{"id":77,"date":"2023-01-27T10:25:20","date_gmt":"2023-01-27T17:25:20","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=77"},"modified":"2023-01-28T10:43:49","modified_gmt":"2023-01-28T17:43:49","slug":"a-heart-for-wirelesshart","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2023\/01\/27\/a-heart-for-wirelesshart\/","title":{"rendered":"A heart for WirelessHART"},"content":{"rendered":"\n<p>by Stephen Penner, Ben Etukudoh, Oluchi Henry-Ucheonwu, Julie Stiehl  (edited)<\/p>\n\n\n\n<p><strong>Introduction<\/strong>&nbsp;<\/p>\n\n\n\n<p>This is our first attempt to explore the world of WirelessHART, to have a clearer perspective of what it is and how it works with a focus on data integrity and security. We also examine this protocol with reference to Wi-Fi alliances latest standards for security; WPA3 even with Emerson\u2019s bold statement that WirelessHART is not Wi-Fi. We take a dive into some of the concerns stakeholders have and how the HART foundation has addressed them.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"784\" height=\"432\" data-id=\"91\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/wireless-hart-5.png\" alt=\"\" class=\"wp-image-91 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/wireless-hart-5.png 784w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/wireless-hart-5-300x165.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/wireless-hart-5-768x423.png 768w\" data-sizes=\"(max-width: 784px) 100vw, 784px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 784px; --smush-placeholder-aspect-ratio: 784\/432;\" \/><\/figure>\n<\/figure>\n\n\n\n<p><strong>Highway Addressable Remote Transducer \u2013 Wirelessly&nbsp;<\/strong>&nbsp;<\/p>\n\n\n\n<p>WirelessHART is a wireless field device communication protocol that is part of the Highway Addressable Remote Transducer. It is a wireless mesh network communications protocol for process automation applications. WirelessHART was released in September 2007 as part of the HART 7 Specification. WirelessHART technology was designed to enable secure industrial wireless sensor network communications while ensuring ease-of-use was not compromised. The built-in security cannot be disabled. It uses Advanced Encryption Standard (AES) 128-bit encryption, which is implemented end-to-end. These sessions ensured that messages were enciphered in a way that only the destination could decipher and utilize the payload created by the source device. It adds wireless capabilities to the HART protocol while maintaining compatibility with existing HART devices, commands, and tools.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"619\" height=\"457\" data-id=\"85\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/wireless-hart-1-1.png\" alt=\"\" class=\"wp-image-85 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/wireless-hart-1-1.png 619w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/wireless-hart-1-1-300x221.png 300w\" data-sizes=\"(max-width: 619px) 100vw, 619px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 619px; --smush-placeholder-aspect-ratio: 619\/457;\" \/><\/figure>\n<\/figure>\n\n\n\n<p>WirelessHART\u2019s security architecture helps owners and operators address all three of these areas: [3]&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It minimizes, controls, and audits user\u2019s access.&nbsp;<\/li>\n\n\n\n<li>Requires high levels of technical expertise to sabotage, which removes complexities.&nbsp;<\/li>\n\n\n\n<li>Reduces infiltration span and duration of any individual breach because it uses a mesh network.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Each WirelessHART network includes three main elements:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Wireless field devices connected to process or plant equipment.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Gateways that enable communication between these devices and host applications connected to a high-speed backbone or other existing plant communications network.&nbsp;<\/li>\n\n\n\n<li>A network manager responsible for:&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configuring the network.&nbsp;<\/li>\n\n\n\n<li>Managing message routes.&nbsp;<\/li>\n\n\n\n<li>Monitoring network health.&nbsp;<\/li>\n\n\n\n<li>Scheduling communications between devices.