{"id":10080489,"date":"2020-11-12T20:15:28","date_gmt":"2020-11-13T01:15:28","guid":{"rendered":"https:\/\/www.erbessd-instruments.com\/?p=10080489"},"modified":"2025-06-17T11:44:03","modified_gmt":"2025-06-17T16:44:03","slug":"the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security","status":"publish","type":"post","link":"https:\/\/www.erbessd-instruments.com\/de\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/","title":{"rendered":"The Reliability Engineer\u2019s Guide to Understanding Wireless &#038; Network Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10080489\" class=\"elementor elementor-10080489\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-ddafe46 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ddafe46\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-479164a\" data-id=\"479164a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a4c466 elementor-widget elementor-widget-heading\" data-id=\"3a4c466\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-xl\">The Reliability Engineer\u2019s Guide to Understanding IIoT Devices, LAN, and WAN Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-8c57b4f elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"8c57b4f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61bcb73\" data-id=\"61bcb73\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-2c663a9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2c663a9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4271614\" data-id=\"4271614\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-845231a elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"845231a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h1&quot;,&quot;h2&quot;,&quot;h3&quot;],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__845231a\" aria-expanded=\"true\" aria-label=\"Inhaltsverzeichnis \u00f6ffnen\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__845231a\" aria-expanded=\"true\" aria-label=\"Inhaltsverzeichnis schlie\u00dfen\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__845231a\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<svg class=\"elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading\" aria-hidden=\"true\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a38d399\" data-id=\"a38d399\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4aca594 elementor-widget elementor-widget-image\" data-id=\"4aca594\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"624\" height=\"279\" src=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/phantom.jpg\" class=\"attachment-full size-full wp-image-10086407\" alt=\"EI-Phantom\" srcset=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/phantom.jpg 624w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/phantom-300x134.jpg 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-fe28cb8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fe28cb8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a3c2447\" data-id=\"a3c2447\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8ae117a elementor-widget elementor-widget-text-editor\" data-id=\"8ae117a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As wireless sensor technology begins to take the leading edge within the industrial Internet of Things community, a new era of data security has emerged that requires diligent thought and consideration on the part of end users, system integrators, and key stakeholders.<\/p><p><strong>Critical machine health and process data<\/strong>\u00a0being transmitted wirelessly and hosted internally as well as externally creates an entirely new series of security concerns that must clearly be understood to maximize the value of the technology.<\/p><p>This presentation will focus on the key security tools available to end users to ensure the security of their data when deploying wireless sensor networks and hosting data internally as well as externally to their organizations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-f4dfb7b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f4dfb7b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-464ba27\" data-id=\"464ba27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0fd03cb elementor-widget-divider--view-line_text elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"0fd03cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<h2 class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t<b>What is Bluetooth?<\/b>\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0323116 elementor-widget elementor-widget-text-editor\" data-id=\"0323116\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\">\u00a0<\/div><\/div><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>Bluetooth allows computers talk to each other seamlessly (Svetlik, 2018), which according to Wikipedia (2020), \u00a0is a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wireless\">wireless<\/a>\u00a0technology standard used for exchanging data between fixed and mobile devices over short distances, using\u00a0the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Ultra_high_frequency\">UHF<\/a>\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Radio_wave\">radio waves<\/a>\u00a0in the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/ISM_band\">industrial, scientific and medical radio bands<\/a>,\u00a0from 2.402 GHz to 2.480\u00a0GHz, and in building\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Personal_area_network\">personal area networks<\/a> (PANs). It is commonly found in smart phones, smart watches, wireless headphones, wireless speakers, etc. It is a primary mode of communication in smart homes and for Internet of Things (IoT) technology.