Managing Information Security Risks: The Octave Approach
Managing Information Security Risks: The Octave Approach
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
Information Processing Letters - Devoted to the rapid publication of short contributions to information processing
Information Security Management Handbook, Volume 1
Information Security Management Handbook, Volume 1
Data and Computer Communications (8th Edition)
Data and Computer Communications (8th Edition)
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control
RTAS '08 Proceedings of the 2008 IEEE Real-Time and Embedded Technology and Applications Symposium
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
ACM Transactions on Sensor Networks (TOSN)
Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing
Efficient implementation of public key cryptosystems on mote sensors (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
SP 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
The GINSENG system for wireless monitoring and control: Design and deployment experiences
ACM Transactions on Sensor Networks (TOSN)
Hi-index | 0.00 |
WirelessHART is a secure and reliable communication standard for industrial process automation. The WirelessHART specifications are well organized in all aspects except security: there are no separate specifications of security requirements or features. Rather, security mechanisms are described throughout the documentation. This hinders implementation of the standard and development of applications since it requires profound knowledge of all the core specifications on the part of the developer. In this paper we provide a comprehensive overview of WirelessHART security: we analyze the provided security mechanisms against well known threats in the wireless medium, and propose recommendations to mitigate shortcomings. Furthermore, we elucidate the specifications of the Security Manager, its placement in the network, and interaction with the Network Manager.