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The network uses the IEEE 802.15.4 radio operating at 2.4 GHz. The radios employ direct-sequence spread spectrum (DSSS) technology and channel hoping for communication security and reliability, and time division multiple access (TDMA) to ensure latency-controlled communications between devices on the network.&nbsp;<\/p>\n\n\n\n<p><strong>Major security features of the WirelessHART protocol are: <\/strong>[4]&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Radio security features.&nbsp;<\/li>\n\n\n\n<li>Multiple encryption keys.&nbsp;<\/li>\n\n\n\n<li>Multi-path mesh networking.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Protection against non-repudiation.&nbsp;<\/li>\n\n\n\n<li>Protection against denial of service.&nbsp;<\/li>\n\n\n\n<li>Secure join process with all devices authenticated.&nbsp;<\/li>\n\n\n\n<li>128-bit message encryption to protect against eavesdropping.&nbsp;<\/li>\n\n\n\n<li>Data confidentiality is maintained as it is routed around the network using keys.&nbsp;<\/li>\n\n\n\n<li>Protections against replaying man-in-the-middle, sink hole, and other attacks.&nbsp;<\/li>\n\n\n\n<li>Verifications that messages have not been tampered with by using integrity codes.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The WirelessHART protocol has been specifically designed to provide the highest level of data security to industrial process automation applications. Combining the designed-in security features of WirelessHART with both operational technology (OT) and information technology (IT), network best practices will produce a high-performance wireless field device network that maximizes data availability, confidentiality, and integrity while dependably delivering industrial process data.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"567\" height=\"424\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/wireless-hart-2.png\" alt=\"\" class=\"wp-image-86 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/wireless-hart-2.png 567w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/wireless-hart-2-300x224.png 300w\" data-sizes=\"(max-width: 567px) 100vw, 567px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 567px; --smush-placeholder-aspect-ratio: 567\/424;\" \/><\/figure>\n\n\n\n<p><strong>WPA3 \u2013 an Alternative to WirelessHART<\/strong>&nbsp;<\/p>\n\n\n\n<p>WPA, or Wi-Fi Protected Access, was a work in progress over many years and is now on its 3<sup>rd<\/sup> iteration. Since the dawn of commercial Wi-Fi, the Wi-Fi Alliance has struggled to keep up with the evolving attacks on WEP and WPA. When the first Wired Equivalent Privacy (WEP) standard was released in 1997, with only a 64-bit key, its longevity as a secure protocol was already off to a rocky start and its encryption was quickly broken.[1] The stop gap measure of WPA helped to solve the issue but was replaced with the now dominate standard of WPA2 and was secure until 2018 when the new standard WPA3 was made mandatory for all new Wi-Fi devices. [1]&nbsp;<\/p>\n\n\n\n<p>WPA3: The following is a brief list of improvements on WPA2. [2]&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Increased key size to 192-bits.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Stronger encryption standards.&nbsp;<\/li>\n\n\n\n<li>Secure easy onboarding of IOT or screenless devices.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Bug fix for offline password attacks that broke WPA2.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Support for encrypted open networks with Opportunistic Wireless Encryption (OWE).&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Major security features of the wireless WPA3 protocol. [2]&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>256-bit to 384-bit message encryption using AES.&nbsp;<\/li>\n\n\n\n<li>128-bit to 265-bit frame protection for broadcast\/multicast traffic.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Uses Simultaneous Authentication of Equals (SAE) to store password hash.&nbsp;<\/li>\n\n\n\n<li>Forward Security allows the protection of data even if the password is compromised.&nbsp;<\/li>\n\n\n\n<li>Using unique encryption keys for each device.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>WPA3 specifications may seem like it is stepping in the right direction to get ahead of the curve for data security. However, they have already suffered setbacks due to side-channel attacks, downgrade attacks, denial of service attacks, and the aptly named Dragon&#8217;s Blood Attacks that include a suite of all the previously mentioned attacks. While some devices were fixed with vendor patches, the biggest flaw with WPA3 is the mass of non-upgradable WPA2 devices in the wild. [1] Since WPA2 had a 14-year reign as the leading protocol, billions of devices lack support for the WPA3 standard and are now left vulnerable.