<\/p><p>Bluetooth 5.0 is the latest version of the Bluetooth wireless communication standard (Hoffman, 2018) and thus serves as a common communication feature for the latest smart phones, smart gadgets and industrial IoT (IIoT) devices. Bluetooth technology is in itself backward compatible, where older versions and devices can still function\/communicate with a device having the latest version enabled. Thus the overall advantage to be gleaned from using the latest version (Bluetooth 5.0) cannot be enjoyed without compatible peripherals.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-3a1c7af elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3a1c7af\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d2e0cdd\" data-id=\"d2e0cdd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34d053b elementor-widget elementor-widget-image\" data-id=\"34d053b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"624\" height=\"182\" src=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/Bluetoothwhatis.png\" class=\"attachment-large size-large wp-image-10086399\" alt=\"whatisbluetooth\" srcset=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/Bluetoothwhatis.png 624w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/Bluetoothwhatis-300x88.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-23b9087 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"23b9087\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7c32435\" data-id=\"7c32435\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62a57e7 elementor-widget elementor-widget-text-editor\" data-id=\"62a57e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>Fig. 1 depicts a comparison amongst the various versions of Bluetooth, where there are clear improvements in latency of less than 3 ms compared to the 6 ms in Bluetooth 4.X and 100 ms in the Bluetooth classic, an increase in maximum distance\/range of up to 200 meters, compared to 100 meters in both Bluetooth 4.X and Bluetooth classic respectively. A majority of the improvements to Bluetooth technology has been in the Bluetooth low energy specification. Where, Bluetooth 5.0 enables all audio devices connected to it to communicate over Bluetooth low energy rather than over the power hungry Bluetooth classic standard, thus reducing power usage and the resultant longer battery life. Other related benefits to Bluetooth 5.0 includes, the dual audio feature, which allows users to play audio on two connected devices at the same time, data transfer speeds of up to 2 Mbps, eight times the broadcast message capacity of older versions of Bluetooth.<\/p><p><strong>Wireless sensor networks<\/strong> are interconnected sensor nodes which communicate wirelessly to collect data about its environment (Harsh Kupwade &amp; Thomas, 2017). The Core of an IIoT implementation are wireless nodes. \u00a0Where these nodes are generally low power, and distributed in an ad hoc decentralized fashion. Security is a major challenge for IIoT networks, owed to the number of \u201cthings\u201d and the openness of the system. Security concerns include but are not limited to issues such as privacy, authentication, and access control.<\/p><\/div><\/div><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><h3><span id=\"ERBESSD_INSTRUMENTS_PHANTOM_WIRELESS_MACHINE_SURVIELLANCE\" class=\"ez-toc-section\"><\/span><strong>ERBESSD INSTRUMENTS PHANTOM WIRELESS MACHINE SURVIELLANCE<\/strong><\/h3><\/div><\/div><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>According to ERBESSD INSTRUMENTS (2020), the Phantom is an advanced, highly flexible solution for increasingly demanding ultra low power, secure, ultra long range, and higher throughput applications in the IIoT world.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-f37f77d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f37f77d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c9b76cb\" data-id=\"c9b76cb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71188c9 elementor-widget elementor-widget-image\" data-id=\"71188c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"624\" height=\"279\" src=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/phantom.jpg\" class=\"attachment-large size-large wp-image-10086407\" alt=\"EI-Phantom\" srcset=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/phantom.jpg 624w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/phantom-300x134.jpg 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-c8eaca4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c8eaca4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e973f9d\" data-id=\"e973f9d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-00a5524 elementor-widget elementor-widget-text-editor\" data-id=\"00a5524\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phantom has an embedded cryptographic accelerator for providing high grade security specifications. Specific features of the\u00a0<strong>Phantom<\/strong> and its sister modules\u00a0 relates to data rates (2 Mbps, 1 Mbps, 500 Kbps, 125 Kbps), memory (1 MB of flash memory, 256 KB RAM), 48GPIO pins, 1.7V to 3.6V DC supply, 255 broadcasting message length , forward error correction (FEC) coding using Bluetooth SIG CORE_v5.0 LE CODED PHY, range of 650 meters using the PCB trace antenna, a high voltage power supply to accept up to 5.5V DC for direct connection to a lithium battery or a 5V power source, an embedded CryptoCell 310 co-processor to provide a more secure connection and to prevent hackers.