ISA TR100 14 01 PART 1-2011 Trustworthiness in Wireless Industrial Automation Part I C Information for End Users and Regulators.pdf

上传人:syndromehi216 文档编号:789945 上传时间:2019-01-31 格式:PDF 页数:40 大小:574.25KB
下载 相关 举报
ISA TR100 14 01 PART 1-2011 Trustworthiness in Wireless Industrial Automation Part I C Information for End Users and Regulators.pdf_第1页
第1页 / 共40页
ISA TR100 14 01 PART 1-2011 Trustworthiness in Wireless Industrial Automation Part I C Information for End Users and Regulators.pdf_第2页
第2页 / 共40页
ISA TR100 14 01 PART 1-2011 Trustworthiness in Wireless Industrial Automation Part I C Information for End Users and Regulators.pdf_第3页
第3页 / 共40页
ISA TR100 14 01 PART 1-2011 Trustworthiness in Wireless Industrial Automation Part I C Information for End Users and Regulators.pdf_第4页
第4页 / 共40页
ISA TR100 14 01 PART 1-2011 Trustworthiness in Wireless Industrial Automation Part I C Information for End Users and Regulators.pdf_第5页
第5页 / 共40页
点击查看更多>>
资源描述

1、 TECHNICAL REPORT ISA-TR100.14.01-2011 Trustworthiness in Wireless Industrial Automation: Part I Information for End Users and Regulators Approved Date 26 May 2011 ISA-TR100.14.01-2011, Trustworthiness in Wireless Industrial Automation: Part I End Users and Regulators ISBN: 978-1-937560-14-0 Copyrig

2、ht 2011 by ISA. Not for resale. Printed in the United States of America. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means (electronic mechanical, photocopying, recording, or otherwise), without the prior written permission of the

3、 Publisher. ISA 67 Alexander Drive P.O. Box 12277 Research Triangle Park, North Carolina 27709 - 3 - ISA-TR100.14.01-2011, Part I Preface This preface, as well as all footnotes and annexes, is included for information purposes and is not part of ISA-TR100.14.01-2011, Part I. This document has been p

4、repared as part of the service of ISA toward a goal of uniformity in the field of instrumentation. To be of real value, this document should not be static but should be subject to periodic review. Toward this end, the Society welcomes all comments and criticisms and asks that they be addressed to th

5、e Secretary, Standards and Practices Board; ISA; 67 Alexander Drive; P. O. Box 12277; Research Triangle Park, NC 27709; Telephone (919) 549-8411; Fax (919) 549-8288; E-mail: standardsisa.org. The ISA Standards and Practices Department is aware of the growing need for attention to the metric system o

6、f units in general, and the International System of Units (SI) in particular, in the preparation of instrumentation standards. The Department is further aware of the benefits to USA users of ISA standards of incorporating suitable references to the SI (and the metric system) in their business and pr

7、ofessional dealings with other countries. Toward this end, this Department will endeavor to introduce SI-acceptable metric units in all new and revised standards, recommended practices, and technical reports to the greatest extent possible. Standard for Use of the International System of Units (SI):

8、 The Modern Metric System, published by the American Society for Testing we clearly understand why you dont trust wireless for your Industrial Automation and Control System (IACS). There have been too many false starts and false claims in the past. The proclamations of ubiquitous sensing havent been

9、 realized. But there is a lot happening in the broader “M2M“ world beyond industrial sensing that lays the groundwork. (See “When Everything Connects,” The Economist, April 28-May 4, 2007.) And does the jungle of wires shown in Figure 1 really seem like the best solution? There is a lot you can do n

10、ow that makes good business sense. So what is preventing you from trusting wireless sensors for your IACS? 1. Reliability: Will the data you need be available when and where you need it? Will the maintenance of the wireless system be higher than the wired alternative? Will the additional capability

11、you get be worth the risk and capital expenditure? You need assurance against unintended consequences as you make the transition. 2. Security: Will your data stay where it belongs? Will your IT department allow wireless in the facility? Will an intruder be able to take control of your processes? 3.

12、Resiliency: When the system is disrupted, how long will it take to restore? Will it restore itself? Will your technicians be able to fix it? Will the system scale to fit your full implementation? Can early indications of an impending disruption be detected in time to compensate, mitigate, or pursue

13、an alternate control strategy? ISA-TR100.14.01-2011, Part I - 8 - These three concerns form the backbone of this document and the core of trustworthiness. We will describe how and why modern wireless IACS can be at least as trustworthy as the wired systems you are used to. We will also describe some

14、 of the ways wireless uniquely enables new capabilities that are not feasible with wires. If you think about wireless only as a one-for-one replacement for wires, you are missing the biggest reason to go wireless. Continue reading and learn how to address your concerns about using wireless sensors.

