Category Archives: Security:

The “Key” to WirelessHART

When a new device wants to join a WirelessHART network, it begins by listening. It listens for advertisements to join the network broadcast by devices already in the network. These broadcasts contain the channel map identifying channels used by the … Continue reading

Posted in Security:, WirelessHART Blog | Leave a comment

Keeping WirelessHART conversations private

We join our gallant hero, W. L. Hart, as he enters the high-tech den of thieves run by The Manager. As the door opened, Hart found himself confronted by a beautiful brunette with long hair and a short dress. “The … Continue reading

Posted in Security:, WirelessHART Blog | Comments Off

Leaving a WirelessHART network

“The name is Hart, W. L. Hart. I have to get out of here. How do I do it?” Our adventurous hero was addressing the ally he had found in this high tech den of thieves. She was blonde, tall, … Continue reading

Posted in Security:, WirelessHART Blog | Leave a comment

Neighbor Discovery in WirelessHART

When devices want to join a WirelessHART network, they begin by listening for advertisements to join the network. Since the protocol utilizes channel hopping, the device while spend some time listening on each of the various channels. With an advertisement … Continue reading

Posted in Security:, WirelessHART Blog | Leave a comment

How WirelessHART handles path failure?

The WirelessHART protocol provides redundancy to secure against path failure. A device forwards a message according to the two-byte graph ID embedded in the message. The graphs are created by the network manager and stored in each device. Graph routing … Continue reading

Posted in Security:, WirelessHART Blog | Leave a comment

Maintaining security by changing network keys in WirelessHART

Security is built in to all WirelessHART transmissions. All data is encrypted at both the data link layer and the transport layer. Using 126-bit AES encryption at multiple layers and routinely changing the keys makes a WirelessHART network a tough … Continue reading

Posted in Security:, WirelessHART Blog | Leave a comment