<\/p><p>The\u00a0<strong>Phantom<\/strong> most importantly offers a cost effective solution for IIoT product implementations at different ranges with its low price. No change is required on the main board hardware for any implementation, thus ensuring that it is modular in design and implementation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-e66861d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e66861d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-772bffd\" data-id=\"772bffd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d6a9708 elementor-widget elementor-widget-text-editor\" data-id=\"d6a9708\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><h3><strong>SECURITY ELEMENTS AND CONSIDERATIONS OF BLUETOOTH 5<\/strong><\/h3><\/div><\/div><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>According to the report by ERBESSD INSTRUMENTS (2020), the vulnerabilities facing BLE 5.0 are deemed very high and more so due to the various benefits and capabilities of Bluetooth 5.0 technology, which has made it a primary communication medium of choice for connected devices, as opposed to Wi-Fi.\u00a0 The increased bandwidth and connection distance has been a source of vulnerability, because attackers can access Bluetooth connections from a long distance away, and with fast data transfer speed, can wreak havoc without notice. According to NIST report, (NIST, 2012) common areas of vulnerabilities in traditional Bluetooth 5.0 are as follows:<\/p><ul><li>Lack of end to end security<\/li><li>No user authentication<\/li><li>Insecure storage of link keys<\/li><li>Discoverable devices<\/li><\/ul><p>The lack of end to end security is a major vulnerability of the traditional BLE system. The current system implements individual link encryption, with message decryption at intermediate points on the communication link that could lead to an intermediary attack (MITM). Also, the absence of application and user level authentication as a default in the Bluetooth specification is also an area of vulnerability, as the currently offered device level authentication isn\u2019t sufficient nor impervious to malicious attacks. The possibility of data corruption during improper synchronization and potential for loss of data stored on an IIoT device if stolen are both very critical.<\/p><p>Man in the middle (MITM) attacks can be mitigated by the deployment of user input passkeys, although passkey linking isn\u2019t applicable for applications without a keypad or a display. Passkeys are also not well suited for passive eavesdropping attacks. Passive eavesdropping attacks are attacks which are a little different from man in middle attacks, in that the eavesdropper doesn\u2019t intend to change or impersonate data; rather they sits idly, while gathering information. ERBESSD INSTRUMENTS (2020) surmises that at least 80% of all Bluetooth enabled smart devices are vulnerable to man in the middle attacks (MITM).<\/p><p>Data transmission over the Bluetooth 5.0 uses AES-CCM encryption, where this encryption takes place in the Bluetooth controller. Bluetooth low energy encryption security modes are of two types; namely the LE security mode 1 and the LE security mode 2 as shown in Fig. 3.<\/p><p>LE security mode 1 has four security levels, namely the no security (no authentication, no encryption mode), the unauthenticated paired with encryption, the authenticated paired with encryption, and lastly the authenticated LE secure connection paired with encryption using a 128-bit strength encryption key. Each security level satisfies the requirements for the level below it.<\/p><p>LE security modes and their associated characteristics are depicted in Fig. 4.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-8e132f3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8e132f3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f49052a\" data-id=\"f49052a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca56036 elementor-widget elementor-widget-image\" data-id=\"ca56036\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"156\" src=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/phantomsecure.jpg\" class=\"attachment-large size-large wp-image-10086432\" alt=\"\" srcset=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/phantomsecure.jpg 624w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/phantomsecure-300x75.jpg 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-f514bf5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f514bf5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-493878c\" data-id=\"493878c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a837b42 elementor-widget elementor-widget-text-editor\" data-id=\"a837b42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Figure 3<\/strong>: LE Security mode (INSTRUMENTS, 2020)<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-07eff1a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"07eff1a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f05b598\" data-id=\"f05b598\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6eaae13 elementor-widget elementor-widget-image\" data-id=\"6eaae13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"267\" src=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/modesandmeasure.jpg\" class=\"attachment-large size-large wp-image-10086444\" alt=\"\" srcset=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/modesandmeasure.jpg 450w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/modesandmeasure-300x178.jpg 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-56f0c6f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56f0c6f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-41dbd47\" data-id=\"41dbd47\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ced373b elementor-widget elementor-widget-text-editor\" data-id=\"ced373b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Figure 4<\/strong>: Security Modes and Levels<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-8669361 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8669361\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1d000ca\" data-id=\"1d000ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-11120f1 elementor-widget elementor-widget-text-editor\" data-id=\"11120f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div><p>In LE security mode 2, it consists of two security levels, namely the unauthenticated paired with data signing and the authenticated paired with data signing. It is mainly used for transferring data between two devices on an unencrypted connection.