Security Of Home Automation Systems - ERNW

2y ago
12 Views
2 Downloads
1.88 MB
39 Pages
Last View : 22d ago
Last Download : 3m ago
Upload by : Elisha Lemon
Transcription

Digital unterschrieben von Friedwart KuhnDN: c DE, o ERNW Enno Rey NetzwerkeGmbH, cn Friedwart Kuhn,givenName Friedwart NikodemusMichael, sn Kuhn,serialNumber DTRWM384176041574922Datum: 2015.08.03 11:01:29 02'00'ERNW Newsletter 49 / August 2015Security of Home Automation SystemsERNW Enno Rey Netzwerke GmbHCarl-Bosch-Str. 469115 HeidelbergTel. 49 6221 480390Fax 49 6221 ):Dominik Schneider, Wojtek Przybilla

TABLE OF CONTENT1ABSTRACT .52INTRODUCTION .63WHAT IS EIB / KNX? .74COMPONENTS OF A KNX NETWORK .84.1REQUIRED COMPONENTS . 84.2TESTING ENVIRONMENT . 84.3ETS – ENGINEERING TOOL SOFTWARE . 105SECURITY OF SMART HOME SYSTEMS . 125.1ETHERNET / KNX - GATEWAY . 135.2THE TESTED DEVICE . 135.3SPECIAL CASE . 165.4RESULT ETHERNET / KNX – GATEWAY . 176A REAL WORLD SCENARIO – FACILITY HACKING . 186.1GETTING PHYSICAL ACCESS TO THE BUS . 186.2GETTING ACCESS TO THE COMMUNICATION . 196.3READING / SENDING PACKETS . 206.3.16.3.2Establishing a Connection . 21Running EIBD . 226.4DISCOVERING ALL DEVICES. 246.5ANALYZING THE TRAFFIC. 256.6CONTROLLING THE INSTALLATION FROM EVERYWHERE . 266.6.1Attack Setup . 276.7RESULT . 287FURTHER ATTACK SCENARIO . 297.1CLOSE DOWN THE BUS . 297.2A PRACTICAL ATTACK. 297.2.17.2.2Enabled Password Protection . 30Disabled Password Protection . 308SECURING THE IMPLEMENTATION. 318.1NETWORK LEVEL . 318.1.18.1.2VPN . 31VLAN . 31ERNW Enno Rey Netzwerke GmbHCarl-Bosch-Str. 4D-69115 HeidelbergTel. 49 – 6221 – 48 03 90Fax 49 – 6221 – 41 90 08VAT-ID DE813376919Page 2

8.2PHYSICAL LEVEL . 318.2.18.2.2No Bus to the Outside . 31Line Coupler . 328.3SYSTEM LEVEL . 328.3.18.3.28.3.3Latest Firmware . 32Strong Authentication . 32Check Logs . 338.4KNX SECURITY CHECKLIST . 338.5ADDITIONAL SECURITY MECHANISMS . 338.5.18.5.28.5.3Enable Proxy Mode . 34Setup Authentication. 35Using Encryption. 369CONCLUSION . 3710APPENDIX . 3810.1REFERENCES . 3810.2DISCLAIMER . 39ERNW Enno Rey Netzwerke GmbHCarl-Bosch-Str. 4D-69115 HeidelbergTel. 49 – 6221 – 48 03 90Fax 49 – 6221 – 41 90 08VAT-ID DE813376919Page 3

LIST OF FIGURESFigure 1: Testing Environment . 9Figure 2: Engineering Tool Software . 11Figure 3: Ethernet / KNX - Gateway1. 14Figure 4: Ethernet / KNX - Gateway2. 14Figure 5: Stack Trace Output . 15Figure 6: Special Case . 16Figure 7: Special Case - Google Maps . 17Figure 9: Actuators. 18Figure 10: Recess with bus cable . 19Figure 11: Attack setup . 20Figure 12: Nmap scan . 22Figure 13: Output of EIBD . 23Figure 14: groupsocketlisten . 24Figure 15: Result . 26Figure 16: Attack setup UMTS . 27Figure 17: Example Implementation . 34ERNW Enno Rey Netzwerke GmbHCarl-Bosch-Str. 4D-69115 HeidelbergTel. 49 – 6221 – 48 03 90Fax 49 – 6221 – 41 90 08VAT-ID DE813376919Page 4

1ABSTRACTHome Automation Systems are used more and more in new and modern buildings. They provide many comfortablefunctions, which make our daily life easier. Nearly every functionality in a building can be controlled with such a system,also security-relevant mechanisms like alarm systems. Therefore the security of the home automation itself should beas secure as possible. This fact should also apply to extensions like web interfaces for controlling smart homes via aweb browser. This document examines different security aspects of the KNX technology as well as extensions, forexample web interfaces which can also be part of an installation.ERNW Enno Rey Netzwerke GmbHCarl-Bosch-Str. 4D-69115 HeidelbergTel. 49 – 6221 – 48 03 90Fax 49 – 6221 – 41 90 08VAT-ID DE813376919Page 5

