Cargando…
Toward Security Enhanced Provisioning in Industrial IoT Systems
Through the active development of industrial internet of things (IIoT) technology, there has been a rapid increase in the number of different industrial wireless sensor networks (IWSNs). Accordingly, the security of IWSNs is also of importance, as many security problems related to IWSN protocols hav...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6308984/ https://www.ncbi.nlm.nih.gov/pubmed/30544752 http://dx.doi.org/10.3390/s18124372 |
_version_ | 1783383316590755840 |
---|---|
author | Kwon, Sungmoon Jeong, Jaehan Shon, Taeshik |
author_facet | Kwon, Sungmoon Jeong, Jaehan Shon, Taeshik |
author_sort | Kwon, Sungmoon |
collection | PubMed |
description | Through the active development of industrial internet of things (IIoT) technology, there has been a rapid increase in the number of different industrial wireless sensor networks (IWSNs). Accordingly, the security of IWSNs is also of importance, as many security problems related to IWSN protocols have been raised and various studies have been conducted to solve these problems. However, the provisioning process is the first step in introducing a new device into the IIoT network and a starting point for IIoT security. Therefore, leakage of security information in the provisioning process makes exposure of secret keys and all subsequent security measures meaningless. In addition, using the exploited secret keys, the attacker can send false command to the node or send false data to the network manager and it can cause serious damage to industrial infrastructure depending on the IWSN. Nevertheless, a security study on the provisioning process has not been actively carried out, resulting in a provisioning process without guaranteed security. Therefore, in this paper, we analyzed security issues of the provisioning process in IWSN by researching prominent IWSN standards, including ISA 100.11a, WirelessHART, and Zigbee, and also an ISA 100.11a-certified device and provisioning process-related studies. Then, we verified the security issues of the provisioning process through testing and analyzing the provisioning process using the ISA 100.11a standard-implemented devices and ISA 100.11a-certified devices. Finally, we discuss security considerations and the direction of future research on provisioning security for IWSN in the IIoT era. |
format | Online Article Text |
id | pubmed-6308984 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-63089842019-01-04 Toward Security Enhanced Provisioning in Industrial IoT Systems Kwon, Sungmoon Jeong, Jaehan Shon, Taeshik Sensors (Basel) Article Through the active development of industrial internet of things (IIoT) technology, there has been a rapid increase in the number of different industrial wireless sensor networks (IWSNs). Accordingly, the security of IWSNs is also of importance, as many security problems related to IWSN protocols have been raised and various studies have been conducted to solve these problems. However, the provisioning process is the first step in introducing a new device into the IIoT network and a starting point for IIoT security. Therefore, leakage of security information in the provisioning process makes exposure of secret keys and all subsequent security measures meaningless. In addition, using the exploited secret keys, the attacker can send false command to the node or send false data to the network manager and it can cause serious damage to industrial infrastructure depending on the IWSN. Nevertheless, a security study on the provisioning process has not been actively carried out, resulting in a provisioning process without guaranteed security. Therefore, in this paper, we analyzed security issues of the provisioning process in IWSN by researching prominent IWSN standards, including ISA 100.11a, WirelessHART, and Zigbee, and also an ISA 100.11a-certified device and provisioning process-related studies. Then, we verified the security issues of the provisioning process through testing and analyzing the provisioning process using the ISA 100.11a standard-implemented devices and ISA 100.11a-certified devices. Finally, we discuss security considerations and the direction of future research on provisioning security for IWSN in the IIoT era. MDPI 2018-12-10 /pmc/articles/PMC6308984/ /pubmed/30544752 http://dx.doi.org/10.3390/s18124372 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Kwon, Sungmoon Jeong, Jaehan Shon, Taeshik Toward Security Enhanced Provisioning in Industrial IoT Systems |
title | Toward Security Enhanced Provisioning in Industrial IoT Systems |
title_full | Toward Security Enhanced Provisioning in Industrial IoT Systems |
title_fullStr | Toward Security Enhanced Provisioning in Industrial IoT Systems |
title_full_unstemmed | Toward Security Enhanced Provisioning in Industrial IoT Systems |
title_short | Toward Security Enhanced Provisioning in Industrial IoT Systems |
title_sort | toward security enhanced provisioning in industrial iot systems |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6308984/ https://www.ncbi.nlm.nih.gov/pubmed/30544752 http://dx.doi.org/10.3390/s18124372 |
work_keys_str_mv | AT kwonsungmoon towardsecurityenhancedprovisioninginindustrialiotsystems AT jeongjaehan towardsecurityenhancedprovisioninginindustrialiotsystems AT shontaeshik towardsecurityenhancedprovisioninginindustrialiotsystems |