<\/p><p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Elliptic_curve_Diffie%E2%80%93Hellman\">Elliptic Curve Diffie-Helman<\/a> cryptography is used for key exchange in Bluetooth LE secure connections, according to the <a href=\"https:\/\/www.bluetooth.com\/specifications\/adopted-specifications\">Bluetooth Specification Version 5.0<\/a>.\u00a0This helps protect against passive eavesdropping but, may be susceptible to Man in the Middle (MITM) attacks. However to prevent that, random passkey generation is recommended each time pairing is initiated, where the \u2018master\u2019 and \u2018slave\u2019 device will each generate a 128-bit random number, which will serve as a temporary key (TK).<\/p><\/div><\/div><div><div><h3><strong>PHANTOM SECURITY ELEMENTS AND CONSIDERATIONS<\/strong><\/h3><\/div><\/div><div><div><p>Encryption, decryption and authentication are handled in the\u00a0<strong>Phantom eco-system<\/strong> by Cryptocel-310 in order to deliver high performance in Bluetooth mesh networks. The Bluetooth mesh network already has some <strong>security<\/strong> features such as encryption and authentication of all mesh messages, independent addressing of network security, device security and application security, key refresh procedures, message obfuscation, secure creation of nodes in a mesh network, and secure removal of nodes in the mesh network to prevent trash can attacks. The security protocols of mesh networks or individual applications with Bluetooth 5.0 cannot be reduced or switched off, thus it is always present.<\/p><p>To achieve a separation of concerns,<strong>\u00a0three different security keys<\/strong> provide security to different aspects of the mesh. Namely, <strong>the network key<\/strong>\u00a0(NETKEY), which allows a node to encrypt and authenticate up to the network layer, the\u00a0<strong>application key<\/strong>\u00a0(APPKEY), which allows a node to decrypt application data, and<strong>\u00a0the device key<\/strong>\u00a0(DEVKEY) , which is unique to each node,\u00a0<span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );\">and allows for secure communication in the provisioning process<\/span><\/p><p>Due to the processing power requirement for decryption and authentication, the Phantom and its related sister modules use the\u00a0<strong>ARM cryptocell-310 cryptographic co-processor<\/strong> to achieve mesh network performance. Features such as secure boot, key management infrastructure, device life-cycle-state management, cryptography and security middleware service, cryptographic hardware engines, etc. are critical for the high performance delivered by the Phantom on security and possible network vulnerabilities.<\/p><p>The emergence of LE technology in Bluetooth 4.X to the current specification of 5.0, has ensured that peripheral devices no longer need the same memory or processing power requirement than the central unit (sender). Single mode peripheral devices have gained the most advantage (Ravikiran, 2020), thus peripherals can be designed with low memory, <strong>longer battery life<\/strong> and even <strong>low power consumption<\/strong> smart wearable devices. These peripherals are classified as Bluetooth smart ready devices as shown in Fig. 4.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-3d505b4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d505b4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a77e019\" data-id=\"a77e019\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2649297 elementor-widget elementor-widget-image\" data-id=\"2649297\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"595\" height=\"276\" src=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/Smart-Ready.jpg\" class=\"attachment-large size-large wp-image-10086452\" alt=\"Smart Ready\" srcset=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/Smart-Ready.jpg 595w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/Smart-Ready-300x139.jpg 300w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-4704671 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4704671\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b19bc42\" data-id=\"b19bc42\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f5b1ba0 elementor-widget elementor-widget-text-editor\" data-id=\"f5b1ba0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Figure 4<\/strong>: Bluetooth Smart Ready Network<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-7588686 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7588686\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bbb9d07\" data-id=\"bbb9d07\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d6b5bc elementor-widget elementor-widget-text-editor\" data-id=\"2d6b5bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The four levels of security as well as the two security modes imply there are always considerations for the mode to be applied to a peripheral device. The secure connection mode, which involves security mode 1, level 4 will ensure there is an authentication and encryption for all communication between the sender and the receiver, however this will mean more computational power needs and a resultant power drain for battery powered devices. Thus, there must be a compromise with whether encryption without signing will be sufficient. Phantom balances both the needs of security and battery life by combining the cryptocell 310 co-processor for cryptographic processes and the high-performance lithium ion battery that is field replaceable.