2INTRODUCTIONComputers are an integral part of both daily business, and private life and are widely used. The amount ofcommunicating devices increases from day to day. The Internet of Things and Industry 4.0 are imminent, as well as thenext step in the evolution of the communication area. Nearly every device has some kind of technology to communicatevia the Internet with other participants, be it the vendor or some central agency. In the same extent, the amount oftransferred data increases as well. The exchanged information can be completely different, but with the entry ofinformation systems or any kind of smart device into our daily life, the security aspects of the exchanged data aremostly unconsidered. These days even medical records are exchanged through the Internet, which represent highlysensitive information about a person.More and more things are connected to each other and nearly every device becomes some kind of “smart”. After smartphones and smart watches, the new technique which will be part of our life will be smart homes. A building will beequipped with devices that allow for control of nearly every functionality, be it the light or the blinds. Besides thesedevices security relevant devices like an alarm system or smoke detectors can also be controlled in a smart home. Forthat reason, particular attention should be placed on this technology.Of course there are some benefits which come with home automation systems like comfort and reduced operationalcosts, but security and safety aspects should also be valued. The intention of this document is to analyze the security ofKNX in a variety of sectors. First, a web application for a comfortable controlling of an installed KNX network, providedby a KNX extension device, is examined. This will be followed by a practical attack against a building equipped with KNXwill be demonstrated.ERNW Enno Rey Netzwerke GmbHCarl-Bosch-Str. 4D-69115 HeidelbergTel. 49 – 6221 – 48 03 90Fax 49 – 6221 – 41 90 08VAT-ID DE813376919Page 6

3WHAT IS EIB / KNX?The European Installation Bus (EIB) is a technology for building home automation systems. In 1999, three differentmembers founded the KNX Association. The members were the European Installation Bus Association (EIBA), theEuropean Home Systems Association (EHSA) and the BatiBUS Club International (BCI). The goal of the newly foundedKNX Association was to provide a technology which can be widely used, and to become the single standard in the field ofbuilding home automation systems. These days there are about 315000 smart homes in Germany; three quarters ofthem are supplied with the KNX technology. According to a survey of BITKOM, the federal Association for InformationTechnology, Telecommunications and New Media, by 2020 there will be one million smart homes in Germany.11Andreas Streim, Tobias Arns: Connected Home, (2014)ERNW Enno Rey Netzwerke GmbHCarl-Bosch-Str. 4D-69115 HeidelbergTel. 49 – 6221 – 48 03 90Fax 49 – 6221 – 41 90 08VAT-ID DE813376919Page 7

4COMPONENTS OF A KNX NETWORKThe assembled components of a KNX installation are dependent on the desired functionality. For turning a light on andoff, different components are required than for checking the temperature of a specific room. Certainly every KNXinstallation needs some basic components, for example a power supply or an interface for the initial programming ofthe installation.4.1Required ComponentsThe basic components which are required are:-Power supply-Interface for the initial programming (e.g. KNX/IP – Interface)-Switch actuator-Sensor-Bus line (for the interconnection)If more features are required, the installation has to be expanded by the specific devices, which provide the desiredfunctionality. There are devices for nearly every scenario. If somebody wants that the light in the kitchen turns on at aspecific time or that this light has a dim feature, buying a device that provides this feature is the only requirement. Youhave just to select a switch-actuator by a vendor of your choice and program it. Furthermore, an alarm system togetherwith a motion sensor could be installed and connected to the KNX installation. The capabilities, which are provided by ahome automation system with the KNX technology, are versatile. More and more devices are developed for this system,and at the moment, this is just the beginning.4.2Testing EnvironmentFor testing KNX devices and learning how all the comfortable things work, a minimal testing environment was set up.The set up consists of devices from different vendors, for example Berker, Busch-Jäger and EIBMarkt. Due to theexcellent standardization and the coalition of vendors in the Konnex Group, using different devices in one set up leads tono issues. Five devices form the testing environment, which are shown in the figure below.ERNW Enno Rey Netzwerke GmbHCarl-Bosch-Str. 4D-69115 HeidelbergTel. 49 – 6221 – 48 03 90Fax 49 – 6221 – 41 90 08VAT-ID DE813376919Page 8

5.1.2.3.4.Figure 1: Testing Environment1.Berker bus power supplyThe power supply provides the electricity which is required by the different KNX components. The electricity issupplied via the bus wire and delivers a 28 volt direct current. A further function of the power supply is thereset. The reset is used for restoring the KNX devices to the original system state. This means, that allprogrammed functionality of the set up will be deleted. Once a reset is performed, the KNX devices have to beprogrammed again.2.Busch-Jäger switch actuatorThis device is required for controlling the electric load. In the testing environment it is used to control the LEDstripes. Four separated LED stripes are mounted; all of them can be controlled individually. For turning theseLED stripes on or of a button has to be pushed.ERNW Enno Rey Netzwerke GmbHCarl-Bosch-Str. 4D-69115 HeidelbergTel. 49 – 6221 – 48 03 90Fax 49 – 6221 – 41 90 08VAT-ID DE813376919Page 9

