Open Access Open Access  Restricted Access Subscription or Fee Access

Threats and Attacks on WirelessHART Network in Industrial Control Systems

Mukund P. Bhole, Vinod K. Pachghare, Sudhakar Barde


The communication between two devices can be secure and maintain the integrity of the data in which the network protocol plays an important role in the same. Due to the different requirement in the industrial needs make difficult to maintain one standard which lead to the attacks like packet injection and denial-of-service. This paper describes the WirelessHART Protocol (Wireless Highway Addressable Remote Transducer Protocol) based vulnerabilities in order to perform the penetration testing on the Industrial control system network. The attacks can be carried out by listening to the network traffic and learn the different information consist in the stream packet flow. The mentioned vulnerabilities allow attacker to shut down an entire plant network and disrupt whole processes



Industrial control system,wirelessHART,IEEE 802.15.4 standard,vulnerabilities,wireless communication

Full Text:



”HART Communication Foundation (HCF)”, 9390 Re-search Blvd.,Suit I-350 Austin TX 78759 USA.

”Security considerations for the WirelessHART protocol”,Shahid Raza; Adriaan Slabbert; Thiemo Voigt; Krister Landerna¨s, IEEE,Palma de Mallorca, Spain.

Han, S., Zhu, X., Mok, A.K., Chen, D., Nixon, M.: ”Reliable and real- time communication in industrial wireless mesh networks.” In: 17th IEEE RTAS, USA, IEEE Computer Society (2011) 3–12

Bayou, L., Espes, D., Cuppens-Boulahia, N., Cuppens, F.: ”Security issue of wirelesshart based SCADA systems”. In Lambrinoudakis, C., Gabillon, A., eds.: Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers. Volume 9572 of Lecture Notes in Computer Science., Springer (2015) 225–241

Wireless Command Specification, HCF SPEC-155, Revision 1.1. HART Communication Foundation, May 2008.

Mattijs van Ommeren,Erwin Patternote. ”It WISN’t Me

- Attacking Industrial Wireless Mesh Networks”, 2008

Song Han,Jianping Song,Xiuming Zhu,Aloysius K. Mok,Deji Chen,Mark Nixon,Wally Pratt,Veena Gondhalekar, ”Wi-HTest: Compliance Test Suite for Diagnosing Devices in Real-Time WirelessHART Network”,IEEE,April 2009

Anna N. Kim,Fredrik Hekland,Stig Petersen,Paula Doyle,”When HART Goes Wireless: Understanding and Implementing the WirelessHART Standard”,2008 IEEE International Conference on Emerging Technolo- gies and Factory Automation

Max Duijsens,”WirelessHART A security analysis”,Department of Mathematics and Computer Science of Eindhoven University of Tech- nology

Duarte Raposo, Andre´ Rodrigues† , Soraya Sinche , Jorge Sa´ Silva , Fernando Boavida ,”Security and Fault Detection in In-node components of IIoT Constrained Devices”, 2019 IEEE 44th Conference on Local Computer Networks (LCN)

Pramod T.C,N.R. Sunitha,”KMI for SCADA and WirelessHART in IACS”,2015 IEEE 20th Conference on Emerging Technologies & Fac- tory Automation (ETFA),8-11 Sept. 2015

Cristina Alcaraz,Javier Lopez,”A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems”,IEEE Transactions on Sys- tems Man and Cybernetics Part C (Applications and Reviews) 40(4):419

- 428

Lyes Bayou, David Espes, Nora Cuppens, Fre´de´ric Cuppens,”Security Analysis of WirelessHART Communication Scheme”,International Sym- posium on Foundations and Practice of Security FPS 2016: Foundations and Practice of Security pp 223-238

Stig Petersen; Simon Carlsen,”Performance evaluation of WirelessHART for factory automation”,2009 IEEE Conference on Emerging Technolo- gies & Factory Automation

Isidro Calvo, Ismael Etxeberria-Agiriano, Miguel A In˜igo, Pablo Gonza´lez-Nalda,”Key Vulnerabilities of Industrial Automation and Con- trol Systems and Actions to Prevent Cyber-Attacks”,International Jour- nal of Online and Biomedical Engineering (iJOE) – eISSN: 2626-8493

National Cybersecurity and Communications Integration Center (NC- CIC) and the Industrial Control Systems Cyber Emergency Response Team’s (ICS-CERT) Assessment program,”ICS-CERT Annual Assess- ment Report Industrial Control Systems Cyber Emergency Response Team FY 2016”


  • There are currently no refbacks.

Copyright (c) 2021 Journal of Telecommunication, Switching Systems and Networks