<\/p><p>The pairing process between a peripheral device and a sender with a Bluetooth connection involves three phases namely; phase one, where each device makes the other aware of their capabilities captured in their individual attribution protocol (ATT) values, secondly phase two, where a long term key (secure connection) or short term key (insecure connection) is generated after the devices have agreed on a mixed random number called the temporary key (TK), thirdly phase three, where the connection signature resolving key (CSRK) used for data signing and the identity resolving key (IRK) used for private MAC address generation and lookup are all generated respectively (Mark, 2018).<\/p><p>Once the keys have been generated , there are four pairing modes. Namely, numeric comparison (which involves matching a six digit number generated by both devices), &#8220;just works&#8221; (a very popular method which is to put the six-digit number to all zeros for both devices), passkey entry (a six digit number from one device which must be entered into the receiver device for communication) and the out of band (OOB), which is using a communication channel outside the main stream Bluetooth channels. The entire pairing process is as shown in Fig. 5.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-4939d9b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4939d9b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-546c466\" data-id=\"546c466\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63496ef elementor-widget elementor-widget-image\" data-id=\"63496ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"551\" height=\"303\" src=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/pairing.jpg\" class=\"attachment-large size-large wp-image-10086473\" alt=\"\" srcset=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/pairing.jpg 551w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/pairing-300x165.jpg 300w\" sizes=\"(max-width: 551px) 100vw, 551px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-1172a6a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1172a6a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf2dec4\" data-id=\"cf2dec4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2494a5 elementor-widget elementor-widget-text-editor\" data-id=\"f2494a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Figure 5<\/strong>: Bluetooth Pairing (Kai, 2016)<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-11a6b85 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"11a6b85\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6805471\" data-id=\"6805471\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-68dd4e2 elementor-widget elementor-widget-text-editor\" data-id=\"68dd4e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Phantom will always have a peripheral similar to it, with limited display capability in the case of the gateway and no keypad, thus the most appropriate security protocol is to implement a key distribution pairing protocol<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-8e05ccb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8e05ccb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d56c021\" data-id=\"d56c021\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c42d4e elementor-widget-divider--view-line_text elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"3c42d4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<h2 class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t<b>LAN\/WAN NETWORK SECURITY<\/b>\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a2182a elementor-widget elementor-widget-text-editor\" data-id=\"0a2182a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><h3><strong>LAN\/WAN NETWORK SECURITY<\/strong><\/h3><\/div><\/div><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>A firewall is a network security system that monitors incoming and outgoing network traffic based on predefined security rules (concept draw, 2020). It establishes a barrier between an internal network which is trusted and an untrusted network such as the internet or another wireless communication technology such as Bluetooth.\u00a0 Firewalls exist as either network firewalls or host-based firewalls. A typical depiction of a firewall between a LAN and a WAN is as shown in Fig. 6.