ABSTRACT

This chapter presents a comprehensive state of the art of the network security protocols and standards proposed for industrial wireless sensor networks (IWSNs) that aim at securing the operation of the sensor node, as the central element of a WSN, at different points of its lifecycle. It focuses on authentication, network access control, key management, identity management, and security maintenance mechanisms. The chapter describes the security operations required during the lifecycle of a sensor, and then it provides an example of an industrial WSN: the smart metering approach. Before the application starts running, the first operation performed by the sensor node is an initial authentication to the WSN through a bootstrapping operation. Authentication between the sensor node and the network generally relies on a centralized trusted authority. Keys are required to be established to protect security associations for each communicating node, each group of nodes, and each layer.