Skip to main content

Efficient Attacks in Industrial Wireless Sensor Networks

  • Conference paper
ICT Innovations 2014 (ICT Innovations 2014)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 311))

Included in the following conference series:

Abstract

The need for applying WSN in Industrial Control Systems (ICS) leads to the development of the first open standard for wireless communications, WirelessHART, designed for wireless real-time monitoring and control of industrial processes. Sensor networks in ICS require high availability, since the consequences of abusing these systems might result in a catastrophic event. In this paper we analyze the WirelessHART protocol and examine how secure it is in terms of external attacks. We conduct our analysis on the Medium Access Control layer. Results show that systems based on the WirelessHART protocol are easily subjected to external jamming interference, disrupting the real-time communication in the industrial control system. Our main contribution is the proposed algorithm which shows the ability of a malicious sensor node to sniff the network traffic and abuse the learned parameters to disrupt the communication in an efficient manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  2. Staff, B.S.I.: Industrial Communication Networks. Fieldbus Specifications. WirelessHART Communication Network and Communication Profile. B S I Standards (2009), http://books.google.nl/books?id=OIyGPgAACAAJ

  3. Law, Y.W., Van Hoesel, L., Doumen, J., Hartel, P., Havinga, P.: Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In: Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 76–88. ACM (2005)

    Google Scholar 

  4. Wood, A.D., Stankovic, J.A., Zhou, G.: Deejam: Defeating energy-efficient jamming in ieee 802.15.4-based wireless networks. In: SECON, pp. 60–69 (2007)

    Google Scholar 

  5. Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of denial-of-sleep attacks on wireless sensor network mac protocols. IEEE T. Vehicular Technology 58(1), 367–380 (2009)

    Article  Google Scholar 

  6. Pister, K., Doherty, L.: Tsmp: Time synchronized mesh protocol. In: IASTED Distributed Sensor Networks, pp. 391–398 (2008)

    Google Scholar 

  7. Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, ETFA 2012, Krakow, Poland, September 17-21. IEEE (2012)

    Google Scholar 

  8. The network simulator ns-2 (2014), http://www.isi.edu/nsnam/ns

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Spase Stojanovski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Stojanovski, S., Kulakov, A. (2015). Efficient Attacks in Industrial Wireless Sensor Networks. In: Bogdanova, A., Gjorgjevikj, D. (eds) ICT Innovations 2014. ICT Innovations 2014. Advances in Intelligent Systems and Computing, vol 311. Springer, Cham. https://doi.org/10.1007/978-3-319-09879-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09879-1_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09878-4

  • Online ISBN: 978-3-319-09879-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics