Cyber‐Physical Vulnerabilities of Wireless Sensor Networks in the Oil and Gas Industry: A Literature Review

محفوظ في:
التفاصيل البيبلوغرافية
الحاوية / القاعدة:The Journal of Engineering vol. 2025, no. 1 (Jan/Dec 2025)
المؤلف الرئيسي: Sayghe, Ali
منشور في:
John Wiley & Sons, Inc.
الموضوعات:
الوصول للمادة أونلاين:Citation/Abstract
Full Text
Full Text - PDF
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!

MARC

LEADER 00000nab a2200000uu 4500
001 3272253838
003 UK-CbPIL
022 |a 2051-3305 
024 7 |a 10.1049/tje2.70142  |2 doi 
035 |a 3272253838 
045 2 |b d20250101  |b d20251231 
100 1 |a Sayghe, Ali  |u Department of Electrical Engineering, Yanbu Industrial College, Yanbu, Saudi Arabia 
245 1 |a Cyber‐Physical Vulnerabilities of Wireless Sensor Networks in the Oil and Gas Industry: A Literature Review 
260 |b John Wiley & Sons, Inc.  |c Jan/Dec 2025 
513 |a Journal Article 
520 3 |a ABSTRACT Wireless sensor networks (WSNs) drive modern oil and gas industry operations through their ability to monitor environments as well as inspect equipment in real‐time and track leaks. WSNs provide their users with considerable cost benefits and operational flexibility together with excellent scalability capabilities. WSNs' wireless setup combined with their operation in distant hostile territories creates fundamental exposure to multiple cybersecurity dangers and physical threats in the environment. This review investigates all critical security risks facing WSN networks as they operate within the petroleum industry. The paper examines primary strike methods while discussing both malicious software insertions and destructive infrastructure tampering activities. The analysis connects each threat to its potential impact on data integrity, system availability, and operational safety. This analysis shows how these weaknesses can harm important oil and gas facilities by leading to issues like leaks, wrong incident reports, shutdowns, and bad decisions due to incorrect sensor data. The review examines advanced cybersecurity measures including lightweight encryption protocols, intrusion detection systems, and compliance with ISA/IEC 62443 and NIST SP 800‐82 standards. Among identified threats, data integrity attacks through spoofing and packet injection, and denial‐of‐service attacks pose the highest priority risks to operational safety, potentially causing delayed emergency responses and disabled safety monitoring systems. The paper also addresses practical implementation challenges including resource constraints of battery‐powered nodes and legacy system integration barriers. 
651 4 |a United States--US 
653 |a Data integrity 
653 |a Refineries 
653 |a Control algorithms 
653 |a Spoofing 
653 |a Infrastructure 
653 |a Energy industry 
653 |a Communication 
653 |a Malware 
653 |a Sensors 
653 |a Wireless sensor networks 
653 |a Leaks 
653 |a Controllers 
653 |a Emergency response 
653 |a Distributed control systems 
653 |a Gas leaks 
653 |a Automation 
653 |a Integrity 
653 |a Cybersecurity 
653 |a Security systems 
653 |a Ransomware 
653 |a Pipelines 
653 |a Intrusion detection systems 
653 |a Literature reviews 
773 0 |t The Journal of Engineering  |g vol. 2025, no. 1 (Jan/Dec 2025) 
786 0 |d ProQuest  |t Advanced Technologies & Aerospace Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3272253838/abstract/embedded/BH75TPHOCCPB476R?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3272253838/fulltext/embedded/BH75TPHOCCPB476R?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3272253838/fulltextPDF/embedded/BH75TPHOCCPB476R?source=fedsrch