Denial of Service Attacks on ICS Wireless Protocols

Stage 2

This session will detail an attack that can cause a denial of service condition in ICS wireless networks. Vendors selling ICS wireless solutions, such as WirelessHART and ISA100, are promoting their suitability for use in control and even safety applications because they have encryption and authentication. This addresses confidentiality and integrity, but not availability. And wireless introduces the potential to create a denial of service attack from a distance, even outside the physical security perimeter.

How easy or difficult it is to jam ISA100 and WirelessHART is an open issue that is still lacking credible data (and would make a great S4 session). This attack highlights the need to consider what control and safety are appropriate to send over a ICS wireless network. The attack only requires the ability to successfully transmit and to parts of the ICS wireless network, not jamming.

Attacks and Attackers Protocols