Abstract
The need for applying WSN in Industrial Control Systems (ICS) leads to the development of the first open standard for wireless communications, WirelessHART, designed for wireless real-time monitoring and control of industrial processes. Sensor networks in ICS require high availability, since the consequences of abusing these systems might result in a catastrophic event. In this paper we analyze the WirelessHART protocol and examine how secure it is in terms of external attacks. We conduct our analysis on the Medium Access Control layer. Results show that systems based on the WirelessHART protocol are easily subjected to external jamming interference, disrupting the real-time communication in the industrial control system. Our main contribution is the proposed algorithm which shows the ability of a malicious sensor node to sniff the network traffic and abuse the learned parameters to disrupt the communication in an efficient manner.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)
Staff, B.S.I.: Industrial Communication Networks. Fieldbus Specifications. WirelessHART Communication Network and Communication Profile. B S I Standards (2009), http://books.google.nl/books?id=OIyGPgAACAAJ
Law, Y.W., Van Hoesel, L., Doumen, J., Hartel, P., Havinga, P.: Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In: Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 76–88. ACM (2005)
Wood, A.D., Stankovic, J.A., Zhou, G.: Deejam: Defeating energy-efficient jamming in ieee 802.15.4-based wireless networks. In: SECON, pp. 60–69 (2007)
Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of denial-of-sleep attacks on wireless sensor network mac protocols. IEEE T. Vehicular Technology 58(1), 367–380 (2009)
Pister, K., Doherty, L.: Tsmp: Time synchronized mesh protocol. In: IASTED Distributed Sensor Networks, pp. 391–398 (2008)
Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation, ETFA 2012, Krakow, Poland, September 17-21. IEEE (2012)
The network simulator ns-2 (2014), http://www.isi.edu/nsnam/ns
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Stojanovski, S., Kulakov, A. (2015). Efficient Attacks in Industrial Wireless Sensor Networks. In: Bogdanova, A., Gjorgjevikj, D. (eds) ICT Innovations 2014. ICT Innovations 2014. Advances in Intelligent Systems and Computing, vol 311. Springer, Cham. https://doi.org/10.1007/978-3-319-09879-1_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-09879-1_29
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09878-4
Online ISBN: 978-3-319-09879-1
eBook Packages: EngineeringEngineering (R0)