3.Siemens IP ViewerThis device can be used for the comfortable control via the web browser or an app on the mobile phone. TheSiemens IP Viewer comes with an integrated web server. This KNX device is designed for people who want tocontrol their smart home from all over the world. The handling of the embedded web application is very easyand the most of the functions are intuitive.4.EIBMarkt IP InterfaceLike the device before, the IP Interface is also needed to program the KNX system. In contrast to the IP Viewerthis device doesn’t comes with an embedded web application. The device has some basic network protocolsfunctionality. These are ARP, ICMP, IGMP, UDP/IP and DHCP. The primary function of the IP Interface is totransform KNX telegrams, which are packed in IP packets, into “real” KNX telegrams. After transformation,the IP Interface sends the KNX telegrams to the bus.5.Berker switch sensorThe Busch Jäger switch actuator turns the light on or off but needs to receive a command to do so. For thispurpose, the Berker switch sensor is needed. If a button gets pushed on it, the Busch Jäger switch actuatorreceives the signal and turns the corresponding light on or off, depending on the state of the light, before thebutton gets pushed.4.3ETS – Engineering Tool SoftwareIn contrast to the standard and the KNXnet/IP protocol, which is open source, the software which is required for theinitial programming task is proprietary. This software can be downloaded from the KNX website and installed on aWindows-based computer, it’s called ETS – Engineering Tool Software2. Software for other operating systems is notprovided by the KNX group. At the moment, there is no other software available besides ETS to program KNX devices. Ifsomeone wants to use the KNX technology, to transfer their home to a smart home or install it in a new building, thereisn’t the possibility to use other software.The software is available in three versions; these are Demo, Lite and Pro. The difference between these 3 versions is thenumber of devices which can be programmed at the same time. With the Demo version only 3 devices can beprogrammed at the same time. For a testing environment with just a few devices this could be enough, but for a r

Security of Home Automation Systems ERNW Newsletter 49 / August 2015 ERNW Enno Rey Netzwerke GmbH Carl-Bosch-Str. 4 69115 Heidelberg Tel. 49 6221 480390 Fax 49 6221 419008 www.ernw.de Version: 1.0 Date:

Related Documents:

programmable logic controller, is important for industrial engineer. Factory automation mainly covers; Machine level automation, Production line or work cell automation, Shop floor automation, and Plant level automation. The present manual focus on the 1st level of factory automation e.g. machine automation level. It provides an introduction .

CA Workload Automation Agent for Windows (CA WA Agent for Windows) CA Workload Automation Agent for z/OS (CA WA Agent for z/OS) CA Workload Automation CA 7 Edition (formerly named CA Workload Automation SE) CA Workload Automation ESP Edition (formerly named CA Workload Automation EE) CA Workload Control Center (CA WCC) Contact CA Technologies

5/22/2018 Raspberry PI projects home automation PDF offline download - Raspberry PI Projects . ThiDom Home automation This project uses Arduino, Raspberr y and Attiny, it allows you to control nd monitor your home (AC outlet , shutters, hea ter, light , opening

Pi and Arduino, open source projects, parallel computing, home automation, amateur electronics, home networking, and software engineering. . Chapter1, An Introduction to the Raspberry Pi, Arduino, and Home Automation, introduces the technologies used in the book and provides a conceptual background to the world of home automation.

Various home automation systems were proposed in literature with different specifications and functionality. [22] proposed a home automation by implementing zigbee with Arduino to control the home appliances. This system controls small home appliances by using various till date technological sensors. Users are able to check the status of their home

advantages and disadvantages of technologies used in home automation systems. Basically, the paper explains how home automation is carried out with the help of different wireless devices. In paper [2] consists of voice control home automation using Arduino module. The system use in this paper uses c programming language for

automation security By: Murray McKay, Principal Application Engineer, Siemens Industry, Inc. Abstract Historically, automation systems have relied on "security through obscurity" to avoid computer attacks. Those days are gone. While the number of actual attacks on automation systems has been small, the tools needed to conduct these attacks are

Unit 7: Organisational Systems Security Unit code: T/601/7312 QCF Level 3: BTEC Nationals Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to enable learners to understand potential threats to IT systems and the organisational issues related to IT security, and know how to keep systems and data secure from theseFile Size: 206KBPage Count: 8Explore furtherUnit 7: Organisational System Security : Unit 7: P1, P2 .unit7organisationalsystemsecurity.bl Unit 7: Organisational Systems Securitywiki.computing.hct.ac.ukLevel 3 BTEC Unit 7 - Organisational Systems Security .wiki.computing.hct.ac.ukUnit 7: Organisational Systems Security Cybersecurity .jadeltawil.wordpress.comUnit 7: Organisational System Security : Unit 7: P6, M3 & D2unit7organisationalsystemsecurity.bl Recommended to you b