23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Wireless Local Area Networks 48-9<br />

performance with a varying CW size. Another relevant work is [Kon04], which uses three-dimensional<br />

Markov chains to analyze the behavior of the different ACs when both the CWs and the AIFS are varied.<br />

Among the approaches proposed in the literature to tune the CW, there are the Adaptive EDCF (AEDCF)<br />

proposed in [Nao05], the Adaptive EDCA (AEDCA) proposed in [Rom03], and the adaptive technique<br />

presented in [Vit08]. While the AEDCA and AEDCF approaches do not provide for changing the values<br />

of CWmin and CWmax, but simply choose the best one in a suitable calculated range, the work [Vit08]<br />

proposes an adaptive technique to increase the channel-access probability of the highest priority AC<br />

in a general <strong>industrial</strong> scenario, using a fuzzy controller to dynamically find the most appropriate CW<br />

range, on the basis of the observed network conditions.<br />

In [TJK06], the performance of the 802.11e channel access mechanisms HCCA, using the proposed<br />

simple scheduler, and EDCA in <strong>industrial</strong> automation <strong>systems</strong> were compared and evaluated. Even<br />

though it was found that HCCA is superior to EDCA in scenarios with a large number of stations,<br />

improving and adapting the HCCA scheduling algorithm would lead to much better results, which has<br />

also been proven in several works, [CLM07], [GMN03].<br />

48.6 Security Mechanisms<br />

Although advantageous to local area networks (LANs), WLANs in <strong>industrial</strong> environments introduce<br />

additional security challenges. Compromising of <strong>industrial</strong> WLANs can vary from costly downtimes<br />

and decreased system performance, to more serious consequences, such as <strong>industrial</strong> espionage, physical<br />

infrastructure damage, and even loss of human lives.<br />

Some of the typical WLAN security issues entail authentication, access control, encryption, jamming,<br />

interception, and hijacking. Security mechanisms include various encryption protocols, such are<br />

Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA and WPA2), Temporal Key Integrity<br />

Protocol (TKIP), Counter Model with CBC-MAC Protocol (CCMP), and WLAN Authentication and<br />

Privacy Infrastructure (WAPI).<br />

Although deprecated, WEP (based on Rivest Cipher 4 [RC4] encryption algorithm) is still in wide<br />

use. WPA and WPA2 protocols introduced improved security relative to the TKIP-based WEP approach<br />

by introducing a larger key length and a new Advanced Encryption Standard (AES) based algorithm<br />

known as the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol<br />

(CCMP). WEP2 also introduced TKIP. TKIP was designed with a goal of replacing the WEP protocol<br />

allowing legacy hardware to remain in use. TKIP introduced multiple master keys, a unique RC4 for<br />

each frame generated by a maser key, a new integrity check hashing algorithm, etc. CCMP was designed<br />

with the goal of replacing both TKIP and WEP.<br />

WLAN Authentication and Privacy Infrastructure (WAPI) is the Chinese National Standard for the<br />

Wireless LAN based on the Authentication Service Unit (ASU).<br />

Following the guidelines for a secure WLAN deployment, common security measures (e.g., signal strength<br />

limitation, MAC address filtering, SSID broadcast disabling, and using the most recent encryption protocols)<br />

are highly recommended and should not be ignored.<br />

Similarly to WLAN, the ubiquitous wireless personal area networks (WPAN) formed of Bluetooth,<br />

Zigbee, and mesh networks suffer from certain security issues. While these issues include those of<br />

encryption and authentication, they also relate to concerns relative to the “discovery mode,” “pairing,”<br />

and elements of eavesdropping and location tracking.<br />

48.7 Fast Handover<br />

Especially when it comes to widely distributed <strong>industrial</strong> <strong>systems</strong>, a WLAN has to consist of more than<br />

one AP to cover the whole area. Hence, special attention has to be paid to the handover procedure<br />

between APs, because it causes a connection disruption that might not be tolerable for specific <strong>industrial</strong><br />

real-time applications. Usually, the handover consists of four different phases: the search phase, the<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!