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-a33e1aa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a33e1aa\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-06d1816\" data-id=\"06d1816\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-03c3654 elementor-widget elementor-widget-image\" data-id=\"03c3654\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"411\" height=\"160\" src=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/firewall.jpg\" class=\"attachment-large size-large wp-image-10086544\" alt=\"firewall\" srcset=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/firewall.jpg 411w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2020\/11\/firewall-300x117.jpg 300w\" sizes=\"(max-width: 411px) 100vw, 411px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-b32c03f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b32c03f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-09cad8e\" data-id=\"09cad8e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49485be elementor-widget elementor-widget-text-editor\" data-id=\"49485be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Figure 6<\/strong>: LAN and WAN Security Firewall (concept draw, 2020)<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-9395d3a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9395d3a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b78170d\" data-id=\"b78170d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-719caca elementor-widget elementor-widget-text-editor\" data-id=\"719caca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>According to Walter (2005), obvious threats to information security are those concerning data while being transmitted over a network. Examples of some of these security threats for WANs and LANs are but not limited to; wire tapping \u2013 a physical attempt to breach a communication medium for the sole purpose of data interception and malware injection, masquerading \u2013 an entity that pretends to be another entity, modification of messages \u2013 alteration of transmitted data without being detected,\u00a0 replay of messages \u2013 an attempt to repeat messages in order to result in something undesirable, denial of service\u00a0 \u2013 a node fails to perform its proper function or acts in a way that prevents other nodes from performing their proper functions, trapdoors and Trojan horses \u2013 when an entity is modified to allow an attacker to produce an unauthorized effect on command or at a predetermined event.<\/p><p>The use of additional security protocols aside from using firewalls are also encouraged, where examples of these are; the use of WPA or WPA2 for password encryption on all traffic incoming or outgoing to the internet and filtering of traffic using detailed knowledge of trusted sources. This is usually achieved using specialized authentication policies, using tunnel technologies such as VPN, packet control through different areas of the OSI model, MAC address trust protocol, and internal security features such as antivirus and antimalware programs.<\/p><p>As much as the use and deployment of virtual personal networks (VPN) helps to provide some form of security over a WAN network, it is advisable to adopt software defined WAN, which is a centralized network control system that enables agile, real-time application traffic management without overhauling an existing WAN. SD-WANs also enable access to cloud applications without causing the data bottlenecks a traditional WAN would.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><h3><span id=\"ENTERPRISE_NETWORK_DEVICE_SECURITY\" class=\"ez-toc-section\"><\/span><strong>ENTERPRISE NETWORK DEVICE SECURITY<\/strong><\/h3><\/div><\/div><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>Security for cloud-based services can be classified into three areas of vulnerabilities. The physical security protocol, establishes protocols for the protection of physical assets at a geographical location, infrastructure security, establishes protocols for the ensuring that security patches are updated as soon as possible, ports are scanned for abnormal behavior and data and access security deals with data encryption and user privilege control.<\/p><p>Cloud services are remotely hosted, run, and managed by leading tech companies, and this sometimes gives the false belief that it is impervious to security challenges. Fred (2018) highlights some security challenges that cloud services face such as; data breaches, human errors, data loss with no backup, insider threats, DDoS attacks, insecure APIs, exploits, account hijacking, advanced persistent threats and meltdowns.<\/p><p>While there are numerous benefits to using a cloud-based service such as Amazon Web Services (AWS) and Microsoft Azure, they take security seriously and try to implement some protocols that protect data transmitted and stored in their infrastructure.<\/p><p>AWS adopts isolation as its main security mantra (Sarapremashish, 2020), this ensures that customers cannot access any other resource within their network unless they explicitly enable such access. Isolation is achieved by accounts, which are completed islanded from each other , except in cases where customers have inter-service access. However despite this isolative security tactic, AWS still implements security groups such as firewalls and granular identity and access management (IAM). AWS provides lots of security tools, such as AWS Config, CloudWatch, CloudTrail, GuardDuty, Macie, and Security Hub. Dependability is another AWS asset, as it regularly exhibits rock-solid performance and consistency<\/p><p>Microsoft Azure, on the other hand, and its adoption of an Azure Active Directory which is the singular platform for authorization and permissions management, but it still has some vulnerability as ports and destinations are left open and exposed to the internet, during default initiation.<\/p><p>According to Michael (2020), Microsoft has more than 3,500 cybersecurity experts working to keep Azure secure and an extensive threat intelligence operation that includes analysis of 18 billion Bing web pages, 400 billion emails, a billion Windows device updates, and 450 billion monthly authentications. \u00a0The Azure system also improves its security by ensuring tight controls on setting up user accounts, where they restrict the opening of multiple accounts with the same domain email.