2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) 2018
DOI: 10.1109/nca.2018.8548060
|View full text |Cite
|
Sign up to set email alerts
|

Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…It is essential that management systems support a variety of communication technologies. For example, Bluetooth [16], Wifi [17], [18], LTE [19], LoRaWAN [20], Sigfox [21], NB-IoT [22], and Zigbee [23] are commonly used in IoT industrial environments. Additionally, the current trend is to integrate IoT with 5G systems [24].…”
Section: A Iiot Management Backgroundmentioning
confidence: 99%
See 2 more Smart Citations
“…It is essential that management systems support a variety of communication technologies. For example, Bluetooth [16], Wifi [17], [18], LTE [19], LoRaWAN [20], Sigfox [21], NB-IoT [22], and Zigbee [23] are commonly used in IoT industrial environments. Additionally, the current trend is to integrate IoT with 5G systems [24].…”
Section: A Iiot Management Backgroundmentioning
confidence: 99%
“…The first study aims at detecting operation anomalies originated in firmware and hardware through parameters like high temperature, buffer overflow attacks, SPI faults, and undervoltage [32]. The second study explores vulnerabilities in WirelessHART, and uses the One-Class Support Vector Machines machine learning approach to detect attacks like jamming and collision [23]. Although these studies use a sound approach based on WSN and Industrial monitoring, there is still need to address new features and technologies in the vast spectrum of the requirements of industrial management based on IIoT.…”
Section: B Iiot Management Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The security of the WirelessHART protocol strongly depends on the secrecy of these keys, especially the pre-configured join key, which is used for communication initialization. Furthermore, white listing is used to allow join keys, whereas the entire communication is managed by a ''Network Manager'' [76]. Also WirelessHART adjusted its security means to the required payload length.…”
Section: Wirelesshartmentioning
confidence: 99%