DocumentCode :
2277566
Title :
Over the air provisioning of industrial wireless devices using elliptic curve cryptography
Author :
Chen, Deji ; Nixon, Mark ; Lin, Thomas ; Han, Song ; Zhu, Xiuming ; Mok, Aloysius ; Xu, Roger ; Deng, Julia ; Liu, An
Author_Institution :
Technol. Dept., PSS Emerson Process Manage., Austin, TX, USA
Volume :
2
fYear :
2011
fDate :
10-12 June 2011
Firstpage :
594
Lastpage :
600
Abstract :
Security has become a key consideration in industrial settings. Newer technologies, such as wireless sensor networks, have adopted the position that security is mandatory. For wireless sensor applications it is important to secure data in transit in the air, to authenticate data originating from, or arriving at the wireless devices and applications, and, most important, to protect the safety and integrity of the legacy process control and plant safeguarding systems that the new wireless world interconnects into. Current industrial wireless mesh networks, such as WirelessHART™, ISA100.11a, and WIA-PA, have adopted AES 128 bit encryption for both securing communications and data. To ensure that devices and applications are authenticated special join keys are used. The process of loading these keys is called provisioning. To ensure that join keys remain secret they are loaded offline through special wired interfaces or provisioned over the air using less secure mechanisms. What is needed is a low cost efficient public key mechanism that can be utilized over the air while not compromising security. This paper examines the use of elliptic curve cryptography for this purpose. We realize this technique on a WirelessHART mesh network. Efforts are underway to incorporate this approach as an addition to the WirelessHART standard.
Keywords :
public key cryptography; telecommunication security; wireless mesh networks; AES encryption; ISA100.11a; WIA-PA; air provisioning; communication security; elliptic curve cryptography; industrial wireless devices; industrial wireless mesh networks; legacy process control; plant safeguarding systems; public key mechanism; wired interfaces; wireless sensor networks; wireless world interconnects; wirelessHART mesh network; Authentication; Communication system security; Elliptic curve cryptography; Wireless networks; Wireless sensor networks; WirelessHART; elliptic curve cryptography; industrial; provision; wireless;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-8727-1
Type :
conf
DOI :
10.1109/CSAE.2011.5952541
Filename :
5952541
Link To Document :
بازگشت