[By Norman Südekum]
With increasing digitization and networking aboard ships, the risk for data abuse and cybercrime also increases. Anyone considering the possibilities of Maritime 4.0 must also consider the increased requirements for IT security – and more importantly, find suitable solutions for implementing it.
A ship’s various intelligent subsystems ensure problem-free operation, from tank and ballast water management through drive control up to alarm and monitoring systems. They all function using industrial automation technology. At many points, advantages result from networking these subsystems – for example, when ship operations can run with greater resource- or energy efficiency. The exchange of sensitive data also increases everywhere systems are networked.
However, this is not enough. In comparison to applications on land, ships have additional electronics like navigation, tracking and collision warning systems. They serve the safety of the ship; however, they also represent an additional threat, primarily because they not only increase the level of onboard networking, but also establish external connections. For these connections, Internet-based network technologies or mobile services are seeing increased use. And these communication paths provide access points for manipulation – particularly at the points between the ship and land.
Access to or the reading of sensitive data is a comparatively less important problem when compared with the effects caused by hackers introducing malware into the control systems of ships or drilling rigs, altering coordinates, or accessing a vessel’s security-relevant subsystems. These acts don’t just endanger IT security, they also impede functional safety, and ultimately the crew’s safety. This is precisely why recommendations regarding IT security have increased along with the level of digitization and networking. The American Bureau of Shipping, BIMCO, Lloyd’s Register Group, the UK Chamber of Shipping, and the European Union Agency for Network and Information Society have all published guidelines regarding IT security aboard ships. In general, they define processes, model approaches or technical measures for implementing IT security; for the most part, these align with the guidelines for automation technology.
“IT by design” instead of “defense in depth”
There also seems to be agreement that additional communication relations are generated by Industry 4.0 or Maritime 4.0, providing an increasing potential for cyberattacks. What is more important is that isolation concepts are reaching their limits. This is because of the opportunities provided by
networking, which both increases the frequency of outside access and allows much deeper penetration into the ship’s automation systems than before. There is a completely transparent reason for this: by using remote solutions, shipping companies obtain the possibility for remote diagnosis of their ships, which allows them to optimize their fleets and remarket the recorded data. In addition, they can reduce labor costs if fewer personnel or a less qualified crew is used that can receive support from engineers on land for repairs. And finally, better networking of shipping companies and port facilities improves the logistics at the docks and reduces fuel consumption for the ships.
Simply preventing external access cannot be a solution for fixing security on ships. Defense in depth, however, which has previously been considered as state of the art, will soon become insufficient – even if it starts with access limitations, network segmentations and monitoring systems on the various levels of ship automation. Security concepts are increasingly required that always function, regardless of the time or remote access point. The new demand is for “IT Security by Design,” that is, functions of IT security that are integrated from the start into the configuration of a layer-based security architecture in the controllers.
From the PLC to the cloud – securing the paths that data travels
Such technical possibilities already exist and are capable of closing gaps in security. For example, a reliable means of communication is the establishment of a virtual private network (VPN), based on OpenVPN and using SSL/TLS connections (Secure Sockets Layer, Transport Layer Security). These connections enable the transmission of encrypted data, even over wireless communication systems.
WAGO establishes such VPN tunnels using OpenVPN or IPsec directly from the WAGO PFC200 Controller. The WAGO controller additionally records all relevant measurement and control data, encrypts it directly in the controller using SSL encryption and transmits the data as VPN. This means that no additional VPN tunnels have to be established by modems or routers, and, what may be more decisive, the line between the controller and modem is then directly encrypted as well.
Tools in the PFC Family:
• Password protection,
• SSL/TLS-1.2 encryption
• SSH – Secure shell client
• VPN (OpenVPN, IPsec)
• MAC whitelist
Integrated Linux® services
• SD card reader
• FTP, SFTP, SCP
• Optional: Rsync
• Optional: Virus scanner
• Optional: Fail2Ban
Which switches provide which tools?
• Password protection,
• SSL/TLS-1.2 encryption
• Bandwidth limitation
• Bandwidth monitoring
• MAC whitelist
• ARP inspection
• DHCP Snooping
• L2/L3 Access Control List
• 802.1X Port access control
• Log, Alarm (by email)
• SNMP v2, v3
• Backup & Restore settings
Norman Südekum is the Head of Group Process & Marine for WAGO Kontakttechnik GmbH.
About WAGO Kontakttechnik
WAGO is a family-owned company headquartered in Minden, Germany. Independently operating for three generations, WAGO is the global leader of spring pressure electrical interconnect and automation solutions.
For more than 60 years, WAGO has developed and produced innovative products for packaging, transportation, process, industrial and building automation markets amongst others. Aside from its innovations in spring pressure connection technology, WAGO has introduced numerous innovations that have revolutionized industry. Further ground-breaking inventions include: the WAGO-I/O-SYSTEM®, TOPJOB S® and WALL-NUTS®. For more information, please visit www.wago.us.