23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

28-6 Industrial Communication Systems<br />

is the link layer security protocol based on AES that provides support for encryption and data integrity.<br />

WLAN Authentication and Privacy Infrastructure (WAPI) is a Chinese standard for wireless LAN.<br />

28.2.3 Deployment Issues<br />

Some issues/guidelines for deploying WLANs include<br />

1. To minimize the chance of wireless eavesdropping, avoid having the WLAN signal extend beyond<br />

the boundaries of the desired range of the network. The signal strength can be minimized by<br />

turning down the power on the AP and using only the minimum antenna gain necessary. Use<br />

sectored or panel antennas instead of omnidirectional antennas. Use metal blinds or tinting on<br />

exterior windows. Exterior metal walls are preferable to exterior wooden walls. Place APs in the<br />

most interior of the building space.<br />

2. Use MAC address filtering. MAC address filtering will prevent unauthorized and registered users<br />

from accessing and associating with a wireless AP. An access control list (ACL) of allowed MAC<br />

addresses stored either internally or externally, RADIUS, can be used to limit access to the network.<br />

3. Configure the AP to disable broadcast of the wireless AP’s service set identifier (SSID) which is used<br />

to identify a LAN that a user may associate with. This limits the exposure of the network to attackers.<br />

4. WPA2 is preferable to WPA which is preferable to WEP.<br />

28.3 PAN Security<br />

A personal area network (PAN) represents a limited number of computer and <strong>communication</strong>s devices<br />

that have the ability to form networks and exchange information. WPANs allow computing devices<br />

within close range of one another to communicate whether they are stationary or in motion. WPANs<br />

may use different technologies to communicate, such as Bluetooth, Infrared Data Association (IrDA),<br />

ultra-wideband (UWB), and ZigBee [12,13]. The IEEE 802.15 working group has defined several classes<br />

of WPANs: 802.15.1 (Bluetooth), 802.15.3 (high data rate WPAN), and 802.15.4 (low-rate WPAN).<br />

When it comes to security aspects of PAN, the entities of interest are Bluetooth Special Interest Group<br />

(SIG), the ZigBee Alliance, and the IEEE 802.15.4 working group (wireless sensor networks).<br />

PANs have a wide application scope and may be used in building automation such as access control;<br />

smoke detection; heating, ventilation, and air conditioning (HVAC); and lighting. Other applications<br />

include <strong>industrial</strong> monitoring, automatic meter reading, medical sensing, and environmental data collection<br />

[14,15]. Security is an important issue in these control and data acquisition applications. These technologies<br />

(ZigBee and IEEE 802.15.4) can be linked together into networks of virtually unlimited distance.<br />

PAN security concerns will be addressed with regards to the following aspects: eavesdropping,<br />

authentication, location tracking, configuration, jamming, collision, and others.<br />

Eavesdropping—wireless <strong>communication</strong>s in general is subject to eavesdropping and potentially<br />

destroying the confidentiality of the data. If encryption is not enabled, then an attacker may attempt to<br />

substitute misleading data for the authentic data.<br />

Authentication and encryption, when enabled, occur at the low levels of the <strong>communication</strong>s stack.<br />

This makes impersonation of a sending or receiving PAN unit difficult [16,17].<br />

Location tracking—all PAN devices have unique addresses. Many devices are mobile and the radio<br />

signal is tractable. If the device can be identified with a specific user, the movements of the user can be<br />

tracked [18,19].<br />

No matter how good a design specification is, implementation flaws can cause security holes. The<br />

PAN qualification process cannot test every possible permutation of PAN protocol exchanges. Some<br />

implementations of the first PAN specifications contained vulnerabilities that granted access to some<br />

service on the local device. Additionally, the protocols specified for PAN profiles leave room for manufacturer-specific<br />

data.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!