• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

面向工业物联网系统的增强安全配置。

Toward Security Enhanced Provisioning in Industrial IoT Systems.

机构信息

Department of Computer Engineering, Ajou University, 206, World cup-ro, Yeongtong-gu, Suwon-si, Gyeonggi-do 16499, Korea.

Department of Cybersecurity, Ajou University, 206, World cup-ro, Yeongtong-gu, Suwon-si, Gyeonggi-do 16499, Korea.

出版信息

Sensors (Basel). 2018 Dec 10;18(12):4372. doi: 10.3390/s18124372.

DOI:10.3390/s18124372
PMID:30544752
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6308984/
Abstract

Through the active development of industrial internet of things (IIoT) technology, there has been a rapid increase in the number of different industrial wireless sensor networks (IWSNs). Accordingly, the security of IWSNs is also of importance, as many security problems related to IWSN protocols have been raised and various studies have been conducted to solve these problems. However, the provisioning process is the first step in introducing a new device into the IIoT network and a starting point for IIoT security. Therefore, leakage of security information in the provisioning process makes exposure of secret keys and all subsequent security measures meaningless. In addition, using the exploited secret keys, the attacker can send false command to the node or send false data to the network manager and it can cause serious damage to industrial infrastructure depending on the IWSN. Nevertheless, a security study on the provisioning process has not been actively carried out, resulting in a provisioning process without guaranteed security. Therefore, in this paper, we analyzed security issues of the provisioning process in IWSN by researching prominent IWSN standards, including ISA 100.11a, WirelessHART, and Zigbee, and also an ISA 100.11a-certified device and provisioning process-related studies. Then, we verified the security issues of the provisioning process through testing and analyzing the provisioning process using the ISA 100.11a standard-implemented devices and ISA 100.11a-certified devices. Finally, we discuss security considerations and the direction of future research on provisioning security for IWSN in the IIoT era.

摘要

通过积极开发工业物联网 (IIoT) 技术,不同的工业无线传感器网络 (IWSN) 的数量迅速增加。因此,IWSN 的安全性也很重要,因为已经提出了许多与 IWSN 协议相关的安全问题,并且已经进行了各种研究来解决这些问题。然而,供应过程是将新设备引入 IIoT 网络的第一步,也是 IIoT 安全的起点。因此,供应过程中的安全信息泄漏会导致密钥泄露,所有后续的安全措施都变得毫无意义。此外,攻击者可以利用利用的密钥向节点发送虚假命令,或向网络管理员发送虚假数据,这可能会根据 IWSN 对工业基础设施造成严重破坏。然而,对供应过程的安全研究并没有得到积极开展,导致供应过程没有得到保证的安全性。因此,在本文中,我们通过研究包括 ISA 100.11a、WirelessHART 和 Zigbee 在内的知名 IWSN 标准,以及 ISA 100.11a 认证设备和与供应过程相关的研究,分析了 IWSN 供应过程中的安全问题。然后,我们通过使用实施了 ISA 100.11a 标准的设备和 ISA 100.11a 认证设备测试和分析供应过程,验证了供应过程中的安全问题。最后,我们讨论了在 IIoT 时代 IWSN 供应安全的安全考虑和未来研究方向。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/37e45a79610e/sensors-18-04372-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/50c9379e3037/sensors-18-04372-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/99dc0b20a2ff/sensors-18-04372-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/5e17e1ced305/sensors-18-04372-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/b23db0392f42/sensors-18-04372-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/60ed5c192ce5/sensors-18-04372-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/37e45a79610e/sensors-18-04372-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/50c9379e3037/sensors-18-04372-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/99dc0b20a2ff/sensors-18-04372-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/5e17e1ced305/sensors-18-04372-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/b23db0392f42/sensors-18-04372-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/60ed5c192ce5/sensors-18-04372-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a92/6308984/37e45a79610e/sensors-18-04372-g006.jpg

相似文献

1
Toward Security Enhanced Provisioning in Industrial IoT Systems.面向工业物联网系统的增强安全配置。
Sensors (Basel). 2018 Dec 10;18(12):4372. doi: 10.3390/s18124372.
2
Industrial Wireless Sensor Networks: Protocols and Applications.工业无线传感器网络:协议与应用。
Sensors (Basel). 2020 Oct 14;20(20):5809. doi: 10.3390/s20205809.
3
A Survey on the Application of WirelessHART for Industrial Process Monitoring and Control.关于无线 HART 在工业过程监测和控制中应用的调查。
Sensors (Basel). 2021 Jul 21;21(15):4951. doi: 10.3390/s21154951.
4
Development and Validation of an ISA100.11a Simulation Model for Accurate Industrial WSN Planning and Deployment.ISA100.11a 工业无线传感器网络仿真模型的开发与验证,实现精确的工业无线传感器网络规划与部署。
Sensors (Basel). 2021 May 21;21(11):3600. doi: 10.3390/s21113600.
5
A Panorama of Cloud Platforms for IoT Applications Across Industries.跨行业物联网应用的云平台全景。
Sensors (Basel). 2020 May 9;20(9):2701. doi: 10.3390/s20092701.
6
A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry.工业物联网在制造业中对实现智能工业的作用调查
Sensors (Basel). 2023 Nov 3;23(21):8958. doi: 10.3390/s23218958.
7
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey.工业物联网(IIoT)的最新技术、安全对策和持续挑战:综述。
Sensors (Basel). 2021 Oct 6;21(19):6647. doi: 10.3390/s21196647.
8
..
Sensors (Basel). 2018 Sep 23;18(10):3215. doi: 10.3390/s18103215.
9
Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications.物联网系统完整性:工业应用的安全性、攻击及对策的全面调查。
Sensors (Basel). 2021 May 24;21(11):3654. doi: 10.3390/s21113654.
10
A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities.工业物联网安全综述:需求、攻击、基于人工智能的解决方案及边缘计算机遇
Sensors (Basel). 2023 Aug 28;23(17):7470. doi: 10.3390/s23177470.

引用本文的文献

1
A secure and lightweight trust evaluation model for enhancing decision-making in resource-constrained industrial WSNs.一种用于增强资源受限工业无线传感器网络决策能力的安全轻量级信任评估模型。
Sci Rep. 2024 Nov 15;14(1):28162. doi: 10.1038/s41598-024-75414-0.
2
The Need for Cybersecurity in Industrial Revolution and Smart Cities.工业革命和智慧城市中的网络安全需求。
Sensors (Basel). 2022 Dec 23;23(1):120. doi: 10.3390/s23010120.
3
A Survey on the Application of WirelessHART for Industrial Process Monitoring and Control.关于无线 HART 在工业过程监测和控制中应用的调查。

本文引用的文献

1
Dedicated real-time monitoring system for health care using ZigBee.使用ZigBee的专用医疗保健实时监测系统。
Healthc Technol Lett. 2017 Jul 7;4(4):142-144. doi: 10.1049/htl.2017.0030. eCollection 2017 Aug.
Sensors (Basel). 2021 Jul 21;21(15):4951. doi: 10.3390/s21154951.
4
SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems.SELAMAT:一种用于跨平台工业物联网系统的新型安全轻量级多因素认证方案。
Sensors (Basel). 2021 Feb 18;21(4):1428. doi: 10.3390/s21041428.