As a wireless standard, Wireless HART is widely used in the construction of wireless sensor-actuator networks (WSANs) in industrial plants. If a typical system wants to improve the industrial WSAN, the focus is on improving the performance of the network. The protection aspect is not considered. This is a new attack to Wireless Highway Addressable Remote Transducer networks. The attacker initially cracks the victim’s network channel, route, and parameters, and then manipulates the network to streamline the attack. We have identified targeted, almost undetectable spoofing attacks. This document describes a serious and stealth threat by stepping through the attack on a network that running on a publicly available Wireless HART application.

1.
HART Communication Protocol and Foundation (Now the Field Comm Group)
. [Online]. Available: https://fieldcommgroup.org/
2.
WirelessHART
, “
WirelessHART.
” [Online]. Available: https://fieldcommgroup.org/technologies/hart/hart-technology
3.
C.
Lu
,
A.
Saifullah
,
B.
Li
,
M.
Sha
,
H.
Gonzalez
,
D.
Gunatilaka
,
C.
Wu
,
L.
Nie
, and
Y.
Chen
, “
Real-Time Wireless Sensor-Actuator Networks for Industrial Cyber-Physical Systems
,”
IEEE Special Issue on Industrial Cyber Physical Systems
, vol.
104
, no.
5
, pp.
1013
1024
,
2016
.
4.
Endong
Tong
,
Wenjia
Niu
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence
2020
5.
Jie
Yang
,
Yingying
Chen
Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attack
2010
6.
Karthick Anand
Babu
, A.B. and
Sivakumar
,
R.
,
2015
.
Development of type 2 fuzzy rough ontology-based middleware for context processing in ambient smart environment
. In
Intelligent Computing and Applications: Proceedings of the International Conference on ICA
, 22-24 December 2014 (pp.
137
143
).
Springer
India
.
7.
Yunji
Ma
An Effective Method for Defence against IP Spoofing Attack
”,
IJERT
,
2019
.
8.
Xinyu
Miao
,
Zhihao
Guan
Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication
”,
2020
.
9.
X.
Cheng
,
J.
Shi
, and
M.
Sha
, “
Cracking the Channel Hopping Sequences in IEEE 802.15.4e-Based Industrial TSCH Networks
,” in
IoTDI
,
2019
.
10.
Xia
Cheng
,
Junyang
Shi
, “
Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks
,”
ACM Transactions on Internet Technology
, vol.
13
, no.
7
, pp.
3481
3495
,
2020
.
11.
Moitrayee
Chatterjee
,
Prerit
Datta
,
Faranak
Abri
,
Akbar Siami
Namin
, and
Keith S.
Jones
Cloud: A Platform To Launch Stealth Attacks
This content is only available via PDF.
You do not currently have access to this content.