Wireless Sensor Network Reliability and Security in Factory Automation: A Survey

Industries can benefit a lot from integrating sensors in industrial plants, structures, machinery, shop floors, and other critical places and utilizing their sensing and monitoring power, communicating and processing abilities to deliver sensed information. Proper use of wireless sensor networks (WSNs) can lower the rate of catastrophic failures, and improve the efficiency and productivity of factory operations. Ensuring reliability and providing adequate security in these crucial services provided by WSNs will reinforce their acceptability as a viable and dependable technology in the factory and industrial domain. In this paper, we examine the reliability and security challenges of WSNs and survey their practicality for industrial adoption. We discuss the unique characteristics that distinguish the factory environment from the rest, elaborate on security and reliability issues with their respective solution measures, and analyze the existing WSN architectures and standards. A number of challenges and interesting research issues have emerged from this study and have been reported for further investigation.

[1]  Tohru Kikuno,et al.  A routing protocol for finding two node-disjoint paths in computer networks , 1995, Proceedings of International Conference on Network Protocols.

[2]  J.H. Taylor,et al.  An Intelligent Architecture for Integrated Control and Asset Management for Industrial Processes , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..

[3]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[4]  Xianbin Wang,et al.  Continuous Physical Layer Authentication Using a Novel Adaptive OFDM System , 2011, 2011 IEEE International Conference on Communications (ICC).

[5]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[6]  Mark D. Yarvis,et al.  Design and deployment of industrial sensor networks: experiences from a semiconductor plant and the north sea , 2005, SenSys '05.

[7]  Sencun Zhu,et al.  Sensor node compromise detection: the location perspective , 2007, IWCMC.

[8]  Andreas Willig Wireless sensor networks: concept, challenges and approaches , 2006, Elektrotech. Informationstechnik.

[9]  R. Gadh,et al.  Wireless Industrial Monitoring and Control Using a Smart Sensor Platform , 2007, IEEE Sensors Journal.

[10]  MengChu Zhou,et al.  Ad hoc network routing and security: A review , 2007, Int. J. Commun. Syst..

[11]  Venkata M. Mulpuru,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2008 .

[12]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[13]  Kay Römer,et al.  Wireless sensor networks: a new regime for time synchronization , 2003, CCRV.

[14]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[15]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[16]  Andreas Willig,et al.  Wireless Technology in Industrial Networks , 2005, Proceedings of the IEEE.

[17]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[18]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[19]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[20]  Andreas Willig,et al.  Recent and Emerging Topics in Wireless Industrial Communications: A Selection , 2008, IEEE Transactions on Industrial Informatics.

[21]  Bhaskaran Raman,et al.  WiBeaM:Wireless Bearing Monitoring System , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.

[22]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[23]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[24]  G. L. Gbur,et al.  Wireless vibration monitoring in a US coal-fired plant , 2006 .

[25]  Magnus Jonsson,et al.  Exploiting time and frequency diversity in IEEE 802.15.4 industrial networks for enhanced reliability and throughput , 2010, 2010 IEEE 15th Conference on Emerging Technologies & Factory Automation (ETFA 2010).

[26]  Matthias Hollick,et al.  Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives , 2010, Future Internet.

[27]  Gregory J. Pottie,et al.  Principles of Embedded Networked Systems Design: Acknowledgments , 2005 .

[28]  Parameswaran Ramanathan,et al.  Evaluating Dynamic Failure Probability for Streams with (m, k)-Firm Deadlines , 1997, IEEE Trans. Computers.

[29]  T.G. Habetler,et al.  Energy evaluation goes wireless , 2007, IEEE Industry Applications Magazine.

[30]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[31]  Thomas P. von Hoff,et al.  Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.

[32]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[33]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[34]  Hung-Min Sun,et al.  An efficient countermeasure to the selective forwarding attack in wireless sensor networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[35]  Anna N. Kim,et al.  When HART goes wireless: Understanding and implementing the WirelessHART standard , 2008, 2008 IEEE International Conference on Emerging Technologies and Factory Automation.

[36]  Paul K. Wright,et al.  Distributed Monitoring of Steady-State System Performance Using Wireless Sensor Networks , 2004 .

[37]  Jean-Dominique Decotignie Interconnection of Wireline and Wireless Fieldbusses , 2005, The Industrial Information Technology Handbook.

