mdh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Initial key distribution for industrial wireless sensor networks
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. ABB AB; Corporate Research, Sweden . (IS)ORCID iD: 0000-0002-5361-2196
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. ABB AB; Corporate Research, Sweden . (IS)ORCID iD: 0000-0002-7159-7508
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. (IS)ORCID iD: 0000-0002-2419-2735
ABB AB; Corporate Research, Sweden .ORCID iD: 0000-0002-2419-2735
2013 (English)In: Proceedings of the IEEE International Conference on Industrial Technology, 2013, 1309-1314 p.Conference paper, Published paper (Refereed)
Abstract [en]

In any security design, the initial secret distribution for further key management solution is a major step. In industrial wireless sensor networks also, initial bootstrapping of the trust in the system is a major concern. The plant can be assumed to be a closed system, where only authenticated and trusted users are allowed to enter. However, wireless being the broadcast medium, wireless devices need to validate their identity to join the networks. So, there is a need for importing some initial secret key to the devices, so that they can be authenticated during the joining process. The standards for Industrial Wireless Sensor Networks (WirelessHART, ISA100.11a) also have left to the user the initial distribution of the key for joining during device provisioning. In this paper, the current industry practice and the pre-requisite of key distribution in industrial wireless sensor networks is discussed and an outline is presented for future research directions. © 2013 IEEE.

Place, publisher, year, edition, pages
2013. 1309-1314 p.
Keyword [en]
Industrial Wireless Sensor Networks, Key Distribution, Security
National Category
Engineering and Technology
Identifiers
URN: urn:nbn:se:mdh:diva-19057DOI: 10.1109/ICIT.2013.6505862Scopus ID: 2-s2.0-84877590045ISBN: 978-1-4673-4568-2 (print)OAI: oai:DiVA.org:mdh-19057DiVA: diva2:623025
Conference
2013 IEEE International Conference on Industrial Technology, ICIT 2013; Cape Town; South Africa; 25 February 2013 through 28 February 2013
Available from: 2013-05-24 Created: 2013-05-24 Last updated: 2015-11-09Bibliographically approved
In thesis
1. Initial Trust Establishment for Heterogeneous Industrial Communication Networks
Open this publication in new window or tab >>Initial Trust Establishment for Heterogeneous Industrial Communication Networks
2014 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

The severity of cyber threats towards existing and future industrial systems has resulted in an increase of security awareness in the industrial automation domain. Compared to traditional information security, industrial communication systems have different performance and reliability requirements. The safety and availability requirements can also sometimes conflict with the system security design of plants. For instance, it is not acceptable to create a secure system which may take up additional time to establish security and as a consequence disrupt the production in plants. Similarly, a system which requires authentication and authorization procedures before any emergency action may not be suitable in industrial plants.

Therefore, there is a need for improvement of the security workflow in industrial plants, so that the security can be realized in practice. This also leads to the requirement of secure device deployment and secure data communication inside the industrial plants. In this thesis, the focus is on the initial trust establishment in industrial devices. The initial trust establishment is the starting point for enabling a secure communication infrastructure. Reusability analysis with financial sectors has been considered as the reuse of security solutions from this adjacent application domain can be a simple and an effective way to achieve the desired system security. Through this analysis, the reusability features have been identified and workflows have been proposed which can be used to bootstrap initial trust in the industrial process control devices and manage security workflow. A proof-of-concept implementation to prove the feasibility of the device deployment workflow has also been provided.

Place, publisher, year, edition, pages
Västerås: Mälardalen University, 2014
Series
Mälardalen University Press Licentiate Theses, ISSN 1651-9256 ; 175
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Computer Science
Identifiers
urn:nbn:se:mdh:diva-24945 (URN)978-91-7485-149-6 (ISBN)
Presentation
2014-06-16, Kappa, Mälardalens högskola, Västerås, 13:15 (English)
Opponent
Supervisors
Available from: 2014-04-30 Created: 2014-04-30 Last updated: 2014-05-22Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Ray, ApalaÅkerberg, JohanBjörkman, MatsGidlund, M.
By organisation
Embedded Systems
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 40 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf