23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

28<br />

Industrial Wireless<br />

Communications<br />

Security (IWCS)/C42<br />

Milos Manic<br />

University of Idaho<br />

Idaho Falls<br />

Kurt Derr<br />

Idaho National Laboratory<br />

28.1 Introduction.....................................................................................28-1<br />

28.2 Wireless LAN Security...................................................................28-2<br />

Security Issues/Attacks on WiFi. •. Security Mechanisms. •. .<br />

Deployment Issues<br />

28.3 PAN Security....................................................................................28-6<br />

28.4 Summary..........................................................................................28-8<br />

References....................................................................................................28-8<br />

28.1 Introduction<br />

The use of wireless <strong>communication</strong>s in <strong>industrial</strong> environments poses a different set of challenges than<br />

deployment in home and enterprise environments. Significant amounts of electrical noise such as variable<br />

frequency drives, competing radio <strong>systems</strong>, radar and microwave sources, and welders are produced<br />

in <strong>industrial</strong> environments. Signal attenuation and reflects are always present [1].<br />

The placement of wireless access points (APs), or radio nodes, and adjustment of transmitter power<br />

to match receiver sensitivities is more crucial in <strong>industrial</strong> settings where the reliability of the overall<br />

system can affect plant safety and security as well as operational cost. Data latency, the time delay experienced<br />

when data is sent from one point to another, as well as possible data corruption can affect system<br />

performance.<br />

Security is a significant obstacle to wider deployment of wireless technology in enterprise and<br />

<strong>industrial</strong> environments. The security issues and protocols as well as deployment guidelines are presented<br />

for wireless local area networks, personal area networks, and mesh networks that may concern<br />

<strong>industrial</strong> users.<br />

The relationship between various wireless networks in terms of range versus data rate (number of bits<br />

processed per unit of time) is shown in Figure 28.1. Those are wireless personal area network (WPAN),<br />

wireless metropolitan area network (WMAN), wireless local area network (WLAN), and wireless wide<br />

area network (WWAN). WWAN typically assume protocols such as IEEE 802.22 or wireless regional area<br />

network, while WMAN include IEEE 802.20, or mobile broadband wireless access (MBWA). These wireless<br />

networks are in detail specified by IEEE standard specifications [2,3]. The most ubiquitous networks<br />

belong to WPAN technologies. These are (lowest to highest data rate) ZigBee, Bluetooth, and 802.15.3<br />

(high data rate WPAN). This chapter presents network security issues and solutions of WLAN, WPAN,<br />

and mesh networks, in the order which is representative of their market size and their longevity in the<br />

marketplace.<br />

28-1<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!