25.12.2013 Views

Wireless Technologies in Process Automation - Herkules.oulu.fi - Oulu

Wireless Technologies in Process Automation - Herkules.oulu.fi - Oulu

Wireless Technologies in Process Automation - Herkules.oulu.fi - Oulu

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

22<br />

outsider attacks are blocked and <strong>in</strong> case of <strong>in</strong>sider attack, the security gracefully degrades<br />

(is resilient). Different types of attacks are presented <strong>in</strong> Figure 10.<br />

Figure 10. Different types of attacks <strong>in</strong> WSN: a) <strong>in</strong>terruption b) modi<strong>fi</strong>cation c)<br />

fabrication d) <strong>in</strong>terruption (Hamala<strong>in</strong>en et al., 2006).<br />

WSN have special characteristics that enable new ways of security attacks (Hamala<strong>in</strong>en<br />

et al., 2006). Passive attacks are carried out by eavesdropp<strong>in</strong>g on transmissions and may<br />

<strong>in</strong>clude for example traf<strong>fi</strong>c analysis or disclosure of message contents (Stall<strong>in</strong>gs, 2005).<br />

Active attacks consist of modi<strong>fi</strong>cation, fabrication and <strong>in</strong>terruption, which <strong>in</strong> WSN cases<br />

may <strong>in</strong>clude node captur<strong>in</strong>g, rout<strong>in</strong>g attacks, or flood<strong>in</strong>g (Hamala<strong>in</strong>en et al., 2006). It<br />

should also be noted, that even though WSN themselves are resource-limited, an attacker<br />

may have more powerful equipment available, such as laptop or PC, for mak<strong>in</strong>g attack<strong>in</strong>g<br />

more effective (Karlof and Wagner, 2003).<br />

When design<strong>in</strong>g the security of the wireless sensor network, both low-level (key<br />

establishment and trust control, secrecy and authentication, privacy, robustness to<br />

communication denial of service, secure rout<strong>in</strong>g, resilience to node capture) and highlevel<br />

(secure group management, <strong>in</strong>trusion detection, secure data aggregation) security<br />

primitives should be addressed. It should also be noted, that due to resource limitations<br />

some of the previously proposed solutions may not work due to resource limitations.<br />

(Perrig et al., 2004)<br />

As discussed <strong>in</strong> Section 3.3.1, WSN <strong>in</strong> <strong>in</strong>dustrial environments may be hybrid solutions.<br />

This, <strong>in</strong> turn, may provide another challenge. (Roman et al., 2005) separates the security<br />

of the wireless sensor network to two different categories. First, there is the security of<br />

the data acquisition network, which is a collection of sensor nodes with the task of<br />

measur<strong>in</strong>g the physical data of its surround<strong>in</strong>gs, and one or more base stations <strong>in</strong> charge<br />

of collect<strong>in</strong>g data from the nodes and forward<strong>in</strong>g control <strong>in</strong>formation from the users.<br />

Second, there is the security of the data dissem<strong>in</strong>ation network which is a comb<strong>in</strong>ation of<br />

wired and wireless networks provid<strong>in</strong>g an <strong>in</strong>terface of the data acquisition network to any<br />

user.<br />

A short review about some security technologies employed <strong>in</strong> wireless communications<br />

can be found <strong>in</strong> (VAN, 2005). A good review about ZigBee security issues (and others) is<br />

presented <strong>in</strong> (Baronti et al., 2007).<br />

Throughput<br />

Throughput def<strong>in</strong>es the network’s ability to carry out the offered traf<strong>fi</strong>c by <strong>in</strong>dustrial<br />

applications. It is impacted by the communication environment (Howitt et al., 2006).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!