenticator receives the command, verifies the authentication signature, and processes it for the station. The Command Tool provides a GU which allows selection of the destination for the command (station and channel) and setting of the command message (Figure 3). t formats the complete command message, signs it (using authd), and sends it to the command receiver via a socket connection. The command receiver verifies command authenticity and sends an acknowledgment to the Command Tool.

Command authentication requires that each command receiver maintain the public key for all authorized command Station: Command: PDAR -1 Channel : PD03/sz SNE CAL -1 d Command Message t o send: SNE CAL FREQ=. O AMP=. Q DUR40.0 Apply View Cancel originators. Depending upon the station equipment, command receivers may include each sensor and/or the station hub. Command originators may include the DC and appropriate NDC. Figure 3. Command Tool graphical user interface. Pinedale Demonstration This system was demonstrated at the existing MS primary station, PDAR, at Pinedale, Wyoming, during August, 1998. The Station Authenticator and NDC Simulator were installed at Pinedale and received Alpha data from the RPC. This exercise demonstrated all of the required characteristics of authentication in a retrofit environment as follows: nitialization of the Station Authenticator FORTEZZA card using the certification laptop computer Generate new DSA keys on the FORTEZZA card nstall the new public key in the NDC Simulator nstall the FORTEZZA card in the Station Authenticator Normal operation of the data authentication equipment The station equipment sends Alpha protocol data frames to the Station Authenticator The Station Authenticator signs the data frames and forwards them to the NDC Simulator The NDC Simulator verifies the digital signature and displays the results Error detection by the authentication equipment nsert bit errors into the signed data frame, c o n f m that the NDC Simulator does not verify the frame Change the public key in the NDC Simulator, c o n f m that the NDC Simulator does not verify the data frames Change the key in the Station Authenticator (switch the FORTEZZA card), confirm that the NDC Simulator does not verify the data frames Command authentication from the NDC Simulator to the Station Authenticator Send signed command messages from the NDC Simulator to the Station Authenticator using the MS Command Tool, c o n f m that the station verifies and logs the command and acknowledges it to the NDC Simulator Remote key change in the Station Authenticator Send key change command from the NDC Simulator to the Station Authenticator using the MS Command Tool Confirm that the public key on the NDC Simulator is updated (via an Alpha Data Frame) Confirm that Alpha data frames continue to verify at the NDC Simulator using the new key ' Demonstration of hardware authentication in a new system. According to the Task Leader Guidelines on Authentication (CTBT/PC//WGB/TL/52/Rev 1) [ 11: "For new installations and equipment upgrades after 1998, data should be authenticated at the first point in the acquisition

1 Multiplexer J'Security Subsystem i i i DatalCornmands Figure 4. Diagram of DOE Prototype nfrasound Station. process where data are available in digital form." A demonstration of authentication equipment was conducted at the DOE Prototype nfrasound MS Station at Los Alamos, NM, during September, 1998 (Figure 4). This demonstration illustrated the feasibility of hardware authentication for sensor data and commands in a new system. Los Alamos Demonstration We demonstrated a cost-effective solution to signing all data channels at the remote digitizers located with the sensors of the DOE Prototype hfiasound Array. Commercial off-the-shelf hardware was used (FORTEZZA PC card). The FORTEZZA PC card and software libraries (e.g. C Library, CM Library, card reader drivers, Alpha Protocol libraries) were used to the extent possible. Also, a command authentication system using the proposed command message format [3] was demonstrated. An NDC-Simulator (Sun SPARCstation with a FORTEZZA card) was used to verify the authenticity of the inftasound data and to generate signed commands. The activities during this demonstration were identical to those during the Pinedale demonstration with the exception that data were signed at the digitizers at the individual sensors rather than at the communication hub. Demonstration of key managementfor sensor data and command authentication. Concepts for the underlying key management system that allows one to trust the keys used in data and command authentication have been developed and demonstrated by Sandia National Laboratories. This key management

