Page 318 - From Smart Grid to Internet of Energy
P. 318

Internet of things for smart grid applications Chapter  7 283


             On the other hand, Chinese Industrial Wireless Alliance has introduced
             another industrial standard entitled Wireless network for Industrial
             Automation-Process Automation (WIA-PA) almost at the same time in 2010.
             A regular WIA-PA network associates star and mesh topologies to compose
             a hierarchical network. The mesh topology includes router and gateways, while
             router and field devices compose star topology. The components of WIA-PA
             networks are same with WirelessHART where the field devices are integrated
             at industrial stages to obtain and to transmit the data. ISA100.11a has been pre-
             sented by International Society of Automation (ISA) in 2009 and has been
             approved as IEC 62734 standard by IEC in 2014. Despite the previous wireless
             standards, ISA100.11a is aimed to be a new approach with wider coverage and
             broader connectivity features. The devices are spread into two main groups as
             field devices and infrastructure devices in ISA100.11a that data acquisition
             devices, routers, and mobile devices are defined as field devices and backbone
             routers, gateways, and security devices are accepted as infrastructure devices
             [42, 53].
                The improvements of TSCH and DSME approaches brought by IEEE
             802.15.4e promoted IPv6 utilization in industrial networks. 6TiSCH is a crucial
             standard performing IPv6 communication over TSCH by interconnecting MAC
             layer and network layer. IEEE 802.15.4e is not capable to fill the gap between
             scheduling and managing the networks traffic that is accomplished by 6TiSCH
             Operation Sublayer. Thus, the top stack of 6TiSCH enables IPv6 that allows
             converting long 6LoWPAN packets to short IEEE 802.15.4. Three major open
             source wireless devices; OpenWSN, Contiki, and RIOT, support 6TiSCH to
             implement WSN and wireless communication infrastructure. The features
             and differences of industrial IoT (IIoT) protocol architectures are illustrated
             in Fig. 7.7 regarding to the wireless industrial standards. The layer structure
             is comprised by considering OSI seven-layer structures where some standards
             do not include respecting protocols are left blank.
                Security and privacy issues should be taken into consideration at the adop-
             tion stage of IoT devices. The security environment includes all sides of infra-
             structure as users, things, technological system, and processes. The PHY and
             MAC layer security is related to communication devices where IEEE
             802.15.4 is prominent standard enabling security services operating at MAC
             layer with various encryption methods. The 32-, 64-, and 128-bit Advanced
             Encryption Standard (AES) keys are used to increase security in Cipher Block
             Chaining (CBC) mode that generates a Message Integrity Code (MIC) or Mes-
             sage Authentication Code (MAC) inserted to the transmitted data. The security
             mode AES keys are identified as AES-CBC-MAC-32, AES-CBC-MAC-64 and
             AES-CBC-MAC-128 at MAC layer. These keys prevent the vulnerabilities to
             integrity and authentication attacks. Cipher blocking and counter modes are
             associated to increase confidentiality of IEEE 802.15.4 standard at link layer
             transmission. The associated encryption modes are defined with CBC-MAC
             AES/CCM and AES keys are titled as AES-CCM-32, AES-CCM-64 and
             AES-CCM-128 with different heap sizes and encryption levels.
   313   314   315   316   317   318   319   320   321   322   323