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><h3><span id=\"CONCLUSION\" class=\"ez-toc-section\"><\/span><strong>CONCLUSION<\/strong><\/h3><\/div><\/div><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>The Phantom eco-system is an advanced solution for high throughput applications in IIoT\u2019s today. It is equipped with the latest technologies which ensure robust network protection, prevention of data obfuscation, and support suitability for implementing the latest Bluetooth 5.0 security protocols based on the application of use.\u00a0 LANs and WANs are a primary method for data communication over the internet in an IoT implementation, thus security features such as firewalls and software defined WANs are cost effective and reliable solution to managing security issues that could compromise an IoT implementation. Microsoft Azure, although having positives with respect to fast configuration time, has security vulnerabilities, which for all intensive purposes are well handled in AWS.<\/p><p>AWS has been a long time player in the cloud space and thus have more optimized processes as well as optimized security protocols that would ensure end to end protection of data and the entire communication network.<\/p><p><a href=\"https:\/\/www.erbessd-instruments.com\/\">Detailed References<\/a><\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-13d07cb e-flex e-con-boxed e-con e-parent\" data-id=\"13d07cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-33644fc e-flex e-con-boxed e-con e-child\" data-id=\"33644fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71b85ca elementor-widget-divider--view-line_text elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"71b85ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t<b>About the author<\/b>\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-b5a013e e-flex e-con-boxed e-con e-child\" data-id=\"b5a013e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-c268aa0 e-flex e-con-boxed e-con e-child\" data-id=\"c268aa0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d8d7c5 elementor-widget elementor-widget-text-editor\" data-id=\"5d8d7c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Dr. Michael Howard,<\/strong> is an American entrepreneur and Air Force veteran with a remarkable career in the predictive maintenance industry spanning over 30 years, and a variety of industrial sectors, including industrial manufacturing, reliability engineering, and instrumentation development and design organizations. Dr. Howard is a graduate of Excelsior University, Capella University, and New Charter University with degrees in Electro-Mechanical Engineering, Leadership and Organizational Management, and Engineering Management.<\/p><p>As the CEO of Erbessd Instruments, he leads strategy, sales, marketing, and operations in English-speaking markets. He is a certified reliability engineer, certified maintenance and reliability professional, and category III vibration analyst.\u00a0 Michael is a passionate advocate for wireless instrumentation, video deflection, and the Industrial Internet of Things (IIoT).<\/p><p>ERBESSD INSTRUMENTS\u00ae is a leading manufacturer of Vibration Analysis Equipment, Dynamic Balancing Machines, and Condition Monitoring with facilities in Mexico, the USA, the United Kingdom, and India.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-bd7aa04 e-con-full e-flex e-con e-child\" data-id=\"bd7aa04\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-acc32e9 elementor-widget elementor-widget-image\" data-id=\"acc32e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/09\/Michael-Howard.jpg\" class=\"attachment-large size-large wp-image-10145437\" alt=\"\" srcset=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/09\/Michael-Howard.jpg 500w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/09\/Michael-Howard-300x300.jpg 300w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/09\/Michael-Howard-150x150.jpg 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-2b2fd27 e-flex e-con-boxed e-con e-child\" data-id=\"2b2fd27\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-33e139b e-flex e-con-boxed e-con e-parent\" data-id=\"33e139b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4386c09 elementor-widget elementor-widget-spacer\" data-id=\"4386c09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-2ed4c41 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ed4c41\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4fa8665\" data-id=\"4fa8665\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1898c8f elementor-widget elementor-widget-text-editor\" data-id=\"1898c8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Meet Our Products:\u00a0<\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-f7af070 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f7af070\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2cd9706\" data-id=\"2cd9706\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a8244a elementor-widget elementor-widget-template\" data-id=\"8a8244a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"10089310\" class=\"elementor elementor-10089310\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-2e7a5592 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e7a5592\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-557727e7\" data-id=\"557727e7\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d814407 elementor-widget elementor-widget-text-editor\" data-id=\"5d814407\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><a href=\"https:\/\/www.erbessd-instruments.com\/wireless-accelerometer\/\" target=\"_blank\" rel=\"noopener\">Wireless Triaxial