It would take too much effort to connect all wind turbines, which stand far apart from each other, with cables. Therefore, they are often controlled via mobile phone networks.
© Roberto Schirdewahn

IT Security How safe are critical infrastructures from hacker attacks?

Mobile phone networks can be used to control wind power stations. This carries risks.

Critical infrastructures such as wind power stations are partially controlled via mobile phone networks. Using state-of-the-art tests, researchers at Horst Görtz Institute for IT-Security (HGI) in Bochum are investigating how well protected that form of communication is from external attacks. The team from Ruhr-Universität Bochum has joined forces with colleagues from TU Dortmund University in the Bercom project, with the aim of making critical infrastructures in Europe able to withstand hacker attacks. A report on their research was published in Bochum’s science magazine Rubin.

Obsolete technology in use

As wind turbines are often scattered across large areas, they cannot be entirely controlled via cables. “Mobile telephony networks have to be used for the last mile of the control,” says David Rupprecht, PhD student and participant in the Bercom project. Reliable monitoring of such facilities is important to, for example, maintain control over the generated energy volumes. If they are higher than the consumed energy volumes, the power grid overloads and an outage may occur. Attackers can interfere with the system by authorising surplus electricity production while overriding the system’s safety measures.

“Many critical infrastructure operators currently use outdated and therefore insecure communication technologies,” says Rupprecht. Those include the legacy mobile phone standard GSM. In the private sector, GSM has been overtaken by the new standard LTE.

Mobile phones rather than wind turbines

Rupprecht has developed tests for assessing how secure chipsets installed in the control units of wind turbines are. The aspects he’s interested in are encryption and authentication techniques that are deployed to facilitate communication. Encryption prevents attackers from gaining access to information about the system by reading the transmitted messages. Authentication prevents attackers from sending fake commands to the control unit by passing themselves off as a real mobile phone network.

As the chipsets installed in the control units of wind power plants are identical to those used in mobile phones, David Rupprecht was able to conduct his tests using the latter. With the aid of so-called Software Defined Radios, he imitated an LTE base station that transmits signals to all mobile phones and receives signals from them in turn. Thus, he simulated attacks on different chipsets.

Inadequate encryption

The result: None of the ten tested mobile phones alerted its user to an unencrypted data exchange. When it came to authentication, on the other hand, only one phone failed the test; the other nine identified fake messages and did not authorise their reception.

In the course of the project, the researchers from Bochum and Dortmund, in collaboration with other research and industrial partners, intend to turn LTE into a more secure mobile telephony standard for the energy sector.

Detailed article in Rubin

You can find a detailed article about the research conducted by the team of the Bercom project in the science magazine Rubin. Texts on the website and images in the download page are free to use for editorial purposes, provided the relevant copyright notice is included.

University Alliance Ruhr

The three universities in the Ruhr region launched a close strategic collaborating under the umbrella of University Alliance Ruhr (UA Ruhr) in 2007. By consolidating their resources, the partner universities systematically boost their performance. “Three universities, one community, endless opportunities” is the principle applied to more than 100 cooperations in research, academia and administration. With more than 120,000 students and almost 1,300 professors, UA Ruhr is one of the largest and most powerful academic hubs in Germany.

Press contact

David Rupprecht
Horst Görtz Intitut for IT-Security
Ruhr-Universität Bochum
Germany
Phone: +49 234 32 23508
Email: david.rupprecht@rub.de

Unpublished

By

Julia Weiler

Translated by

Donata Zuber

Share