
However, several more or less realistic techniques are used to have access to the
data exchanged over a PLC network; in particular, these techniques consist of:
•
Using a PLC device with the suitable NEK key for the targeted network.
•
Recovering the physical data via the electromagnetic radiations emitted by the
PLC network in the environment close to the electrical wiring. However, this
requires a complex and costly acquisition chain.
•
Constructing a specific PLC device capable of recovering the encrypted physi-
cal frames in order to attempt to decrypt them.
Figure 4.11 illustrates the internal design of a PLC device with its two interfaces:
on the one hand, the Ethernet interface connected to an Ethernet network where
uncoded frames circulate; and on the other hand, the PLC interface connected to the
electrical network where encrypted frames circulate.
A PLC device consists of an electrical interface that sends and receives the
frames over the electrical network, and of an Ethernet interface (RJ-45 connector),
which sends and receives frames over the Ethernet network. Between these two
interfaces, the data only flows if the device has the right NEK from the PLC
network.
If a PLC device does not have the network NEK, the Ethernet frames are not
available on the Ethernet interface. Therefore, the encrypted PLC frames cannot be
accessed easily.
74 Security
Figure 4.11 Internal design of a PLC device used to encrypt exchanged frames
Comentarios a estos manuales