The Future of Industrial Security

The Future of Industrial Security

Power, efficiency raise the security stakes ever higher

In the new world of modern industrial networking solutions, the security measures to protect a network must match the pace of innovation across many industries, including mining, oil and gas, agriculture, transportation, heavy construction, military, municipalities, and government.

With Artificial Intelligence (AI), the Industrial Internet of Things (IIoT), and robotics, integrated and intelligent systems have been devised that offer novel ways of incorporating new assets into a network. With more systems becoming integrated, the line between digital and physical infrastructure has become increasingly blurred. As the power and effi- ciency of connectivity solutions improve, the security stakes are raised ever higher.

It is for these reasons that, in real terms, a compromised network represents a significant threat to mission-critical systems that keep people safe from harm, as well as jeopardizing sensitive data. Data deserves protection from malicious actors seeking to steal from, subvert or otherwise interfere with vital industrial operations. Given the significance of the problem, the industry is increasingly turning to networks with encryption options and unwavering reliability to solve to this very problem. To stand up to the escalation of the “cyber war” CSO’s and CISO’s are searching for secure networking solutions to provide the kind of protection they now require, which must often support mobility and autonomy.

The Rajant ES1 also earned Security Today’s Govies award for platinum-level “Intelligent Communications. As a result, Rajant Kinetic Mesh is well-established as being a best-in-class offering for CSOs and CISOs in their arsenal of tools to reduce the risk from external threats, all while managing security effectively at a degree of efficiency that was previously inaccessible.

THE BEST OF MESH NETWORKS

Rajant’s Kinetic Mesh networks are built to provide multi-level, robust security to protect network traffic, even as network topologies evolve. As a result, Rajant can offer resilient, intelligent, and secure wireless broadband connectivity, and the Kinetic Mesh solution shines in environments not typically suited to traditional connectivity, such as mobility-driven locations, including ports, mines, energy plants and railyards.

With the Kinetic Mesh, you can remove or introduce new nodes into the network, and the intelligent mesh will automatically adapt, while maintaining complete security. Rajant has strived to create a “living” network which is dynamic, and capable of adapting to the communication requirements of any organization without ongoing, engineering micro-management. As such, the network can seamlessly be installed in minutes and integrate with existing communications infrastructure saving upstart time and money.

Establishing secure network traffic is as simple as choosing the security features required by the organization’s information security strategy. These many features can be controlled, monitored, and managed by Rajant BC|Commander® software that accompanies the Bread- Crumb nodes and integrates with systems that exist on non-Rajant network infrastructure.

CRYPTOGRAPHIC LAYERS

There are many layers to the cryptographic protection installed with Rajant’s Kinetic Mesh network, and all Bread- Crumb nodes are configured with 256-bit Advanced Encryption Standard (AES) using Rajant’s BC|Commander. The first layer of security starts with the cryptographic ‘handshake’ when two nodes interface. The nodes initiate this security handshake upon establishing a connection with each other no matter which security options are selected for the network.

This feature is always active and can’t be removed. If the nodes don’t recognize the cryptographic settings, then the connection is denied.

Beyond this, the selection of cryptographic options includes packet ciphers to encrypt all data as it flows between Bread- Crumbs and per-hop authentication to ensure that each data packet received is in its original state. The network has MAC address cipher capabilities to encrypt the source and destination MAC addresses and a client traffic cipher secured via WEP (Wired Equivalent Privacy), WPA (Wireless Protected Access), WPA Enterprise (Remote Authentication Dial-In User Service or RADIUS), WPA2, and WPA2 Enterprise (RADIUS).

Rajant offers access control lists (ACLs) that can be applied to Ethernet and radio interfaces to specify the users or system processes that are granted access to objects as well as the operations that are allowed on given objects. You can deny access to specific items such as email addresses, users and URLs with a blacklist.

Virtual local area networks (VLANs) allow the segmentation of multiple virtual networks on a single mesh and are configured on a per-port basis, where a port is a BreadCrumb node, one of its Ethernet interfaces or a radio interface- ESSID combination. Clients with access to one set of VLANs cannot receive or send traffic to other VLANs even if they are on the same BreadCrumb mesh.

Quality of service settings applied to prioritize critical traffic can provide a security benefit in certain applications, and disabling interfaces allows unused Ethernet and Radio interfaces to be disabled remotely.

Beyond these deep features, further security options are available to protect communications from the mesh network. To fortify the integrity of the Rajant firmware, updates are encrypted using 256-bit AES in CBC mode and cryptographically signed using a 4096-bit RSA key-pair meaning that non-Rajant firmware cannot be installed. Further to this, BC|Commander’s administrative and management communications are secured using TLSv1 with an RSA or ECC key that is configurable and unique to each BreadCrumb. All BreadCrumb configurations, passwords, and critical security parameters are capable of being remotely managed via BC|Commander or via a button on the device with physical access to a BreadCrumb node. This makes the BreadCrumb device inert so that it cannot join a secured mesh network.

THE FUTURE OF SECURITY

As the abilities of malicious parties improve, the techniques and methods used to compromise and assault critical information systems at industrial enterprises become more and more sophisticated. Therefore, industry-leading connectivity solutions need to provide topof- the-line security to match the strength of the network. Rajant has been engaged in a long-term effort to build the most secure solutions available and fight back against malicious parties hoping to intrude on private networks. As a result, they are incredibly well-positioned to provide the latest and most effective security measures to CSOs and CISOs across the industry. This is something the military, the first customer, has known for 20 years.

This article originally appeared in the July / August 2021 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3