Abstract

Through the active development of industrial internet of things (IIoT) technology, there has been a rapid increase in the number of different industrial wireless sensor networks (IWSNs). Accordingly, the security of IWSNs is also of importance, as many security problems related to IWSN protocols have been raised and various studies have been conducted to solve these problems. However, the provisioning process is the first step in introducing a new device into the IIoT network and a starting point for IIoT security. Therefore, leakage of security information in the provisioning process makes exposure of secret keys and all subsequent security measures meaningless. In addition, using the exploited secret keys, the attacker can send false command to the node or send false data to the network manager and it can cause serious damage to industrial infrastructure depending on the IWSN. Nevertheless, a security study on the provisioning process has not been actively carried out, resulting in a provisioning process without guaranteed security. Therefore, in this paper, we analyzed security issues of the provisioning process in IWSN by researching prominent IWSN standards, including ISA 100.11a, WirelessHART, and Zigbee, and also an ISA 100.11a-certified device and provisioning process-related studies. Then, we verified the security issues of the provisioning process through testing and analyzing the provisioning process using the ISA 100.11a standard-implemented devices and ISA 100.11a-certified devices. Finally, we discuss security considerations and the direction of future research on provisioning security for IWSN in the IIoT era.

Highlights

  • In recent industrial control systems, the Internet of Things (IoT) has been introduced to manage large areas efficiently or to manage dangerous or difficult to access areas

  • This paper focuses on analyzing the provisioning process, which is very important for security in deployment of an industrial wireless sensor networks (IWSNs) and verifying the security issues through experiment

  • It is necessary to analyze the security issues according to the IWSN environment that performs the provisioning process and to research countermeasures to cope with those security issues

Read more

Summary

Introduction

In recent industrial control systems, the Internet of Things (IoT) has been introduced to manage large areas efficiently or to manage dangerous or difficult to access areas. IoT that meets the requirements of robustness, reliability, latency, and jitter required in industrial control systems is called the Industrial Internet of Things (IIoT). The Industrial Internet Consortium (IIC) is an organization in which various industrial control systems and IoT vendors participate in developing IIoT technology. Each year since its establishment in 2014, the IIC has published IIoT demonstration cases and related research. In the IIoT system, the wireless sensor network (WSN) used to connect sensor nodes to various environments is called the industrial wireless sensor network (IWSN).

Methods
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call