Page 20 - 251119_BJ_ME-Journal_14_digital
P. 20

BACnet Insight


          Secure HTTPS Provides Enhanced Security


          in a Building Management System





          Network Security is more critical than ever in today’s
          building management system (BMS) networks to ensure
          authentication, integrity, and confidentiality of data
          transferred over the Internet. This article describes
          how BACnet-complaint devices that incorporate
          HTTPS deliver encrypted communication and protect
          the integrity of client data. This article also describes
          the HTTPS authentication and encryption method
          which utilizes keys and digital certificates. It compares
          certificates generated by a Certificate Authority (CA) vs.
          self-signed certificates and provides a resource to create
          your own self-signed certificate.

          BACnet  remains  the  most  popular  protocol  utilized
          in HVACR control systems and there is a robust
          ecosystem of devices that comprise these systems,
          including Gateways to integrate other protocols, such as
          Modbus and EnOcean, to BACnet. As more and more
          devices are utilized to meet the demands of today’s
          building management system (BMS) and smart building
          infrastructures, network security is more critical than ever
          to ensure authentication, integrity, and confidentiality of
          data transferred over the Internet.   BACnet-complaint devices that incorporate HTTPS provide encrypted webpage communication
                                            and protect the integrity of client data.
          BACnet-complaint devices that incorporate HTTPS
          (Secure HTTP) deliver encrypted communication and
          protect the integrity of client data. Resident HTTPS   Mechanisms exist to generate certificates and keys for a   The term PKI (Public Key Infrastructure) is used to define
          webservers allow commissioning, status reporting, and   device and to scale the architecture to multiple devices.  this setup. The building automation product vendors may
          troubleshooting in a secure manner using any standard                also have specific software tools to implement the PKI,
          web browser, thereby improving access control to the   Digital Certificates – Certificate Authority   but the certificates and keys for all devices at a site,
          devices.                                                             irrespective of their brand, must be generated from the
                                            Certificates  are  typically  issued  and  managed  by   same tool to ensure interoperability. The certificates on
          HTTPS (Secure HTTP) uses encryption for secure   a  trusted  third-party  company,  called  a  Certificate   devices also expire and need to be renewed.
          communication over an IP network. HTTPS traffic is   Authority (CA). Getting an SSL certificate installed for a
          encrypted using Transport Layer Security (TLS), formerly   website by a well-known CA that is trusted by all devices   Devices used on internal networks can also employ a
          Secure Sockets Layer (SSL). The protocol is still referred   and browsers, such as DigiCert, Comodo, GoDaddy,   self-signed digital certificate to make a web browser trust
          to as HTTP over SSL, commonly shown as https:// in the   Lets Encrypt, can provide access to the website   your internal devices. A self-signed certificate is a type of
          browser address bar.              seamlessly over the public Internet. The device can get   SSL/TLS credential you sign yourself rather than having it
                                            the certificate directly from the CA or send a Certificate   signed by a trusted third-party CA. If you don’t have an IT
          Digital Certificates              Signing Request (CSR) to the CA to get the corresponding   department, you can generate the self-signed certificate
                                            certificate. These trusted CAs only provide certificates   yourself. In addition, generating a self-signed certificate
          SSL/TLS relies on the use of keys and digital certificates   to websites or devices which have a public IP address.   for internal network devices eliminates the associated cost
          for  data encryption,  device  authentication,  and data   They won’t provide certificates for devices on an internal   of getting a certificate from a trusted third-party CA.
          integrity.  Keys  occur  in  pairs  (public/private)  and  are   network with private IP addresses.
          used for encryption/decryption. A public key is used for             Digital Certificates – Self-Signed
          encryption, while the private key is used for decryption.   Digital Certificates – Public Key Infrastructure
                                                                               Self-signed digital certificates are created by signing the
          Digital certificates are used for authentication and   For an internal BMS network, getting a certificate from   certificate with the owner’s private key. They are created,
          encryption, verifying ownership and authenticity to ensure   a public CA is not necessary and can be expensive   issued, and signed by the company or developer who is
          that only authorized devices communicate with each   given  the  considerable  number  of  devices  in  a   responsible for the website/software being signed. Unlike
          other. The public key is part of the certificate, while the   building. The IT department can implement their own   certificates issued by a trusted CA, no external party
          private key is secret to the device.   infrastructure to generate these keys and certificates.     verifies a self-signed certificate. Self-signed certificates



          20 20  BACnet Middle East Journal 14 11/25
   15   16   17   18   19   20   21   22   23   24   25