Skip to main content

Security Analysis of WIA-PA Protocol

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 295))

Abstract

The WIA-PA protocol is a secure and reliable communication standard for industrial process automation. WIA-PA standard defined on the security, but the description of the key management is not in detail, and there are security limitations in the kind of key management and authorization process. In this paper, we analyze the provided security mechanisms against well-known threats in wireless medium, and propose recommendations to mitigate the shortcomings. Finally, it summarizes concluded WIA-PA network security issues and the limitations of the security mechanism. This paper provides a reference for the WIA-PA network designer in security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Industrial Wireless Networks WIA Specification (2001) Part I: WIA system architecture and communication specification for process automation (WIA-PA)

    Google Scholar 

  2. WIA-PA Wireless Industry Automation Specifications for Process Automation, IEC62601. http://www.industrialwireless.cn

  3. Min Wei, Ping Wang, Quan Wang (2009) Research and implementation of security strategy for wireless industry control network. Chin J Sci Instrum 2009(04):679–684

    Google Scholar 

  4. Dworkin MJ (2004) Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality, SP 800–38C

    Google Scholar 

  5. Raza S, Slabbert A, Voigt T et al (2009) Security considerations for the wirelesshart protocol. In: IEEE conference on emerging technologies and factory Automation, ETFA, vol 2009, pp 1–8

    Google Scholar 

  6. Roosta T, Shieh S, Sastry S (2006) Taxonomy of security attacks in sensor networks and countermeasures. In: The first IEEE international conference on system integration and reliability improvements, vol 25, p 94

    Google Scholar 

  7. Welch D, Lathrop S (2003) Wireless security threat taxonomy. In: Information assurance workshop, IEEE systems, man and cybernetics society, vol 2003, pp 76–83

    Google Scholar 

  8. Giannetsos T, Dimitriou T, Prasad NR (2010) Weaponizing wireless networks: an attack tool for launching attacks against sensor networks. In: Black Hat technical security conference

    Google Scholar 

  9. Bogdanov A (2008) Multiple-differential side-channel collision attacks on AES. In: Cryptographic hardware and embedded systems CCHES 2008, Springer, Berlin, Heidelberg, pp 30–44

    Google Scholar 

  10. Phan RCW (2004) Impossible differential cryptanalysis of 7-round advanced encryption standard AES. Inf process lett 91(1):33–38

    Google Scholar 

  11. Ukil A (2010) Security and privacy in wireless sensor networks. Smart Wirel Sens Netw Intechweb Croatia 2010:395–418

    Google Scholar 

  12. Xu W, Liang W, Feng C (2011) Design and implementation of key technologies in WIA-PA networks. Appl Res Comput 2011(06):2265–2270

    Google Scholar 

  13. Nagrath P, Gupta B (2011) Wormhole attacks in wireless ad hoc networks and their counter measurements: a survey. In: IEEE 3rd international conference on electronics computer technology (ICECT), vol 6, pp 245–250

    Google Scholar 

  14. Butty L, Hubaux JP (2007) Security and cooperation in wireless networks, Cambridge University Press, Cambridge

    Google Scholar 

  15. Hu YC, Perrig A, Johnson DB (2003) Packet leashes: a defense against wormhole attacks in wireless networks. In; INFOCOM 2003, twenty-second annual joint conferences of the IEEE computer and communications, IEEE societies, vol 3, pp 1976–1986

    Google Scholar 

  16. Raymond DR, Midkiff SF (2008) Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput 7(1):74–81

    Google Scholar 

  17. Newsome J, Shi E, Song D et al (2004) The Sybil attack in sensor networks: analysis and defenses. In: Proceedings of the 3rd international symposium on information processing in sensor networks. ACM, pp 259–268

    Google Scholar 

  18. Watro R, Kong D, Cuti S et al (2004) TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, ACM, pp 59–64

    Google Scholar 

Download references

Acknowledgments

This work was supported by National High-Tech Research and Development Program of China under Grant No.2011AA040101.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yue Qi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qi, Y., Li, W., Luo, X., Wang, Q. (2014). Security Analysis of WIA-PA Protocol. In: Wang, X., Cui, L., Guo, Z. (eds) Advanced Technologies in Ad Hoc and Sensor Networks. Lecture Notes in Electrical Engineering, vol 295. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54174-2_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54174-2_26

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54173-5

  • Online ISBN: 978-3-642-54174-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics