3 - Unit 3 - Study Material - Wireless HART Communication Protocol Overview
3 - Unit 3 - Study Material - Wireless HART Communication Protocol Overview
Protocol Overview
As the need for additional process measurements increases, users seek
a simple, reliable, secure and cost-effective method to deliver new
measurement values to control systems without the need to run more
wires. With process improvements, plant expansions, regulatory
requirements and safety levels demands for additional measurements,
users are looking to wireless technology for that solution.
Wireless HART
Backed by the Power of HART
1. Simple
WirelessHART is a robust technology that is simple to implement. It
enables users to quickly and easily gain the benefits of wireless
technology while maintaining compatibility with existing HART
devices, tools and systems.
Channel hopping
Adjustable transmit power
levels
Multiple levels of security keys for access
Indication of failed access attempts
Reports message integrity failures
Reports authentication failures
Safe from Wi-Fi type Internet attacks
WirelessHART – How it works
WirelessHART is a wireless mesh network communications protocol for
process automation applications. It adds wireless capabilities to the
HART Protocol while maintaining compatibility with existing HART
devices, commands, and tools.
Each device in the mesh network can serve as a router for messages
from other devices. In other words, a device doesn’t have to
communicate directly to a gateway, but just forward its message to
the next closest device. This extends the range of the network and
provides redundant communication routes to increase reliability.
The mesh design also makes adding or moving devices easy. As long
as a device is within range of others in the network, it can
communicate.
A Handheld Terminal may come in two versions. In the first case, the
handheld will be a standard HART FSK configuration unit (just add new
device DDs or DOF files), just like the one used for everyday tasks such
as routine maintenance and calibration checks. In the case of wireless
support, the handheld is used to join a new instrument to an
existing WirelessHART network.
WirelessHART Security
WirelessHART employs robust Security measures to protect the
network and secure the data at all times. These measures include the
latest security techniques to provide the highest levels of protection
available.
This means that no one can spy on your plant operations or inject “bad”
or misleading process information.
to confirm that the contents of the packet have not been altered.
This Field protects the network routing information preventing
attacks that attempt to change the packet’s network/transport
layer information.
Data Integrity also involves verifying that the packet has come from
the correct source. The network/transport layer message integrity
check field, the information used to generate the check field, and the
sender/receiver unique session key that codes and decodes the data
are tools that can be used to verify the source.
Network Security
A wireless sensor network also needs tools to protect it against
attacks. These attacks can attempt to compromise the network by
inserting Trojan horse devices, impersonating networks to get
sensitive data from legitimate devices, and disrupting the network to
deny service. Attacks can be launched from outside or inside the
company by external people or employees.