23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

28-8 Industrial Communication Systems<br />

The security issues of wireless mesh networks are similar to the security issues of other <strong>communication</strong>s<br />

networks: availability, authenticity, integrity, and confidentiality. Attackers can affect the availability<br />

of the network by employing signal jamming. A defense against signal jamming is frequency<br />

hopping and spread spectrum, which widens the jamming range and changes frequencies periodically.<br />

Authenticity refers to nodes in a WMN ensuring the identity of their peer nodes. An authentication<br />

mechanism can be implemented on the basis of public key cryptography. Integrity is ensuring that the<br />

contents of a <strong>communication</strong> between sender and receiver is preserved intact. Integrity can be achieved<br />

through cryptography and the use of digital signatures. Confidentiality is ensuring that data is protected<br />

from breaches by unauthorized persons. Confidentiality can be achieved through the authentication<br />

mechanism previously discussed as well as encrypting the <strong>communication</strong>s session.<br />

A WMN has multiple nodes and channels in an open wireless environment that are open to attack.<br />

Eavesdropping on wireless channels and injecting fake messages into the channel is a potential threat.<br />

The self-healing adaptive change of network topology may make it easier for an attacker to impersonate<br />

a legitimate node. The nodes may not reside in physically protected places. Illegitimate nodes may<br />

violate the routing protocol and forward packets to destinations inconsistent with the routing protocol.<br />

Low-rate PANs such as ZigBee are highly vulnerable to jamming attacks due to their very low transmission<br />

power [20]. A high-power-compliant transmitter could send out radio signals at the physical<br />

layer (PHY) and weaken or eliminate the availability of a low-rate PAN.<br />

Selective collision of some control and management frames by an adversary may appear like random<br />

collisions and are not easily detectable. An attacker may send frames (packets) that collide with<br />

acknowledgment of association response frames, causing an exponential back off by the sender and<br />

restart of an association procedure.<br />

WMNs have no central authority or trusted third party responsible for the distribution of keys that<br />

are used for cryptography. ZigBee does make use of keys, which can be preconfigured with devices, at<br />

different layers as well as challenge-authentication procedures.<br />

28.4 Summary<br />

Wireless in <strong>industrial</strong> environments is a difficult problem that requires multiple solutions and products<br />

while at the same time enabling new applications and services and driving down costs. Security is a<br />

paramount concern. Wireless <strong>systems</strong> provide security features such as confidentiality through AES<br />

end-to-end encryption so sensitive data is not interpreted, integrity codes to prevent tampering with<br />

information, non-repeating counters to prevent replay attacks, and channel hopping to minimize the<br />

risk of denial of service attack. Industrial environments contain machinery and metal objects that present<br />

challenges to wireless <strong>communication</strong>s. Reliability and security considerations must be taken into<br />

account before deploying applications over wireless networks.<br />

References<br />

1. Goleniewski, L., Tele<strong>communication</strong>s Essentials, Addison-Wesley, Boston, MA, 2007.<br />

2. ZigBee Alliance, http://www.zigbee.org/<br />

3. IEEE Standards, http://standards.ieee.org/getieee802/download/802.15.4-2006.pdf<br />

4. Vlasimirov, A., Gavrilenko, K., and Mikhailovsky, A., WI-FOO, The Secrets of Wireless Hacking,<br />

Addison-Wesley, Reading, MA, 2004.<br />

5. Nichols, R. and Lekkas, P., Wireless Security, McGraw-Hill, New York, 2002.<br />

6. Gast, M., 802.11 Wireless Networks, O’Reilly Media Inc., Sebastopol, CA, 2005.<br />

7. Aime, M., Calandriello, G., and Lioy, A., Dependability in wireless networks, IEEE Security &<br />

Privacy, 5(1), 23–29, January/February 2007.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!