Threats and Attacks on WirelessHART Network in Industrial Control Systems
Abstract
Keywords
Full Text:
PDFReferences
”HART Communication Foundation (HCF)”, 9390 Re-search Blvd.,Suit I-350 Austin TX 78759 USA. http://www.hartcomm2.org/index.html.
”Security considerations for the WirelessHART protocol”,Shahid Raza; Adriaan Slabbert; Thiemo Voigt; Krister Landerna¨s, IEEE,Palma de Mallorca, Spain.
Han, S., Zhu, X., Mok, A.K., Chen, D., Nixon, M.: ”Reliable and real- time communication in industrial wireless mesh networks.” In: 17th IEEE RTAS, USA, IEEE Computer Society (2011) 3–12
Bayou, L., Espes, D., Cuppens-Boulahia, N., Cuppens, F.: ”Security issue of wirelesshart based SCADA systems”. In Lambrinoudakis, C., Gabillon, A., eds.: Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers. Volume 9572 of Lecture Notes in Computer Science., Springer (2015) 225–241
Wireless Command Specification, HCF SPEC-155, Revision 1.1. HART Communication Foundation, May 2008.
Mattijs van Ommeren,Erwin Patternote. ”It WISN’t Me
- Attacking Industrial Wireless Mesh Networks”, 2008 https://conference.hitb.org/hitbsecconf2018dxb/materials/
Song Han,Jianping Song,Xiuming Zhu,Aloysius K. Mok,Deji Chen,Mark Nixon,Wally Pratt,Veena Gondhalekar, ”Wi-HTest: Compliance Test Suite for Diagnosing Devices in Real-Time WirelessHART Network”,IEEE,April 2009
Anna N. Kim,Fredrik Hekland,Stig Petersen,Paula Doyle,”When HART Goes Wireless: Understanding and Implementing the WirelessHART Standard”,2008 IEEE International Conference on Emerging Technolo- gies and Factory Automation
Max Duijsens,”WirelessHART A security analysis”,Department of Mathematics and Computer Science of Eindhoven University of Tech- nology
Duarte Raposo, Andre´ Rodrigues† , Soraya Sinche , Jorge Sa´ Silva , Fernando Boavida ,”Security and Fault Detection in In-node components of IIoT Constrained Devices”, 2019 IEEE 44th Conference on Local Computer Networks (LCN)
Pramod T.C,N.R. Sunitha,”KMI for SCADA and WirelessHART in IACS”,2015 IEEE 20th Conference on Emerging Technologies & Fac- tory Automation (ETFA),8-11 Sept. 2015
Cristina Alcaraz,Javier Lopez,”A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems”,IEEE Transactions on Sys- tems Man and Cybernetics Part C (Applications and Reviews) 40(4):419
- 428
Lyes Bayou, David Espes, Nora Cuppens, Fre´de´ric Cuppens,”Security Analysis of WirelessHART Communication Scheme”,International Sym- posium on Foundations and Practice of Security FPS 2016: Foundations and Practice of Security pp 223-238
Stig Petersen; Simon Carlsen,”Performance evaluation of WirelessHART for factory automation”,2009 IEEE Conference on Emerging Technolo- gies & Factory Automation
Isidro Calvo, Ismael Etxeberria-Agiriano, Miguel A In˜igo, Pablo Gonza´lez-Nalda,”Key Vulnerabilities of Industrial Automation and Con- trol Systems and Actions to Prevent Cyber-Attacks”,International Jour- nal of Online and Biomedical Engineering (iJOE) – eISSN: 2626-8493
National Cybersecurity and Communications Integration Center (NC- CIC) and the Industrial Control Systems Cyber Emergency Response Team’s (ICS-CERT) Assessment program,”ICS-CERT Annual Assess- ment Report Industrial Control Systems Cyber Emergency Response Team FY 2016”
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 Journal of Telecommunication, Switching Systems and Networks