
•
Brute force attack. This attack consists of working through all the possible
combinations in order to recover a password or an encryption key used in a
network.
•
Dictionary attack. This attack is used to recover a password or a key by using
a database containing many words.
•
Spoofing attack. This attack is based on identity usurpation in order to access
the network. It is generally associated with brute force or dictionary attacks
that are used to access certain information, like the login and password of a
user.
•
Attack on exploiting holes in security. Many protocols and operating systems
are vulnerable due to their design. These flaws can be used either to make it
possible for the attacker to get into the machine or in the network, or to gain
control of the machine or recover data.
•
Virus, worm, and Trojan horse attacks. These attacks are very well known
and make it possible either to damage files or even machine components, or to
gain control of a machine (viruses and worms) and to exploit its resources
(Trojan horse).
Security for PLC Networks
HomePlug implements a PLC private network system based on encryption keys
known by authorized PLC devices in this network for increased PLC network secu-
rity.
This mechanism is based on the secure, reliable, and simple registration for the
network manager or user of the various PLC devices of the same logical network.
These functionalities make the deployment of PLC networks easier.
The main characteristics of the registration of a PLC device in a PLC network
are the following:
•
Security. A device can be registered in a PLC network only if it has the suitable
encryption keys and only if it is authorized and registered by the network man-
aging devices. It must be possible to easily attach new devices and also to
quickly remove devices from a PLC network.
•
Reliability. The same PLC network must provide stability in the configura-
tion of encryption keys and support the electrical connections/disconnections
of the network PLC devices in a stable manner. It must also be possible to
recover an original configuration if the keys are lost or if a device is
deconfigured.
•
Simplicity. Managing the configuration of the encryption keys of the various
PLC logical networks must be simple for a network manager. For this pur-
pose, a single key used for data exchange encryption over the electrical net-
work is defined by HomePlug 1.0 and Turbo. HomePlug AV, which is more
sophisticated, defines several network keys that are managed by the network
coordinating device that centralizes the keys.
72 Security
Komentáře k této Příručce