Abstract
The WIA-PA protocol is a secure and reliable communication standard for industrial process automation. WIA-PA standard defined on the security, but the description of the key management is not in detail, and there are security limitations in the kind of key management and authorization process. In this paper, we analyze the provided security mechanisms against well-known threats in wireless medium, and propose recommendations to mitigate the shortcomings. Finally, it summarizes concluded WIA-PA network security issues and the limitations of the security mechanism. This paper provides a reference for the WIA-PA network designer in security.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Industrial Wireless Networks WIA Specification (2001) Part I: WIA system architecture and communication specification for process automation (WIA-PA)
WIA-PA Wireless Industry Automation Specifications for Process Automation, IEC62601. http://www.industrialwireless.cn
Min Wei, Ping Wang, Quan Wang (2009) Research and implementation of security strategy for wireless industry control network. Chin J Sci Instrum 2009(04):679–684
Dworkin MJ (2004) Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality, SP 800–38C
Raza S, Slabbert A, Voigt T et al (2009) Security considerations for the wirelesshart protocol. In: IEEE conference on emerging technologies and factory Automation, ETFA, vol 2009, pp 1–8
Roosta T, Shieh S, Sastry S (2006) Taxonomy of security attacks in sensor networks and countermeasures. In: The first IEEE international conference on system integration and reliability improvements, vol 25, p 94
Welch D, Lathrop S (2003) Wireless security threat taxonomy. In: Information assurance workshop, IEEE systems, man and cybernetics society, vol 2003, pp 76–83
Giannetsos T, Dimitriou T, Prasad NR (2010) Weaponizing wireless networks: an attack tool for launching attacks against sensor networks. In: Black Hat technical security conference
Bogdanov A (2008) Multiple-differential side-channel collision attacks on AES. In: Cryptographic hardware and embedded systems CCHES 2008, Springer, Berlin, Heidelberg, pp 30–44
Phan RCW (2004) Impossible differential cryptanalysis of 7-round advanced encryption standard AES. Inf process lett 91(1):33–38
Ukil A (2010) Security and privacy in wireless sensor networks. Smart Wirel Sens Netw Intechweb Croatia 2010:395–418
Xu W, Liang W, Feng C (2011) Design and implementation of key technologies in WIA-PA networks. Appl Res Comput 2011(06):2265–2270
Nagrath P, Gupta B (2011) Wormhole attacks in wireless ad hoc networks and their counter measurements: a survey. In: IEEE 3rd international conference on electronics computer technology (ICECT), vol 6, pp 245–250
Butty L, Hubaux JP (2007) Security and cooperation in wireless networks, Cambridge University Press, Cambridge
Hu YC, Perrig A, Johnson DB (2003) Packet leashes: a defense against wormhole attacks in wireless networks. In; INFOCOM 2003, twenty-second annual joint conferences of the IEEE computer and communications, IEEE societies, vol 3, pp 1976–1986
Raymond DR, Midkiff SF (2008) Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput 7(1):74–81
Newsome J, Shi E, Song D et al (2004) The Sybil attack in sensor networks: analysis and defenses. In: Proceedings of the 3rd international symposium on information processing in sensor networks. ACM, pp 259–268
Watro R, Kong D, Cuti S et al (2004) TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, ACM, pp 59–64
Acknowledgments
This work was supported by National High-Tech Research and Development Program of China under Grant No.2011AA040101.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Qi, Y., Li, W., Luo, X., Wang, Q. (2014). Security Analysis of WIA-PA Protocol. In: Wang, X., Cui, L., Guo, Z. (eds) Advanced Technologies in Ad Hoc and Sensor Networks. Lecture Notes in Electrical Engineering, vol 295. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54174-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-54174-2_26
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54173-5
Online ISBN: 978-3-642-54174-2
eBook Packages: EngineeringEngineering (R0)