Negotiation-based protocols for disseminating information in wireless sensor networks
Wireless Networks - Selected Papers from Mobicom'99
JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
Visualization of wormholes in sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Analyzing Cross-Sector Interdependencies
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Key management and secure software updates in wireless process control environments
WiSec '08 Proceedings of the first ACM conference on Wireless network security
WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control
RTAS '08 Proceedings of the 2008 IEEE Real-Time and Embedded Technology and Applications Symposium
Energy conservation in wireless sensor networks: A survey
Ad Hoc Networks
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks
Foundations of Security Analysis and Design V
Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
Computer Networks: The International Journal of Computer and Telecommunications Networking
Side channel attacks on message authentication codes
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Situation awareness mechanisms for wireless sensor networks
IEEE Communications Magazine
Jamming sensor networks: attack and defense strategies
IEEE Network: The Magazine of Global Internetworking
Key management systems for sensor networks in the context of the Internet of Things
Computers and Electrical Engineering
International Journal of Information and Communication Technology
Early warning system for cascading effect control in energy control systems
CRITIS'10 Proceedings of the 5th international conference on Critical Information Infrastructures Security
Survey A survey of routing protocols for smart grid communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Addressing situational awareness in critical domains of a smart grid
NSS'12 Proceedings of the 6th international conference on Network and System Security
Diagnosis mechanism for accurate monitoring in critical infrastructure protection
Computer Standards & Interfaces
Hi-index | 0.00 |
Nowadays, critical control systems are a fundamental component contributing to the overall performance of critical infrastructures in our society, most of which belong to the industrial sector. These complex systems include in their design different types of information and communication technology systems, such as wireless (mesh) sensor networks, to carry out control processes in real time. This fact has meant that several communication standards, such as Zigbee PRO, WirelessHART, and ISA100.11a, have been specified to ensure coexistence, reliability, and security in their communications. The main purpose of this paper has been to review these three standards and analyze their security. We have identified a set of threats and potential attacks in their routing protocols, and we consequently provide recommendations and countermeasures to help Industry protect its infrastructures.