&nbsp;<\/p>\n\n\n\n<p><strong>Comparing WPA3 vs WirelessHART<\/strong>\u00a0<\/p>\n\n\n\n<p>Since early 2015 the FieldComm Group has been working with leading process end users, manufacturers, universities and research organizations to direct the development, incorporation, implementation and set the standard for communication technologies such as HART and Foundation Fieldbus for the process industries.<\/p>\n\n\n\n<p>The security standard for Wi-Fi products and implementation building on the IEEE 802.11 architecture is set by Wi-Fi Alliance\u00ae, a worldwide network of companies that lead and develop industry-agreed standards for Wi-Fi\u00ae.<\/p>\n\n\n\n<p>For starters, WirelessHART operates with an 802.15.4 radio while Wi-Fi uses an 802.11 radio. The 802.15.4 architecture supports low power short range wireless implementation, while the 802.11 supports wider range wireless solutions.<\/p>\n\n\n\n<p>&nbsp;The WirelessHART uses enterprise WPA2 with Extensible Authentication Protocols to authenticate users. Whereas WPA3 uses Simultaneous Authentication of Equals (SAE) to provide stronger defenses against password guessing. SAE is a well-known secure key establishment protocol.<\/p>\n\n\n\n<p>The encryption algorithm used in WirelssHART is AES with a 128-bit key length (16-bytes). The AES algorithm encrypts information and validates the data sent. This concept is called Data Integrity and is achieved using a Message Integrity Code (MIC), also named Message Authentication Code (MAC), that is appended to the message. This code ensures integrity of the MAC header and payload data attached. It is created encrypting parts of the IEEE MAC frame using the key to the network, so if we receive a message from a non-trusted node, we will see that the MAC generated for the sent message does not correspond to the one that would be generated using the message with the current secret key, so we can discard this message. The MAC has a length of 128-bits; however, it is always created using the 128-bit AES algorithm. Its size is just the bits length which is attached to each frame. The larger the more secure it is, although the message can take less payload. Data Security is performed encrypting the data payload field with the 128-bit key. Whereas the WPA3 Standard allows for up to 192-bit cryptographic strength (AES-256 in GCM mode with SHA-384 as HMAC) preventing unauthorized eavesdropping or data manipulation of any of the communications.<\/p>\n\n\n\n<p>WirelessHART is a low-power wireless protocol used to transmit relatively small amounts of data while Wi-Fi can be used to transfer large amounts of data, including video streams and large file transfers. Another major area where WirelessHART differs from Wi-Fi is the fact that the security mechanisms cannot be disabled in WirelessHART. In Wi-Fi, although not advised, a user could disable security features and operate without any encryption or authentication whatsoever.<\/p>\n\n\n\n<p><strong>Concerns<\/strong><\/p>\n\n\n\n<p>According to the technical note 00840-0300-6129, Rev AA published by Emerson in October 2017, to clear the air on the WPA2 vulnerability. Emerson tried to differentiate the WirelessHART from the Wi-Fi in its defense mechanism for WPA2 vulnerability to Key Reinstallation Attack (KRAK) which are Wi-Fi vulnerabilities discovered by two Belgian researchers. This vulnerability abuses design or implementation flaws in WPA2 cryptographic scheme which is also used by HART to reinstall an already-in-use or predictable key. Depending on the specific vulnerabilities that are exploited, an attacker can decrypt network information allowing the attacker to read contents of messages, inject malicious content, pose as a legitimate access point, or perform other nefarious activities. [5].<\/p>\n\n\n\n<p>In defense, Emerson also encourages a good patch and update management program for end-users. The provided patches prevent key reuse and will be backwards-compatible. This means patched clients can communicate with unpatched access points and vice-versa, however both the client and access points have to be patched to prevent against the attacks.