As a wireless standard, Wireless HART is widely used in the construction of wireless sensor-actuator networks (WSANs) in industrial plants. If a typical system wants to improve the industrial WSAN, the focus is on improving the performance of the network. The protection aspect is not considered. This is a new attack to Wireless Highway Addressable Remote Transducer networks. The attacker initially cracks the victim’s network channel, route, and parameters, and then manipulates the network to streamline the attack. We have identified targeted, almost undetectable spoofing attacks. This document describes a serious and stealth threat by stepping through the attack on a network that running on a publicly available Wireless HART application.
REFERENCES
1.
HART Communication Protocol and Foundation (Now the Field Comm Group)
. [Online]. Available: https://fieldcommgroup.org/2.
WirelessHART
, “WirelessHART.
” [Online]. Available: https://fieldcommgroup.org/technologies/hart/hart-technology3.
C.
Lu
, A.
Saifullah
, B.
Li
, M.
Sha
, H.
Gonzalez
, D.
Gunatilaka
, C.
Wu
, L.
Nie
, and Y.
Chen
, “Real-Time Wireless Sensor-Actuator Networks for Industrial Cyber-Physical Systems
,” IEEE Special Issue on Industrial Cyber Physical Systems
, vol. 104
, no. 5
, pp. 1013
–1024
, 2016
.4.
Endong
Tong
, Wenjia
Niu
“Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence
” 2020
5.
Jie
Yang
, Yingying
Chen
“Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attack
” 2010
6.
Karthick Anand
Babu
, A.B. and Sivakumar
, R.
, 2015
. Development of type 2 fuzzy rough ontology-based middleware for context processing in ambient smart environment
. In Intelligent Computing and Applications: Proceedings of the International Conference on ICA
, 22-24 December 2014 (pp. 137
–143
). Springer
India
.7.
8.
Xinyu
Miao
, Zhihao
Guan
“Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication
”, 2020
.9.
X.
Cheng
, J.
Shi
, and M.
Sha
, “Cracking the Channel Hopping Sequences in IEEE 802.15.4e-Based Industrial TSCH Networks
,” in IoTDI
, 2019
.10.
Xia
Cheng
, Junyang
Shi
, “Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks
,” ACM Transactions on Internet Technology
, vol. 13
, no. 7
, pp. 3481
–3495
, 2020
.11.
Moitrayee
Chatterjee
, Prerit
Datta
, Faranak
Abri
, Akbar Siami
Namin
, and Keith S.
Jones
“Cloud: A Platform To Launch Stealth Attacks
”
This content is only available via PDF.
© 2024 Author(s). Published under an exclusive license by AIP Publishing.
2024
Author(s)
You do not currently have access to this content.