15、We want your feedback, but most of all we want you to start using wireless sensors. Our purpose is to give you the tools you need to make informed decisions about whether to consider wireless in your industrial automation and control systems (IACS). We will neither tell you which wireless technology

16、 to pursue, nor will we provide detailed trade-offs between alternative technologies. Rather, we will provide some background on the fundamental opportunities and challenges associated with wireless in the industrial environment and, we hope, enough knowledge to allow you to decide whether to push (

17、or to support) your staff in evaluating wireless for particular applications in your organization. We are confident that wireless technology will become common in the IACS environment, but we believe prudence while we build and refine this technology is appropriate. We hope this document will contri

18、bute to your understanding. - 9 - ISA-TR100.14.01-2011, Part I FOREWORD This document is the first of a pair of documents distinguished by the intended audiences. This document, Part I, is written primarily for the end user (owner) and regulator (includes all compliance authorities). A companion doc

19、ument will be written primarily for manufacturers, vendors, designers, integrators, operators, and maintainers. That document, Part II, will contain more technical detail. This page intentionally left blank. - 11 - ISA-TR100.14.01-2011, Part I Table of Contents 1 Scope 13 2 Purpose . 13 3 Terms, def

20、initions, and acronyms . 14 3.1 Terms and definitions 14 3.2 Acronyms 19 4 Introduction 20 4.1 Why is trustworthiness important? . 23 4.2 What is trustworthiness? . 23 4.3 What are the impediments to trusting wireless? 24 4.4 How will you know when you can trust wireless at the same level as wired I

21、ACS? . 24 4.5 What can the end user do to overcome the impediments? 24 4.6 What can the regulator do to overcome the impediments? 25 4.7 Security of wireless transmissions . 25 4.8 Steps to achieving trustworthiness in wireless IACS. 26 5 Attributes of trustworthiness . 27 5.1 Reliability 28 5.2 Sec

22、urity 29 5.3 Resiliency . 31 5.4 Designability . 32 5.5 The role of standards 34 6 Summary and review 36 6.1 The wireless advantage. 36 6.2 The pitfalls of wireless IACS 36 6.3 Trustworthiness in wireless 37 6.4 Wireless through the life cycle . 37 6.5 Next steps. 38 This page intentionally left bla

23、nk. - 13 - ISA-TR100.14.01-2011, Part I Trustworthiness in Wireless Industrial Automation: Part I Information for End Users and Regulators 1 Scope This Part 1 Technical Report, in combination with the forthcoming Part 2, discusses trustworthiness associated with the use of wireless technology in ind

24、ustrial automation systems. Specifically excluded are those attributes that may be in common with wired systems and are therefore covered elsewhere, or attributes that are specific to other application domains such as healthcare applications. Also excluded are those attributes associated with ancill

25、ary issues such as health effects of RF or component materials (such as batteries). For this document, trustworthiness encompasses attributes associated with reliability, security and resiliency. 2 Purpose Trustworthiness in Wireless Industrial Automation is divided into two distinct parts. Part 1 (

26、this document) provides introductory information for the end users and regulators; Part 2 will provide more thorough technical details associated with trustworthy wireless systems. Part 1 provides end users and regulators with information needed to understand the risks and advantages associated with

27、 use of wireless systems. The result should be confident decisions about when and where to use them in order to realize the benefits they offer. It is also intended to provide those in a regulator role with sufficient background information to understand the implications and consequences of rules an

28、d regulations that apply to use of wireless technology in industrial automation applications. The document contains introductory material and information intended to demonstrate to the reader that wireless is a viable solution today. The reader will find embedded in Part 1 a few technical bits of gu

29、idance as an incentive to read Part 2. Part 1 introduces and uses technical terms to describe concepts that are common to many areas of computer technology and applications. The existence of multiple disciplines and communities which have developed their own approaches to deal with technical issues

30、has produced a literature containing many different technical terms with considerable overlap in use and meaning. A set of terms has been adopted for Part 1 for purposes of presenting a consistent point of view. Detailed discussion of the choices of technical language and terminology is being deferr

