ABSTRACT

Wireless networks are an essential pillar in the transformation to Industry 4.0, providing profitability and sustainability to businesses. Wireless communication is not linked by a physical propagation medium, but is achieved through the electromagnetic spectrum where specific waves transmit the data intact and precisely with integrity. Networks are susceptible to being manipulated remotely. Security is of high importance, but it is an arduous process to carry out methods that provide the proper security. Various methods that are still in an initial stage provide results that are encouraging with regard to the protection of the information in the sensor nodes to guarantee confidentiality, integrity, authentication, and availability (CIAA). These primary security objectives are detailed in this chapter, followed by the secondary security objectives, such as data freshness, traceability, and secure location. On the other hand, the chapter specifies different types of network attacks, which could be internal or external according to the node performance and manipulation, or depending on the data stream and monitoring agents. Additionally, attacks based on the protocol stack are explained, for instance, malicious influence in the physical layer or link layer through denial of protocols or inefficiency of energy consumption; in the network layer depending on routing and data forwarding functions; and in the transport and application layer. In addition, monitoring systems in indoor and outdoor environments, and in fields like agriculture and health, are complemented by security mechanisms for sensor networks and wireless security protocols to defend against attacks on TCP/IP networks. Lastly, network security for the incorruptibility of the data transferred between the different layers of the TCP/IP model is discussed, like VPN and firewalls to control the network traffic. Better security techniques, privacy, power, computing capacity, and scalability are needed. We must seek to increase the capacity of nodes to properly protect their physical components, channels, and software through stable solutions with resource optimization.