Page 317 - From Smart Grid to Internet of Energy
P. 317
282 From smart grid to internet of energy
forwarding attack, flooding, overloading and jamming attacks. These attacks
overload the communication infrastructure and targets to increase energy con-
sumption in sensor nodes to disrupt functionality.
The traffic analysis attacks can be active or passive according to its traffic
injection act to network. The active traffic analysis attack can be seen in Wir-
elessHART, ISA100 and ZigBee networks of smart grid and can be resolved by
using authentication mechanisms. On the other hand, passive traffic analysis
attack is seen in ZigBee networks. The industrial IoT standards such as Wire-
lessHART, ISA100.11.a, and 6LoWPAN require particular attention on secu-
rity as ZigBee Pro standard due to their application contents, wireless
network infrastructure, and WSN security. Although M2M communication
methods have not been faced to special threats, they have been exposed to exist-
ing threats since they are more vulnerable comparing to conventional network
infrastructures and devices. The attacks targeting M2M communication sys-
tems can be analyzed in three groups as physical, logical, and content attacks.
The physical attacks are listed as side channel attacks, software modification
attacks, and destruction of the M2M device. The logical attacks are imperson-
ation, DoS attacks, and relay attacks that adversary targets communication
devices and network. The content attacks are based on privacy, modification,
and interception intrusions. The industrial automation systems are classified
into two groups as process automation (PA) and factory automation (FA).
The PA applications use industrial wireless communication standards that
are presented below in detail. The FA applications use wireless interface for
sensors and actuators (WISA) and the wireless sensor actuator network for fac-
tory automation (WSAN-FA) standards that both are operated at PHY layer.
The PA applications that are utilized for monitoring and control acquire the data
and send to data concentrators at predefined intervals. In despite of PA appli-
cation, the FA applications are quite sensitive to latency and delays. Therefore,
PA applications have been paid much attention comparing to FA applications.
IoT services and protocols supported the improvement of a novel industrial
standard 6TiSCH that is proposed by IEEE and IETF in addition to legacy
industrial standards. ZigBee Alliance has introduced ZigBee Pro in 2007, which
has become a widespread technology even in industrial applications as WSNs.
The star, mesh, and tree topologies can be comprised in ZigBee networks that
mesh provides more reliable and secure communication infrastructure compar-
ing to others. Nevertheless, star topology is more suitable to meet controllability
requirements of industrial networks and it is preferred to mesh topology in
industrial applications. After that ZigBee Pro has been widely used, Interna-
tional Electrotechnical Commission (IEC) approved the WirelessHART as
an international and industrial wireless communication standard with IEC
62591Ed.1.0. The main components of a WirelessHART are field devices, gate-
way, access points, the network manager and mobile devices. The field devices
are installed at the industrial plant for data acquisition and routing processes that
the data is transmitted to gateway through access points. The network manager
configures the devices and topologies of network to operate the transmission.