Cargando…

Toward Security Enhanced Provisioning in Industrial IoT Systems

Through the active development of industrial internet of things (IIoT) technology, there has been a rapid increase in the number of different industrial wireless sensor networks (IWSNs). Accordingly, the security of IWSNs is also of importance, as many security problems related to IWSN protocols hav...

Descripción completa

Detalles Bibliográficos
Autores principales: Kwon, Sungmoon, Jeong, Jaehan, Shon, Taeshik
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6308984/
https://www.ncbi.nlm.nih.gov/pubmed/30544752
http://dx.doi.org/10.3390/s18124372
_version_ 1783383316590755840
author Kwon, Sungmoon
Jeong, Jaehan
Shon, Taeshik
author_facet Kwon, Sungmoon
Jeong, Jaehan
Shon, Taeshik
author_sort Kwon, Sungmoon
collection PubMed
description Through the active development of industrial internet of things (IIoT) technology, there has been a rapid increase in the number of different industrial wireless sensor networks (IWSNs). Accordingly, the security of IWSNs is also of importance, as many security problems related to IWSN protocols have been raised and various studies have been conducted to solve these problems. However, the provisioning process is the first step in introducing a new device into the IIoT network and a starting point for IIoT security. Therefore, leakage of security information in the provisioning process makes exposure of secret keys and all subsequent security measures meaningless. In addition, using the exploited secret keys, the attacker can send false command to the node or send false data to the network manager and it can cause serious damage to industrial infrastructure depending on the IWSN. Nevertheless, a security study on the provisioning process has not been actively carried out, resulting in a provisioning process without guaranteed security. Therefore, in this paper, we analyzed security issues of the provisioning process in IWSN by researching prominent IWSN standards, including ISA 100.11a, WirelessHART, and Zigbee, and also an ISA 100.11a-certified device and provisioning process-related studies. Then, we verified the security issues of the provisioning process through testing and analyzing the provisioning process using the ISA 100.11a standard-implemented devices and ISA 100.11a-certified devices. Finally, we discuss security considerations and the direction of future research on provisioning security for IWSN in the IIoT era.
format Online
Article
Text
id pubmed-6308984
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-63089842019-01-04 Toward Security Enhanced Provisioning in Industrial IoT Systems Kwon, Sungmoon Jeong, Jaehan Shon, Taeshik Sensors (Basel) Article Through the active development of industrial internet of things (IIoT) technology, there has been a rapid increase in the number of different industrial wireless sensor networks (IWSNs). Accordingly, the security of IWSNs is also of importance, as many security problems related to IWSN protocols have been raised and various studies have been conducted to solve these problems. However, the provisioning process is the first step in introducing a new device into the IIoT network and a starting point for IIoT security. Therefore, leakage of security information in the provisioning process makes exposure of secret keys and all subsequent security measures meaningless. In addition, using the exploited secret keys, the attacker can send false command to the node or send false data to the network manager and it can cause serious damage to industrial infrastructure depending on the IWSN. Nevertheless, a security study on the provisioning process has not been actively carried out, resulting in a provisioning process without guaranteed security. Therefore, in this paper, we analyzed security issues of the provisioning process in IWSN by researching prominent IWSN standards, including ISA 100.11a, WirelessHART, and Zigbee, and also an ISA 100.11a-certified device and provisioning process-related studies. Then, we verified the security issues of the provisioning process through testing and analyzing the provisioning process using the ISA 100.11a standard-implemented devices and ISA 100.11a-certified devices. Finally, we discuss security considerations and the direction of future research on provisioning security for IWSN in the IIoT era. MDPI 2018-12-10 /pmc/articles/PMC6308984/ /pubmed/30544752 http://dx.doi.org/10.3390/s18124372 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Kwon, Sungmoon
Jeong, Jaehan
Shon, Taeshik
Toward Security Enhanced Provisioning in Industrial IoT Systems
title Toward Security Enhanced Provisioning in Industrial IoT Systems
title_full Toward Security Enhanced Provisioning in Industrial IoT Systems
title_fullStr Toward Security Enhanced Provisioning in Industrial IoT Systems
title_full_unstemmed Toward Security Enhanced Provisioning in Industrial IoT Systems
title_short Toward Security Enhanced Provisioning in Industrial IoT Systems
title_sort toward security enhanced provisioning in industrial iot systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6308984/
https://www.ncbi.nlm.nih.gov/pubmed/30544752
http://dx.doi.org/10.3390/s18124372
work_keys_str_mv AT kwonsungmoon towardsecurityenhancedprovisioninginindustrialiotsystems
AT jeongjaehan towardsecurityenhancedprovisioninginindustrialiotsystems
AT shontaeshik towardsecurityenhancedprovisioninginindustrialiotsystems