23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

28-2 Industrial Communication Systems<br />

WWAN<br />

IEEE 802.22<br />

Range<br />

WMAN<br />

WLAN<br />

WPAN<br />

IEEE 802.20<br />

WiMax<br />

IEEE 802.16<br />

ZigBee<br />

802.15.4 Bluetooth<br />

802.15.1<br />

WiFi<br />

IEEE 802.11<br />

IEEE 802.15.3<br />

IEEE 802.15.3a<br />

IEEE 802.15.3c<br />

0.01 0.1 1 10<br />

Data rate (Mbps)<br />

100 1000<br />

FIGURE 28.1<br />

Wireless technologies: range versus data rates.<br />

28.2 Wireless LAN Security<br />

WLAN standards extend the functionality of a wired LAN providing location freedom (cable-free networking).<br />

WLANs are based on the IEEE 802.11 standard. The most widely used WLANs are in the<br />

<strong>industrial</strong>, scientific, and medical (ISM) radio band. Table 28.1 shows the 802.11 Protocol Family. The<br />

IEEE 802.11n standard was finalized in September 2009 and published in October 2009. Many “draft<br />

IEEE 802.11n” products were available in the marketplace prior to the adoption of this standard.<br />

28.2.1 Security Issues/Attacks on WiFi<br />

The characteristics of the wireless <strong>communication</strong>s channel leave WiFi <strong>communication</strong>s open to attack<br />

(authentication, access control, encryption, jamming, interception, and hijacking) [4–6]. These characteristics<br />

are discussed further in this section.<br />

Authentication is the process of verifying that someone/something is authentic; i.e., the claims they<br />

make are true. Security protocols are used to authenticate computers in possession of a cryptographic key<br />

and users. Mobility and ease of connectivity are advantages of wireless versus wired <strong>communication</strong>s.<br />

Access control is necessary to protect against unauthorized use of wireless <strong>communication</strong>s <strong>systems</strong>.<br />

Several approaches to controlling access to a wireless LAN include<br />

1. Use of shared keys<br />

2. Media access control (MAC) address filtering by a wireless AP<br />

3. Link-layer security protocols<br />

4. Firewalls<br />

5. Virtual private network (VPN) encryption in order to provide security<br />

TABLE 28.1<br />

IEEE 802.11 Standards<br />

Standard 802.11 802.11a 802.11b 802.11g 802.11n<br />

Year 1997 1999 1999 2003 2009<br />

Frequency 2.4.GHz 5.GHz 2.4.GHz 2.4.GHz 2.4.GHz, 5.GHz<br />

Max Data Rate 2.Mbps 54.Mbps 11.Mbps 54.Mbps 600.Mbps<br />

Modulation Type FHSS, DSSS, & IR Orthogonal FDM DSSS Orthogonal FDM Orthogonal FDM<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!