infrastructure involves the use of distributed trust models that are crucial to the international CTBT monitoring environment. An initial demonstration of the key management concept based on distributed trust was conducted at the nformal Workshop on Authentication and Communications in Paris during early July, 1997. Equipment was provided by CERTCO to demonstrate activities necessary for a certification authority based on distributed trust. This demonstration involved registering a public key with the DC s signing officers, signing of a public key certificate using threshold cryptography, and storage of the certificate in a certificate database. The next demonstration showed as completely as possible all the key management activities throughout the life of a key in the MS/DC. These activities included the following. DC Private/Public Key Pair Generation and Public Key Distribution All participants in the CTBT interested in verifying certificates will meet with the members of the DC to witness the generation and release of the DC s public key. The private key of the DC should, of course, never be known to anyone. The best way to maintain secrecy of the DC s private key is to distribute the private key among many parties who are not likely to collude [4]. Acting as the Certification Authority of sensor public keys (the root of trust in the keys), it is appropriate for the DC to distribute its public key in a face-to-face meeting. This meeting is the bootstrap step of the entire key management process. Other public key exchanges can occur at this meeting as well. For example, the Observer will generate a privateipublic key pair and distribute its public key to the DC and to monitoring stations. The NDC may have a public key to distribute to enable authenticated communications. On-site Sensor PrivatePublic Key Pair Generation The sensor key generation process is critical to trusting the signatures produced by the sensor s authentication unit. Upon startup, the authentication unit will utilize a default private key, but allow the issuance of a command to generate a new private key. At each sensor site, Observers, acting on behalf of the PTS, will issue a key generation command to the sensor s authentication unit, acquire its public key, and send it to the DC as part of a signed request to certify. After a new key has been generated, only a key update command from the DC should be allowed. Sensor Public Key Certification Upon receipt of an Observer s request to certify a sensor system s public key, the DC will create a certificate for the key and electronically distributes the certificate to interested NDCs (signed with the DC s private key) and/or place it in a certificate directory for later access. Sensor Public Key Certificate Distribution and Verification Recipients of MS sensor data require the unique public key associated with that sensor in order to verify the authenticity of the data. Having the DC s public key, NDCs can veri@ the authenticity of certificates and utilize the certified public keys for sensor data verification. Sensor Private and Public Key Usage The sensor system will sign sensor data and communicate it to the NDC/DC. Following verification of the sensor s certificate using the DC s public key, the sensor s public key will be extracted from its certificate and used to verify sensor data signatures. Remote Sensor Key Updates The DC will remotely issue a signed key update command to an MS sensor and receive, certify, and distribute the new public key generated by the sensor s authentication unit. n detail, the sensor will 1) verify the signed key update command using the DC s public key, 2) generate a new private/public key pair, 3) sign the new public key with the old private key, and 4) begin using the new private key for sensor data authentication. f the sensor system s private key is trustworthy, then the newly generated public key communicated by the sensor system can be trusted as well. When the DC receives the signed public key from the sensor system, it creates a new certificate for that system and distributes it in the usual way.

Figure 5 illustrates the MS key management demonstration. The demonstration involves four computers representing the monitoring or sensor system, the DC, an NDC, and an on-site observer acting on behalf of the certification authority. The various steps involved in the key management process as described above are depicted with data flows and their associated order in time indicated with the numbered circles. DC and Observer private/public key pair generation and public key distribution 0 Sensor privatelpublic key pair generation and registration 0 0 Sensor public key certification and distribution 0 Signed Certification Sensor key usage 0 Request c--m / 0 Remote sensor key update 00 0 6 + * 0 Time sequence...> DC's public key y1- -.. Key : : - --,* mt**l Public Observer's public key +- Command nformation Ye** S>& Sensor Data nformation 1 1 1 Key Management nfo Figure 5. Key Management Demonstration Block Diagram. CONCLUSONS AND RECOMMENDATONS The Station Authenticator used in the Pinedale demonstration is applicable to existing MS stations that transmit Alpha protocol data from the station. Using the demonstrated hardware, estimated cost of retrofitting an existing MS station is $5000 with two weeks integration, testing, and installation effort per station. Note that the demonstrated hardware (Sun SPARCstation 5) is no longer available from Sun Microsystems, though it should be available from other sources. The Sun Ultra 5 workstation should make an acceptable replacement at the same cost with some additional development effort. t may also be possible to run the demonstrated software on existing station equipment. The signature verification programs used on the NDC Simulator may also be used at the NDC. The costs of including data authentication at the digitizers of the various sensors will be available in October, 1998. Non-recurring engineering costs experienced by other vendors who provide this instrumentation should be similar to those required for the Los Alamos demonstration. The tasks involved in each step of key management are neither difficult nor time-consuming to conduct.. Much of the effort occurs during the initialization phase and will not be repeated. The training for personnel required to perform PTS Observer tasks will be typical use of laptop computers. The key management system will likely require a system administrator or this function which could be shared with other elements of the DC.

c REFERENCES. Task Leader Guidelines on Authentication, CTBT/PC//WGB/TL/52/Rev1, 14 August 1997. 2. Task Leader Guidelines on Authentication, CTBT/PC/V/WGB/TL/92,2 1 January 1998. 3. The PTS Response to Technical ssues on Authentication, CTBT/WGB-6/PTS/CRP.33,3 June 98. 4. P. Herrington, T. Draelos, R. Craft, E. Brickell, Y. Frankel, and Mark Silvestri, "A Key Management Concept for the CTBT nternational Monitoring System", lgth Seismic Research Symposium on Monitoring a CTBT, December September, 1997.