[38]  Chiu-Ching Tuan,et al.  Fault Tolerance by Quartile Method in Wireless Sensor and Actor Networks , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[39]  P. Neumann,et al.  Measurement, analysis and modeling of real-time source data traffic in factory communication systems , 2000, 2000 IEEE International Workshop on Factory Communication Systems. Proceedings (Cat. No.00TH8531).

[40]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[41]  L. V. Doorn,et al.  SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.

[42]  Gang Zhao,et al.  Wireless Sensor Networks for Industrial Process Monitoring and Control: A Survey , 2011, Netw. Protoc. Algorithms.

[43]  Dawn M. Tilbury,et al.  The Emergence of Industrial Control Networks for Manufacturing Control, Diagnostics, and Safety Data , 2007, Proceedings of the IEEE.

[44]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[45]  Insup Lee,et al.  Sensor Network Security: More Interesting Than You Think , 2006, HotSec.

[46]  Ian F. Akyildiz,et al.  Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.

[47]  Jean-Pierre Thomesse,et al.  Fieldbus Technology in Industrial Automation , 2005, Proceedings of the IEEE.

[48]  Pietro Michiardi,et al.  Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .

[49]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[50]  Parameswaran Ramanathan,et al.  A Dynamic Priority Assignement Technique for Streams with (m, k)-Firm Deadlines , 1995, IEEE Trans. Computers.

[51]  Tae Ho Cho,et al.  Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks , 2007, UIC.

[52]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.

[53]  Leonidas J. Guibas,et al.  Wireless sensor networks - an information processing approach , 2004, The Morgan Kaufmann series in networking.

[54]  Jens B. Schmitt,et al.  Heterogeneous Network Quality of Service Systems , 2001 .

[55]  Meng Joo Er,et al.  Wireless Sensor Networks for Industrial Environments , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).

[56]  Hai Lin,et al.  A New Adaptive OFDM System with Precoded Cyclic Prefix for Dynamic Cognitive Radio Communications , 2011, IEEE Journal on Selected Areas in Communications.

[57]  Marek Miskowicz,et al.  Modeling end-to-end reliability in best-effort networked embedded systems , 2010, 2010 IEEE 15th Conference on Emerging Technologies & Factory Automation (ETFA 2010).

[58]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[59]  Mengchu Zhou,et al.  An experimental study of interference impacts on ZigBee-based wireless communication inside buildings , 2010, 2010 IEEE International Conference on Mechatronics and Automation.

[60]  Ronald L. Rivest,et al.  The RC4 encryption algorithm , 1992 .

[61]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[62]  Daming Lin,et al.  A review on machinery diagnostics and prognostics implementing condition-based maintenance , 2006 .

[63]  Paul K. Wright,et al.  Condition Monitoring in End-Milling Using Wireless Sensor Networks (WSNs) , 2008 .

[64]  T. Newe,et al.  Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).

[65]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[66]  Richard Zurawski,et al.  The Industrial Communication Technology Handbook , 2005 .

[67]  Carlo Fischione,et al.  Breath: An Adaptive Protocol for Industrial Control Applications Using Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.

[68]  Srdjan Capkun,et al.  Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..

[69]  Amiya R Mohanty,et al.  Estimation of tool wear during CNC milling using neural network-based sensor fusion , 2007 .

[70]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[71]  Dharma P. Agrawal,et al.  Achieving Fault Tolerance in Data Aggregation in Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[72]  Xianbin Wang,et al.  Robust physical layer authentication using inherent properties of channel impulse response , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[73]  Shlomo Shamai,et al.  Information theoretic considerations for cellular mobile radio , 1994 .

[74]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[75]  Paul K. Wright,et al.  A Wireless Sensor for Tool Temperature Measurement and its Integration within a Manufacturing System , 2006 .

[76]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[77]  M. Antoniou,et al.  Wireless sensor networks for industrial processes , 2009, 2009 IEEE Sensors Applications Symposium.

[78]  Sajal K. Das,et al.  Security in Wireless Sensor Networks: A Survey , 2006 .

[79]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[80]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[81]  Anke Xue,et al.  Reliable Application of Wireless Sensor Networks in Industrial Process Control , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[82]  Deborah Estrin,et al.  Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.

[83]  Gregory J. Pottie,et al.  Principles of Embedded Networked Systems Design , 2005 .

[84]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[85]  Andreas Willig,et al.  Protocols and Architectures for Wireless Sensor Networks , 2005 .

[86]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[87]  Youxian Sun,et al.  Wireless sensor networks solutions for real time monitoring of nuclear power plant , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).