SECURITY VULNERABILITIES AND RISKS IN INDUSTRIAL USAGE OF WIRELESS COMMUNICATION

被引:0
|
作者
Plosz, S. [1 ]
Farshad, A. [1 ]
Tauber, M. [1 ]
Lesjak, C. [2 ]
Ruprechter, T. [2 ]
Pereira, N. [3 ]
机构
[1] Austrian Inst Technol, A-2444 Seibersdorf, Austria
[2] Infineon Technol Austria, A-8020 Graz, Austria
[3] Polytech Inst Porto, P-4200072 Oporto, Portugal
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial applications often have specific security requirements. Hence, it is important to understand the characteristics of such applications and evaluate the vulnerabilities bearing the highest risk in this context. We present a comprehensive overview of security issues and features in existing WLAN, NFC and ZigBee standards, investigating the usage characteristics of these standards in industrial environments. We apply standard risk assessment methods to identify vulnerabilities with the highest risk across multiple technologies. We present a threat catalogue, conclude in which direction new mitigation methods should progress and how security analysis methods should be extended to meet requirements in the M2M domain.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities
    Dahbur, Kamal
    Mohammad, Bassil
    Tarakji, Ahmad Bisher
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (03) : 1 - 11
  • [23] Security and Wireless Communication Networks
    Qian, Yi
    IEEE WIRELESS COMMUNICATIONS, 2020, 27 (03) : 4 - 5
  • [24] Security in Wireless Communication Networks
    Rong, Bo
    IEEE WIRELESS COMMUNICATIONS, 2023, 30 (01) : 10 - 11
  • [25] Wireless Communication in Industrial Applications
    Lyczkowski, Eike
    Wanjek, Andreas
    Sauer, Christian
    Kiess, Wolfgang
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 1392 - 1395
  • [26] Security performance analysis of RIS-assisted UAV wireless communication in industrial IoT
    Liu, Xinzhong
    Xie, Cong
    Xie, Wenwu
    Zhu, Peng
    Yang, Zhihe
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (04): : 5957 - 5973
  • [27] Security performance analysis of RIS-assisted UAV wireless communication in industrial IoT
    Xinzhong Liu
    Cong Xie
    Wenwu Xie
    Peng Zhu
    Zhihe Yang
    The Journal of Supercomputing, 2022, 78 : 5957 - 5973
  • [28] Physical Layer Security Authentication Based Wireless Industrial Communication System for Spoofing Detection
    Chen, Songlin
    Wang, Sijing
    Xu, Xingchen
    Jiao, Long
    Wen, Hong
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [29] Tackling security vulnerabilities in VPN-based wireless deployments
    Fazal, L
    Ganu, S
    Kappes, M
    Krishnakumar, AS
    Krishnan, P
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 100 - 104
  • [30] Hazards, risks and vulnerabilities in a changing environment: the unexpected onslaught on human security?
    Bogardi, JJ
    GLOBAL ENVIRONMENTAL CHANGE-HUMAN AND POLICY DIMENSIONS, 2004, 14 (04): : 361 - 365