Integration with Process Automation

Wireless Field Network Security

Emerson’s Smart Wireless Field Network solution offers robust, multi-tiered, always-on security through advanced standards-based encryption as well as authentication, verification, key management, and anti-jamming techniques.

Smart Wireless solutions employ end-to-end 128-bit encryption using the Advanced Encryption Standard (NIST standard FIPS-197). For authentication purposes, each gateway maintains a “whitelist” of devices allowed to communicate with it, and individual devices accept messages only from a previously identified gateway or from other gateway-validated devices.

Separate Join and Network keys can be set to automatically rotate or be changed on demand. Implementation of the WirelessHART standard will add session keys for communication between two network devices so that other devices can’t “listen in.” These can be rotated as well.

Message Integrity Codes are used to verify messages, both per-hop and end-to-end. Anti-jamming techniques such as Direct Sequence Spread Spectrum (DSSS) with channel hopping plus multi-path routing help sidestep noise sources, whether malicious or not. Additionally, gateway-to-host security leverages well-known standards such as SSL as well as complete encryption/authentication.

Wireless Plant Network Security

Emerson offers powerful and comprehensive secure solutions to enable confidential communications, policy controls, and threat defense capabilities to protect information and systems from wireless attacks.

All wireless communications – from the client device to the mesh access points and between mesh access points back to the wired network – are encrypted using the WPA2 and AES standards. Additionally, the wireless network utilizes 802.11i/ WPA2, 802.1x, and EAP standards to ensure only authorized users have access. Emerson can additionally deploy a Wireless Intrusion Prevention System to provide “Defense in Depth” for your wireless network.

Within the wireless network, Cisco provides multiple additional layers of protection, including:

  • RF security
  • WLAN intrusion prevention and location
  • Network Access Control (NAC)
  • Secure mobility
  • Encryption
  • Data integrity
  • Segmentation
  • Layer 2 security: 802.1X (PEAP, LEAP, TTLS), WPA, 802.11i (WPA2), 802.11w
  • Layer 3 (and above) security: Integration with wired intrusion prevention systems (IPSs)
  • Access control lists