Open this publication in new window or tab >>2013 (English)In: Proceedings of the IEEE International Conference on Industrial Technology, 2013, p. 1309-1314Conference paper, Published paper (Refereed)
Abstract [en]
In any security design, the initial secret distribution for further key management solution is a major step. In industrial wireless sensor networks also, initial bootstrapping of the trust in the system is a major concern. The plant can be assumed to be a closed system, where only authenticated and trusted users are allowed to enter. However, wireless being the broadcast medium, wireless devices need to validate their identity to join the networks. So, there is a need for importing some initial secret key to the devices, so that they can be authenticated during the joining process. The standards for Industrial Wireless Sensor Networks (WirelessHART, ISA100.11a) also have left to the user the initial distribution of the key for joining during device provisioning. In this paper, the current industry practice and the pre-requisite of key distribution in industrial wireless sensor networks is discussed and an outline is presented for future research directions. © 2013 IEEE.
Keywords
Industrial Wireless Sensor Networks, Key Distribution, Security
National Category
Engineering and Technology
Identifiers
urn:nbn:se:mdh:diva-19057 (URN)10.1109/ICIT.2013.6505862 (DOI)2-s2.0-84877590045 (Scopus ID)978-1-4673-4568-2 (ISBN)
Conference
2013 IEEE International Conference on Industrial Technology, ICIT 2013; Cape Town; South Africa; 25 February 2013 through 28 February 2013
2013-05-242013-05-242015-11-09Bibliographically approved