Security Analysis of WIA-PA Protocol

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 295)

Abstract

The WIA-PA protocol is a secure and reliable communication standard for industrial process automation. WIA-PA standard defined on the security, but the description of the key management is not in detail, and there are security limitations in the kind of key management and authorization process. In this paper, we analyze the provided security mechanisms against well-known threats in wireless medium, and propose recommendations to mitigate the shortcomings. Finally, it summarizes concluded WIA-PA network security issues and the limitations of the security mechanism. This paper provides a reference for the WIA-PA network designer in security.

Keywords

WIA-PA Security consideration Threat analysis 

Notes

Acknowledgments

This work was supported by National High-Tech Research and Development Program of China under Grant No.2011AA040101.

References

  1. 1.
    Industrial Wireless Networks WIA Specification (2001) Part I: WIA system architecture and communication specification for process automation (WIA-PA)Google Scholar
  2. 2.
    WIA-PA Wireless Industry Automation Specifications for Process Automation, IEC62601. http://www.industrialwireless.cn
  3. 3.
    Min Wei, Ping Wang, Quan Wang (2009) Research and implementation of security strategy for wireless industry control network. Chin J Sci Instrum 2009(04):679–684Google Scholar
  4. 4.
    Dworkin MJ (2004) Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality, SP 800–38CGoogle Scholar
  5. 5.
    Raza S, Slabbert A, Voigt T et al (2009) Security considerations for the wirelesshart protocol. In: IEEE conference on emerging technologies and factory Automation, ETFA, vol 2009, pp 1–8Google Scholar
  6. 6.
    Roosta T, Shieh S, Sastry S (2006) Taxonomy of security attacks in sensor networks and countermeasures. In: The first IEEE international conference on system integration and reliability improvements, vol 25, p 94Google Scholar
  7. 7.
    Welch D, Lathrop S (2003) Wireless security threat taxonomy. In: Information assurance workshop, IEEE systems, man and cybernetics society, vol 2003, pp 76–83Google Scholar
  8. 8.
    Giannetsos T, Dimitriou T, Prasad NR (2010) Weaponizing wireless networks: an attack tool for launching attacks against sensor networks. In: Black Hat technical security conferenceGoogle Scholar
  9. 9.
    Bogdanov A (2008) Multiple-differential side-channel collision attacks on AES. In: Cryptographic hardware and embedded systems CCHES 2008, Springer, Berlin, Heidelberg, pp 30–44Google Scholar
  10. 10.
    Phan RCW (2004) Impossible differential cryptanalysis of 7-round advanced encryption standard AES. Inf process lett 91(1):33–38Google Scholar
  11. 11.
    Ukil A (2010) Security and privacy in wireless sensor networks. Smart Wirel Sens Netw Intechweb Croatia 2010:395–418Google Scholar
  12. 12.
    Xu W, Liang W, Feng C (2011) Design and implementation of key technologies in WIA-PA networks. Appl Res Comput 2011(06):2265–2270Google Scholar
  13. 13.
    Nagrath P, Gupta B (2011) Wormhole attacks in wireless ad hoc networks and their counter measurements: a survey. In: IEEE 3rd international conference on electronics computer technology (ICECT), vol 6, pp 245–250Google Scholar
  14. 14.
    Butty L, Hubaux JP (2007) Security and cooperation in wireless networks, Cambridge University Press, CambridgeGoogle Scholar
  15. 15.
    Hu YC, Perrig A, Johnson DB (2003) Packet leashes: a defense against wormhole attacks in wireless networks. In; INFOCOM 2003, twenty-second annual joint conferences of the IEEE computer and communications, IEEE societies, vol 3, pp 1976–1986Google Scholar
  16. 16.
    Raymond DR, Midkiff SF (2008) Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput 7(1):74–81Google Scholar
  17. 17.
    Newsome J, Shi E, Song D et al (2004) The Sybil attack in sensor networks: analysis and defenses. In: Proceedings of the 3rd international symposium on information processing in sensor networks. ACM, pp 259–268Google Scholar
  18. 18.
    Watro R, Kong D, Cuti S et al (2004) TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, ACM, pp 59–64Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.School of Computer and Communication EngineeringUniversity of Science and Technology BeijingBeijingChina

Personalised recommendations