<\/p>\n\n\n\n<p>Emerson has also advised the use of other encrypted protocols, such as Hyper Text Transfer Protocol Secure (HTTPS), as an added layer of protection. HTTPS was designed to work over an untrusted channel with no encryption and should be used when possible. Also, using a Virtual Private Network (VPN) can offer additional protection against these attacks. Finally, using a wired connection for sensitive traffic eliminates these concerns.<\/p>\n\n\n\n<p><strong>Conclusion and Recommendation<\/strong><\/p>\n\n\n\n<p>Our research is currently ongoing. We will present our conclusion and recommendations in a final presentation.<\/p>\n\n\n\n<p><strong>References<\/strong>&nbsp;<\/p>\n\n\n\n<p>1. Sagers, G. (2021). Wpa3: The greatest security protocol that may never be. 2021 International Conference on Computational Science and Computational Intelligence (CSCI), 1360\u20131364. <a href=\"https:\/\/doi.org\/10.1109\/CSCI54926.2021.00273\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.1109\/CSCI54926.2021.00273<\/a>&nbsp;<\/p>\n\n\n\n<p><em>2. Fi Alliance File Download<\/em>. Wi. (n.d.). Retrieved January 25, 2023, from <a href=\"https:\/\/www.wi-fi.org\/downloads-public\/WPA3%2BSpecification%2Bv3.1.pdf\/35332\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.wi-fi.org\/downloads-public\/WPA3%2BSpecification%2Bv3.1.pdf\/35332<\/a>&nbsp;<\/p>\n\n\n\n<p>3.<em> Wirelesshart Security Overview &#8211; Emerson Electric<\/em>. (n.d.). Retrieved January 26, 2023, from <a href=\"https:\/\/www.emerson.com\/documents\/automation\/white-paper-wirelesshart-security-overview-by-hcf-en-42578.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.emerson.com\/documents\/automation\/white-paper-wirelesshart-security-overview-by-hcf-en-42578.pdf<\/a>&nbsp;<\/p>\n\n\n\n<p><em>4. Wirelesshart unaffected by recent WPA2 vulnerabilities &#8211; emerson<\/em>. (n.d.). Retrieved January 27, 2023, from <a rel=\"noreferrer noopener\" href=\"https:\/\/www.emerson.com\/documents\/automation\/security-notification-wirelesshart-unaffected-by-recent-wpa2-vulnerabilities-techical-note-en-1730306.pdf\" target=\"_blank\">https:\/\/www.emerson.com\/documents\/automation\/security-notification-wirelesshart-unaffected-by-recent-wpa2-vulnerabilities-techical-note-en-1730306.pdf<\/a>\u00a0<\/p>\n\n\n\n<p>5. <em>Wirelesshart unaffected by recent WPA2 vulnerabilities &#8211; emerson<\/em>. (n.d.). Retrieved January 28, 2023, from <a href=\"https:\/\/www.emerson.com\/documents\/automation\/security-notification-wirelesshart-unaffected-by-recent-wpa2-vulnerabilities-techical-note-en-1730306.pdf\">https:\/\/www.emerson.com\/documents\/automation\/security-notification-wirelesshart-unaffected-by-recent-wpa2-vulnerabilities-techical-note-en-1730306.pdf<\/a> \u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Stephen Penner, Ben Etukudoh, Oluchi Henry-Ucheonwu, Julie Stiehl (edited) Introduction&nbsp; This is our first attempt to explore the world of WirelessHART, to have a clearer perspective of what it is and how it works with a focus on data integrity and security. We also examine this protocol with reference to Wi-Fi alliances latest standards &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2023\/01\/27\/a-heart-for-wirelesshart\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;A heart for WirelessHART&#8221;<\/span><\/a><\/p>\n","protected":false},"author":576,"featured_media":99,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-77","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","entry"],"featured_image_src":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/wireless-hart-4-half-size-600x190.png","featured_image_src_square":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2023\/01\/wireless-hart-4-half-size-600x190.png","author_info":{"display_name":"Julie Stiehl","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/julie-stiehl\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/77","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/576"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=77"}],"version-history":[{"count":15,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/77\/revisions"}],"predecessor-version":[{"id":155,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/77\/revisions\/155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media\/99"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=77"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=77"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=77"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}