Visible to the public Security Challenges and Risk Evaluation Framework for Industrial Wireless Sensor Networks

TitleSecurity Challenges and Risk Evaluation Framework for Industrial Wireless Sensor Networks
Publication TypeConference Paper
Year of Publication2017
AuthorsLiang, L., Liu, Y., Yao, Y., Yang, T., Hu, Y., Ling, C.
Conference Name2017 4th International Conference on Control, Decision and Information Technologies (CoDIT)
ISBN Number978-1-5090-6465-6
KeywordsCollaboration, condition monitoring, condition parameter monitoring, environmental monitoring, Human Behavior, human factors, industrial control systems, industrial wireless sensor networks, Industries, Industry 4.0, information system, intelligent manufacturing, IWSN, Metrics, Monitoring, Peer-to-peer computing, policy-based governance, production equipment, Production facilities, pubcrawl, resilience, Resiliency, risk evaluation, risk evaluation framework, risk management, security, security challenges, security weaknesses, smart factories, Wireless communication, Wireless sensor networks

Due to flexibility, low cost and rapid deployment, wireless sensor networks (WSNs)have been drawing more and more interest from governments, researchers, application developers, and manufacturers in recent years. Nowadays, we are in the age of industry 4.0, in which the traditional industrial control systems will be connected with each other and provide intelligent manufacturing. Therefore, WSNs can play an extremely crucial role to monitor the environment and condition parameters for smart factories. Nevertheless, the introduction of the WSNs reveals the weakness, especially for industrial applications. Through the vulnerability of IWSNs, the latent attackers were likely to invade the information system. Risk evaluation is an overwhelmingly efficient method to reduce the risk of information system in order to an acceptable level. This paper aim to study the security issues about IWSNs as well as put forward a practical solution to evaluate the risk of IWSNs, which can guide us to make risk evaluation process and improve the security of IWSNs through appropriate countermeasures.

Citation Keyliang_security_2017