5.4.2. Onboarding, Bootstrapping, Commissioning, Initial Equipment with Credentials
As the heading already reveals, the subsequent life cycle stage is referred to by different names. They all have in common that (a) the device that has been shipped by the manufacturer or distributor is still in its factory default state and (b) after this stage, a device is initially equipped with cryptographic artifacts originating from the domain of the owner or operator.
As described in
Section 5.3, Runde et al. [
34], Hausmann et al. [
30], and Fischer et al. [
28] propose the usage of initial device identifiers as specified in IEEE 802.1 AR [
26], to authenticate the devices during their initial configuration. During this initial configuration, an owner or operator of an automation system needs to issue and deploy certificates on the components from his own domain. This enables the authentication of devices and persons from his own domain. In particular, the configuration process is composed of a subgroup of the functions presented in
Section 5.2. This includes the equipment with trust anchors, private keys, and certificates.
Additionally, Fischer et al. [
28] note that authentication is the base for several security mechanisms, including authorization, integrity checks, and secure configuration. If the security level achieved during bootstrapping is already weak or vulnerable, other security measures that depend on them will be weak too. Moreover, the requirement is formulated that bootstrapping approaches shall minimize the management effort and therefore scale well with the number of devices. Similarly, Astorga et al. [
11] present a commissioning phase, which is either the last phase of the manufacturing process or the first phase before the actual deployment of the device in its operational environment. In the commissioning phase, the new device is registered in the Certificate Life Cycle Management Server (CLM) and provided with an IBC key pair and networking configuration. In the following
enrollment phase, the CLM can initiate the enrollment process by using a secured channel using DTLS and the raw public key from the IBC. In a similar manner, Höglund et al. [
46] propose the usage of pre-loaded certificates by the manufacturer to identify the device and at least one CA certificate to identify the enrollment server of the operator. Then, in a fully automated manner, the device can contact the operator’s CA using EST [
27] to acquire a certificate, key, and trust anchor.
Danilchenko et al. [
45] propose a commissioning phase after the manufacturing where an installer “claims” the devices and associates a previously configured security profile with the specific device. In Kohnhäuser et al.’s contribution [
51], existing and emerging OPC UA provisioning solutions, including OPC UA Part 21, are analyzed and compared. According to the authors, OPC UA Part 21 assumes that a device is handled by a multitude of parties before it is put into operation, for example, a device is manufactured, distributed, assembled into a compound device by an integrator, and finally operated, maintained, and decommissioned. Therefore, in OPC UA Part 21, not only is the goal of providing secure device identification and authentication set, but also a secure log of all life cycle stages. This is done by introducing
tickets, a separate digital document that describes a device and is signed by the party that handled the device. With this mechanism, each actor in the life cycle can use the
ticket provided by the previous actor to establish trust in devices. Krishnan et al. [
53] propose the usage of a provisioning server that is contacted and requested to issue a certificate. In contrast to the previous proposals, there is no initial authentication process described that verifies the device’s identity. Garba et al.’s proposal [
58] comprises a registration and configuration phase where a device registers its identity with a LRA and generates a self-signed certificate. According to the authors, the combination of the device’s public key and the assigned identity is stored in the Ethereum blockchain and can be used to authenticate the device. Park et al. subdivide the onboarding phase into an
initialization and
registration stage prior to the usage of the secure MQTT-SN channel. In the initialization stage, device certificates are generated and installed on each device. Moreover, in the registration stage, the broker is equipped with an access control list and the devices with a topic certificate.
There are also approaches that do not explicitly mention that there is such an onboarding phase and do not differentiate between different phases or stages of the life cycle of components [
29,
32,
33,
41,
42,
47,
50,
59]. However, Karthikeyan et al. [
41] mention that implementing and maintaining a PKI in the domain of the owner or operator is challenging.
Regarding industrial communication standards, as described by Kohnhäuser et al. [
51], the OPC foundation describes in its Part 21 [
56] an onboarding model. In the onboarding stage, the system integrator connects a device to the network and verifies that the identity reported by the device matches the identity in the ticket provided by the manufacturer or composite builder. Every device shall have a device configuration application (DCA), which interacts with a registrar in the owner’s or operator’s network and performs the onboarding process. These exchanges between the device and the registrar are secured with the device identity certificate. After the authentication of the device, the DCA is issued a DCA certificate by the registrar. This DCA certificate allows all applications running on the device to automatically be onboarded and configured without human intervention. It shall not be used for communication with any application other than the registrar software update or certificate manager. As already explained, OPC UA Part 21 does not describe any mechanisms to allow devices to authenticate the network they are connected to, thus following the TOFU model. Therefore, in the onboarding stage, devices are exposed to malicious actors that have access to the network.