31、ed to Part 2. ISA-TR100.14.01-2011, Part I - 14 - 3 Terms, definitions, and acronyms 3.1 Terms and definitions 3.1.1 actuator a mechanical device for moving or controlling a mechanism or system and operated by a source of energy, usually in the form of an electric current, hydraulic fluid pressure o

32、r pneumatic pressure, that converts that energy into some kind of motion 1 3.1.2 authentication verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system 2 3.1.3 authorization access privileges that are granted to an entity

33、, conveying an official sanction to perform a function or activity 3 3.1.4 availability the ratio of time a system or component is functional to the total time it is required or expected to function. It can be expressed as a direct proportion, a percentage, or in terms of average downtime per a time

34、 period (week, month, year). Availability is a key attribute supporting the notion of dependability. 4 3.1.5 confidentiality preserving authorized restrictions on information access and disclosure 2 3.1.6 data integrity guarding against improper modification or destruction (of data), and includes en

35、suring information non-repudiation and authenticity 5 3.1.7 dependability likelihood that the service will be available when and where it is needed 6 NOTE Many standards working groups have debated use of this term. Among IEC working groups the term “reliability” is preferred instead. Reliability is

36、 independent of use and has an extrinsic character in contrast to dependability which has an intrinsic character. 3.1.8 designability the characteristic of a component, system or subsystem expressing how effectively it can be deployed, scaled as needed during operation, then finally decommissioned a

37、t its end of life 3 3.1.9 digital signature result of a cryptographic transformation of data that, when properly implemented, provides the services of source authentication; data integrity; - 15 - ISA-TR100.14.01-2011, Part I signer non-repudiation when the cryptographic transformation uses asymmetr

38、ic-key cryptography 3 NOTE In a general information security context, an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchan

39、ged 7 3.1.10 direct-sequence spread spectrum (DSSS) a spread-spectrum method of transmitting signals in which the data signal at the sending station is combined with a higher data rate bit sequence, or chipping code, that divides the user data according to a spreading ratio. The chipping code is a r

40、edundant coding technique that allows the original data to be recovered if damaged during transmission. 8 3.1.11 encryption a process which is applied to data and alters it to make it more difficult to read and/or interpret without knowing how to decode it 8 NOTE In cryptography, encryption is the p

41、rocess of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. 9 3.1.12 end user the person or organization for whom a hardware or software product is designed (

42、used to distinguish from developers, installers, and maintainers) 10 3.1.13 frequency-hopping spread spectrum (FHSS) a spread-spectrum method of transmitting signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver 11

43、3.1.14 hybrid spread spectrum a combination of frequency-hopping spread spectrum and direct-sequence spread spectrum 12 3.1.15 latency delay from when data is created at a data source device to when it is available to be consumed at the destination device 3 NOTE The designated points may be a) physi

44、cal devices, or b) layer boundaries within multi-layer software (e.g., from sending transport to receiving transport functionality, or from sending application to sending modem. 3.1.16 life cycle phases a logical sequence of activities in project management or product development to accomplish a set

45、 of goals or objectives. The number of phases in a sequence depends on the system or activity but contains elements of planning, deployment, operation and maintenance, and disposition. 13 3.1.17 maintainability a characteristic expressed as the probability that an item can be retained in or restored

46、 to a specified condition within a given period of time 14 ISA-TR100.14.01-2011, Part I - 16 - 3.1.18 mesh topology network configuration in which redundant physically-diverse routing paths are available between each pair of network nodes 3 3.1.19 public-key encryption a cryptographic system requiri

47、ng two separate keys, one to lock or encrypt the unencrypted data, and one to unlock or decrypt the encrypted data 15 NOTE Neither key will do both functions. One of these keys is published (or public) and the other is kept private. If the lock/encryption key is the one published then the system ena

48、bles private communication from the public to the unlocking keys owner. If the unlock/decryption key is the one published then the system serves as a signature verifier of documents locked by the owner of the private key. 15 3.1.20 recoverability ability to respond to disruption expressed as the rat

49、io of time interval between failures (a measure of reliability) and the interval of time from the moment of failure to restoration of operations (a measure of maintainability) 8 3.1.21 regulator official, agency or organization that controls a particular activity and makes certain that regulations are complied with 16 3.1.22 reliability probability that a system performs all required functions under stated conditions for a specified period of time 17 3.1.23 resiliency ability of a system to accommodate significant changes in

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1