The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Industrial networks have a mix of devices with different security properties. If a mix of devices with various degrees of security features and capabilities communicate, the overall network dynamics with respect to device trust and security of message exchange will be complex. Therefore, there is a need to understand the trust and risk probabilities of devices in a heterogeneous network. This is required...
In industrial plants, there is a mix of devices with different security features and capabilities. If there is a mix of devices with various degree of security levels, then this will create independent islands in a network with similar levels of security features. However, the industrial plant is interconnected for the purpose of reducing cost of monitoring with a centralized control center. Therefore,...
Industrial automation can benefit from applying wireless sensor and actuator networks (WSAN) on cost reduction, mobility and flexibility. However, wireless solutions are more prone to interferences compared to wired ones. In order to avoid production losses and to keep the revenues at an anticipated level, it is of utmost importance for WSANs to meet the stringent requirements from industrial automation,...
The security in industrial automation domain using cryptography mechansims is being discussed in both industry and academia. An efficient key management system is required to support cryptography for both symmetric key and public/private key encryption. The key managment should ensure that the device is verified before distributing the initial key parameters to devices. The software/firmware used...
In various industrial automation applications, positioning enables location awareness which can be exploited in applications such as robotic precision control, amongst others. This paper discusses positioning for industrial automation applications. Examples of applications from an infrastructure perspective are presented, and the integration of high precision positioning technology into existing network...
Recent developments in wireless sensor networks have inspired applications which require high accuracy localization. Impulse radio ultra wide-band technology has a fine time resolution, allowing accurate determination of the time of arrival at the receiver, making it a serious contender for accurate ranging, in comparison to narrow-band technologies. In this paper, we present a UWB based 3D real-time...
TTEthernet is a communication platform which builds on Ethernet, but extends it to include fault-tolerance and real-time mechanisms. The existing TTEthernet technology is developed for wired networks. A natural step for improving and extending the current application field is the introduction of a mixed wired and wireless network. However, this step requires research both about possible adaptation...
Wireless sensor networks (WSNs) for control and monitoring applications introduce critical constraints on the design of multiple access schemes to guarantee timely data delivery. However, existing WSNs are mainly designed to conserve energy consumption and not to support timely data transmission. In this paper, we present a novel media access method defined as Wireless Arbitration which grants each...
Industrial Wireless Sensor Networks (IWSNs) have been increasingly adopted in process automation due to a number of advantages such as cost reduction and enhanced flexibility. Nevertheless, transmission over wireless channels in industrial environments is prone to interference, resulting in frequent erroneous packet deliveries. Existing IWSN standards based on the IEEE 802.15.4 specification only...
Industrial device commissioning along with the initial distribution of keying material is an important step for the security of industrial plants. An efficient key management system is required in cryptography for both symmetric key or public/private key encryption. Most of the key management system use either pre-installed shared keys or install keys using out-of-band channels. In addition to that,...
Several wireless sensor network (WSN) applications will in the future be deployed for process control purposes which typically require timely data delivery. The main drawback with current WSNs is that they cannot guarantee predictable delay which is required in many applications. In this paper, we propose WirArb which is a new medium access control (MAC) protocol suitable for time-critical applications...
The security of industrial plants has gained a lot of importance since the last decade. The reason is that the different components from different network layers of automation systems have become inter-connected to support fast and cost-effective decisions at the management level. This inter-connectivity has posed many security challenges in this industrial segment. To achieve effective security mechanisms...
The control applications of Industrial Wireless Sensor and Actuator Networks (IWSANs) are subject to strict requirements in terms of reliability and end-to-end delay. Transmission failures or deadline misses may seriously degrade the quality of control. In this paper, we propose a reliable real-time routing protocol in IWSANs for industrial control purpose. Node weight values and related node lists...
The design of industrial wireless sensor network (IWSN) stacks requires the adoption of real time operation system (RTOS). Challenges exist especially in timing integrity and multi-processor support. As a solution, we propose an RTOS-based architecture for IWSN stacks with multi-processor support. It offers benefits in terms of platform independency, product life cycle, safety and security, system...
Reliable downlink transmissions from the sink to actuators for control data in Industrial Wireless Sensor and Actuator Networks (IWSANs) are extremely important for industrial control applications. However, on the network layer, existing routing protocols fail to fully support downlink transmissions for actuators, due to the insufficiency of reliability, robustness and real-time performance. In this...
In any security design, the initial secret distribution for further key management solution is a major step. In industrial wireless sensor networks also, initial bootstrapping of the trust in the system is a major concern. The plant can be assumed to be a closed system, where only authenticated and trusted users are allowed to enter. However, wireless being the broadcast medium, wireless devices need...
Recent years have endorsed momentous development in the industrial wireless sensor and actuator networks (IWSN) for real time communication. For industrial automation application these wireless networks like ZigBee and wireless HART indeed propose advantages in term of cost and flexibility, but the price to be paid is lower reliability in term of unpredictable delay time and lower throughput. In this...
Wireless technology has gained much interest in industrial automation due to its flexibility, mobility, ease of installation, and lower cost. Wireless systems, in general, require additional and different engineering and maintenance tasks, for example cryptographic key management for security. The pace of application in process control has been impeded, however, by concern about the risks involved...
High reliability and real-time performance are main research challenges in Industrial Wireless Sensor Networks (IWSNs). Existing routing protocols applied in IWSNs are either overcomplicated or fail to fulfill the stringent requirements. In this paper, we propose a reliable and flexible Received Signal Strength-based routing scheme. Our proposed solution can achieve a seamless transition in the event...
In this paper we address the issues of timeliness and transmission reliability of existing industrial communication standards. We combine a Forward Error Correction coding scheme on the Medium Access Control layer with a lightweight routing protocol to form an IEEE 802.15.4-conformable solution, which can be implemented into already existing hardware without violating the standard. After laying the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.