SECURITY VULNERABILITIES AND RISKS IN INDUSTRIAL USAGE OF WIRELESS COMMUNICATION

被引:0
|
作者
Plosz, S. [1 ]
Farshad, A. [1 ]
Tauber, M. [1 ]
Lesjak, C. [2 ]
Ruprechter, T. [2 ]
Pereira, N. [3 ]
机构
[1] Austrian Inst Technol, A-2444 Seibersdorf, Austria
[2] Infineon Technol Austria, A-8020 Graz, Austria
[3] Polytech Inst Porto, P-4200072 Oporto, Portugal
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial applications often have specific security requirements. Hence, it is important to understand the characteristics of such applications and evaluate the vulnerabilities bearing the highest risk in this context. We present a comprehensive overview of security issues and features in existing WLAN, NFC and ZigBee standards, investigating the usage characteristics of these standards in industrial environments. We apply standard risk assessment methods to identify vulnerabilities with the highest risk across multiple technologies. We present a threat catalogue, conclude in which direction new mitigation methods should progress and how security analysis methods should be extended to meet requirements in the M2M domain.
引用
下载
收藏
页数:8
相关论文
共 50 条
  • [31] Review on Cyber Vulnerabilities of Communication Protocols in Industrial Control Systems
    Xu, Yikai
    Yang, Yi
    Li, Tianran
    Ju, Jiaqi
    Wang, Qi
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [32] The Security in Optical Wireless Communication: A Survey
    Zhang, Xiao
    Klevering, Griffin
    Lei, Xinyu
    Hu, Yiwen
    Xiao, Li
    Tu, Guan-Hua
    ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [33] Availability and security of wireless communication routes
    Schildknecht, Thomas
    Technische Sicherheit, 2019, 9 (03): : 14 - 20
  • [34] Cyber Security of Industrial Communication Protocols
    Su, Weilian
    Antoniou, Anastasios
    Eagle, Chris
    2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2017,
  • [35] A Survey on Security Vulnerabilities in Wireless Ad Hoc High Performance Clusters
    Shivaramu, K. N.
    Prasobh, P. S.
    Poti, Nagaraj
    1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016, 2016, 25 : 489 - 496
  • [36] Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks
    Stewart, William
    Xiao, Yang
    Sun, Bo
    Chen, Hsiao-Hwa
    International Journal of Wireless and Mobile Computing, 2007, 2 (01) : 14 - 27
  • [37] Wireless communication for industrial control and monitoring
    Ciardiello, T
    COMPUTING AND CONTROL ENGINEERING, 2005, 16 (02): : 12 - 13
  • [38] Wireless Communication Technologies in Industrial Applications
    Lyczkowski, Eike
    Wanjek, Andreas
    Sauer, Christian
    ATP MAGAZINE, 2021, (05): : 20 - 23
  • [39] Reviewing risks and vulnerabilities in web 2.0 for matching security considerations in web 3.0
    Saqib, Nazar Abbas
    Salam, Asiya Abdus
    Atta-Ur-Rahman
    Dash, Sujata
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (03): : 809 - 825
  • [40] Analysis of Models of Security to Mitigate the Risks, Vulnerabilities and Threats in a Company of Services of Telecommunications
    Toapanta Toapanta, Segundo Moises
    Mafla Gallegos, Luis Enrique
    Chevez Moran, Maria Jose
    Ortiz Rojas, Javier Gonzalo
    2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020), 2020, : 445 - 450