SECURITY VULNERABILITIES AND RISKS IN INDUSTRIAL USAGE OF WIRELESS COMMUNICATION

被引:0
|
作者
Plosz, S. [1 ]
Farshad, A. [1 ]
Tauber, M. [1 ]
Lesjak, C. [2 ]
Ruprechter, T. [2 ]
Pereira, N. [3 ]
机构
[1] Austrian Inst Technol, A-2444 Seibersdorf, Austria
[2] Infineon Technol Austria, A-8020 Graz, Austria
[3] Polytech Inst Porto, P-4200072 Oporto, Portugal
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial applications often have specific security requirements. Hence, it is important to understand the characteristics of such applications and evaluate the vulnerabilities bearing the highest risk in this context. We present a comprehensive overview of security issues and features in existing WLAN, NFC and ZigBee standards, investigating the usage characteristics of these standards in industrial environments. We apply standard risk assessment methods to identify vulnerabilities with the highest risk across multiple technologies. We present a threat catalogue, conclude in which direction new mitigation methods should progress and how security analysis methods should be extended to meet requirements in the M2M domain.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] THE RISKS AND VULNERABILITIES OF ARTIFICIAL INTELLIGENCE USAGE IN INFORMATION SECURITY
    Mahmoud, Mohammed
    [J]. 2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023, 2023, : 266 - 269
  • [2] An Implementation of Convergence Security Solution for Overcoming of Security Vulnerabilities in Industrial Control Communication Network
    Lee, June-Kyoung
    Lee, Seong-Woo
    Lee, Kyoung-Hak
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (02) : 545 - 565
  • [3] An Implementation of Convergence Security Solution for Overcoming of Security Vulnerabilities in Industrial Control Communication Network
    June-Kyoung Lee
    Seong-Woo Lee
    Kyoung-Hak Lee
    [J]. Wireless Personal Communications, 2019, 105 : 545 - 565
  • [4] Wireless security: Vulnerabilities and countermeasures
    Johnson, DM
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 91 - 91
  • [5] Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective
    Aslam, Muhammad Muzamil
    Tufail, Ali
    Apong, Rosyzie Anna Awg Haji Mohd
    De Silva, Liyanage Chandratilak
    Raza, Muhammad Taqi
    [J]. IEEE ACCESS, 2024, 12 : 67537 - 67573
  • [6] Cyber Security Vulnerabilities of Smart Metering Based on LPWAN Wireless Communication Technologies
    Zaraket, Carine
    Papageorgas, Panagiotis
    Aillerie, Michel
    Agavanakis, Kyriakos
    Salame, Chafic
    [J]. TECHNOLOGIES AND MATERIALS FOR RENEWABLE ENERGY, ENVIRONMENT AND SUSTAINABILITY (TMREES20), 2020, 2307
  • [7] Wireless Network Security Vulnerabilities and Concerns
    Mushtaq, Ahmad
    [J]. SECURITY TECHNOLOGY, DISASTER RECOVERY AND BUSINESS CONTINUITY, 2010, 122 : 207 - 219
  • [8] Wireless network security: Vulnerabilities, threats and countermeasures
    Choi, Min-Kyu
    Robles, Rosslin John
    Hong, Chang-Hwa
    Kim, Tai-Hoon
    [J]. International Journal of Multimedia and Ubiquitous Engineering, 2008, 3 (03): : 77 - 86
  • [9] Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations
    Pu, Hongyi
    He, Liang
    Cheng, Peng
    Sun, Mingyang
    Chen, Jiming
    [J]. IEEE NETWORK, 2023, 37 (01): : 111 - 117
  • [10] The (In)Security of Smart Cities: Vulnerabilities, Risks, Mitigation, and Prevention
    Kitchin, Rob
    Dodge, Martin
    [J]. JOURNAL OF URBAN TECHNOLOGY, 2019, 26 (02) : 47 - 65