In CIP Security, the onboarding stage comprises the equipment of CIP-Security-enabled devices with certificates, private keys, and trust anchors issued by the domain of the owner or operator. When a device is in its factory default state, it shall either have a vendor-signed certificate following IEEE 802.1 AR [
26] or a self-signed certificate. These default certificates will be stored in the CMO instance. Following the TOFU model, they can be used to supply the device with operator PKI-issued certificates, private keys, and trust anchors in a secured manner [
81]. However, the vendor-signed certificate has the advantage that its authenticity can be verified, whereas the self-signed certificate can be spoofed by an attacker.
For PROFINET, similarly to OPC UA and CIP Security, the equipment or provisioning of PROFINET devices follows the TOFU model. Optionally, but not mandatory, devices can be equipped with manufacturer-issued certificates. They can be used to secure provisioning exchanges. Similarly to OPC UA, PROFINET distinguishes between two types of certificates that are provisioned: LDevID-Generic and LDevID-PN certificates. Firstly, LDevID-Generic certificates, corresponding trust anchors, and private keys are provisioned. This is done after the optional device authentication using the manufacturer-issued IDevID. The purpose of the LDevID-Generic is to protect the further management of the LDevID-PN, which contains information specific to the indented functionality and is used to protect the application data exchanges. Next to the management of LDevID-PNs, there are additional security configuration parameters managed by the SIH including for example the key usage threshold value after which symmetric keys need to be renewed.
In IEC/IEEE 60802, we also observe the application of the TOFU model and the usage of IDevIDs to authenticate devices prior to their equipment with owner- or operator-specific credentials and to secure these management exchanges. Moreover, this security setup sequence comprises the equipment with a trust anchor, an LDevID-NETCONF comprising a private key, an end-entity certificate, and a domain-specific certificate for name mapping. Thereupon, the IA station can use the LDevID-NETFCONF and the corresponding imprinted trust anchor to mutually authenticate NETCONF clients for secure configuration. The cert-to-name mapping maps the client certificate to a NETCONF username and is a prerequisite to checking the NETCONF client authorization.
Regarding standards originating from the IT domain, CMP [
14] describes the initial registration and certification when an end entity requests a first certificate from a CA. The IETF RFC [
14] only describes as a precondition that the end entity can authenticate the CA’s signature based on out-of-band means and that the end entity and the CA share a symmetric MACing key. However, it does not describe how these preconditions can be met. The CMC [
19] and the draft standard of EALS [
40] allow the usage of pre-shared-secrets to authenticate the exchanges between a CA and an EE. However, both approaches do not describe how to supply this pre-shared-secret. Regarding the EST protocol [
27], an EST server authenticates and authorizes an EST client either using TLS with a previously issued client certificate issued by the EST CA or a manufacturer-installed certificate, certificate-less TLS (e.g., with a shared secret that is distributed out-of-band), or HTTP-based with a username/password distributed out-of-band. Moreover, clients need to authenticate EST servers. Therefore, the RFC [
27] either assumes that EST clients possess a trust anchor to validate the EST server certificate or can be bootstrapped with this trust anchor. In AMCE [
39], an ACME client contacts a CA and requests a certificate for an intended domain name. The contacted CA verifies that the client controls the requested domain name by having the client perform some action that can only be performed with control of the domain. Once the CA is satisfied, it issues a certificate that can be downloaded by the ACME client. The SCEP RFC [
17] mentions that a client must retrieve CA certificates before any operation can happen. This CA certificate may be provided out of band, or a fingerprint of the certificate may be used to authenticate a CA certificate. Moreover, client authentication must be achieved by the client using an appropriate client certificate, which is either self-signed or issued by the SCEP CA or an alternate CA. In order to achieve enrollment authorization, a
challengePassword attribute shall be sent as part of the enrollment request.
As the name indicates, the BRSKI RFC [
35] specifically focuses on the bootstrapping process. In this process, an IEEE 802.1AR [
26] IDevID is used within TLS to authenticate the device and to make a decision if one wants to take the device into possession. Moreover, the device uses a voucher artifact in order to authenticate the identity of the new owner or operator registrar and to decide whether to join the owner or operator network. As a result of the bootstrapping process, the device (pledge) stores a root certificate sufficient for verifying the registrar identity that enables the establishment of a TLS connection to an EST server to be enrolled with owner- or operator-specific certificates.
To conclude, all industrial communication standards pursue the usage of IEEE 802.1AR [
26] IDevIDs to validate the authenticity of devices prior to their equipment with owner or operator domain-specific trust anchors, private keys, and trust anchors. Moreover, they are used to protect these initial equipment exchanges. Only OPC UA enables authentication of the origin of all prior participants in the supply chain using tickets, whereas other standards only enable authentication of the manufacturing domain. Furthermore, all industrial communication standards rely on the TOFU model. In comparison, regarding IT-domain-based standards, only BRSKI enables a mutually authenticated and authorized decision whether to equip devices with certificates or not. However, most of the other IETF RFCs that are presented in
Section 4.3 do not explicitly detail how the artifacts used to secure the initial equipment (certificates or pre-shared keys) are supplied. Hausmann et al. [
30], Runde et al. [
34], Fischer et al. [
28], and Höglund et al. [
46] describe quite similar approaches for the initial equipment of devices compared to the existing industrial communication standards.
5.4.3. Operational
Once the initial equipment of IA components with certificates, private keys, and trust anchors is completed, an IA component can pursue its tasks, potentially through one or more applications running on the device. Throughout this subsequent operational stage, it may occur that a renewal of a certificate with trust anchor and/or private key renewal is necessary.
Regarding the research papers presented in
Section 4.1, some only address the initial equipment but do not address the management during the operational phase [
28,
41,
45,
51]. Fernbach et al. [
29] mention that due to their limited validity period, certificates need to be renewed in case they are expired. Krishnan et al. [
53] also mention that in the scenario where a particular device’s certificate validity is over, it needs to be renewed, which is handled by the bootstrapping service they proposed. Astorga et al. [
11] deal with the operational phase with their proposed CLM that checks renewal dates and starts re-enrolment when needed using SCEP [
17]. Garba et al. [
58] describe the usage of the certificate after the equipment as well as the update and revocation that can occur in the certificate life cycle. Park et al. [
48] propose a dedicated re-keying protocol in case the topic membership changes during the operational stage. Höglund et al. [
46] describe an overview of the life cycle of an IoT device where, after the bootstrapping, the device is in an operational state, is enrolled, and requires re-enrollment in order to avoid the expiration of the device’s certificate.
OPC UA Part 21 [
56] describes the operational stage as all applications on the device running normally and performing their intended tasks. Moreover, it shall be possible at this stage to update the trust list and/or renew the application instance certificate. Furthermore, a device can be reconfigured when applications are newly installed, modified, backed up, or restored. In this configuration state, a new device can be dropped in as a replacement for a to-be-exchanged device. Then, the replacement device can use the DCA certificate that was deployed during the onboarding procedure to automatically request additional certificates and trust lists without the need for additional approvals. PROFINET [
52] supports a similar feature that significantly shapes PROFINET’s specified certificate management life cycle by enabling the device replacement in an automated manner. Since the LDevID-Generic certificate allows the unattended management of LDevID-PN certificates, the replacement of a device is heavily simplified. The initial configuration with the LDevID-Generic is separated in a timely manner from the automated imprinting of the LDevID-PN. Moreover, this also simplifies management, including the renewal of certificates for devices that are already in the operational stage. IEC/IEEE 60802 also follows the same approach and uses the LDevID-NETCONF to enable the automated and unattended management of further certificates, keys, and trust anchors. Similarly, CIP Security supports a feature, namely Automatic Policy Deployment, that leverages the introduced pull model to initiate the deployment of security policies including a signed certificate from a CA [
84].
In IT-domain-based standards, we do not face differentiation in an actual operational phase. However, as we discussed in
Section 5.2, there are some standards, including CMC [
19], TAMP [
24], EST [
27], ACME [
39], and SCEP [
17], that feature an explicit function to renew certificates.
To conclude, we observe that throughout the operational phase, a renewal of certificates or reconfiguration is necessary. Moreover, the replacement of devices can occur without prior notice. We observe that OPC UA [
56], PROFINET [
52], and IEC/IEEE 60802 [
60] use a dedicated credential that enables automated configuration and equipment with additional credentials without further attendance.