Accelerometer<\/a><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56573b3d elementor-widget elementor-widget-image\" data-id=\"56573b3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.erbessd-instruments.com\/wireless-accelerometer\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"230\" height=\"230\" src=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/WiSER-3X-Small.jpg\" class=\"attachment-medium size-medium wp-image-10085045\" alt=\"wiser vibration analyzer\" srcset=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/WiSER-3X-Small.jpg 230w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/WiSER-3X-Small-150x150.jpg 150w\" sizes=\"(max-width: 230px) 100vw, 230px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-67c63343\" data-id=\"67c63343\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35cfc84e elementor-widget elementor-widget-text-editor\" data-id=\"35cfc84e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.erbessd-instruments.com\/vibration-analyzers\/\" target=\"_blank\" rel=\"noopener\"><b>Vibration Analyzer<\/b><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dcd3397 elementor-widget elementor-widget-image\" data-id=\"1dcd3397\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.erbessd-instruments.com\/vibration-analyzers\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/h1-3.jpg\" class=\"attachment-large size-large wp-image-10084535\" alt=\"Digivibe M30 Vibration Analyzer and Balancer\" srcset=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/h1-3.jpg 300w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/h1-3-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-94565f0\" data-id=\"94565f0\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-78ed13eb elementor-widget elementor-widget-text-editor\" data-id=\"78ed13eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.erbessd-instruments.com\/vibration-monitoring\/\" target=\"_blank\" rel=\"noopener\"><b>Condition Monitoring System<\/b><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17ca88fb elementor-widget elementor-widget-image\" data-id=\"17ca88fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.erbessd-instruments.com\/vibration-monitoring\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/PhantomFamily2023-300x300.png\" class=\"attachment-medium size-medium wp-image-10132006\" alt=\"\" srcset=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/PhantomFamily2023-300x300.png 300w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/PhantomFamily2023-1024x1024.png 1024w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/PhantomFamily2023-150x150.png 150w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/PhantomFamily2023-768x768.png 768w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/PhantomFamily2023-1536x1536.png 1536w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/PhantomFamily2023-2048x2048.png 2048w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/PhantomFamily2023-250x250.png 250w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/PhantomFamily2023-500x500.png 500w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/elementor\/thumbs\/PhantomFamily2023-q8e27vf0aeb2ycg4wc3ji4l718b7y4wcmvha1b0v1k.png 900w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/elementor\/thumbs\/PhantomFamily2023-q8e27vez2jinccaehf8de1qtzw3ladomr2w3vwjn0g.png 800w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/elementor\/thumbs\/PhantomFamily2023-q8e27vewmtxs4byxnli15w23x7obyv96zhprl3l6y8.png 600w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/elementor\/thumbs\/PhantomFamily2023-q8e27veu74cwwbngtrroxqdduj92nctr7wjfaamqw0.png 400w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/elementor\/thumbs\/PhantomFamily2023-q8e27veut1r4pbqc1879zrskd7cvz8fm5su0czvcwk.png 450w, https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/PhantomFamily2023.png 1440w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Reliability Engineer\u2019s Guide to Understanding IIoT Devices, LAN, and WAN Security Table of Contents As wireless sensor technology begins to take the leading edge within the industrial Internet of Things community, a new era of data security has emerged that requires diligent thought and consideration on the part of end users, system integrators, and &#8230; <a title=\"The Reliability Engineer\u2019s Guide to Understanding Wireless &#038; Network Security\" class=\"read-more\" href=\"https:\/\/www.erbessd-instruments.com\/de\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/\" aria-label=\"Mehr Informationen \u00fcber The Reliability Engineer\u2019s Guide to Understanding Wireless &#038; Network Security\">Weiterlesen<\/a><\/p>\n","protected":false},"author":6,"featured_media":10085053,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[56,26,29,46,57,58,59,60,61,62,63],"class_list":["post-10080489","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","tag-guide-to-security","tag-iiot","tag-iot","tag-iot-security","tag-maintenance-manager","tag-network-security","tag-reliability-engineer","tag-security","tag-vibration-analyst","tag-wireless","tag-wireless-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Wireless &amp; Network Security (Reliability Guide) - Erbessd Instruments\u00ae<\/title>\n<meta name=\"description\" content=\"As wireless sensor technology begins to take the leading edge within the industrial IoT community network security is critical.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Reliability Engineer\u2019s Guide to Understanding Wireless &amp; Network Security\" \/>\n<meta property=\"og:description\" content=\"As wireless sensor technology begins to take the leading edge within the industrial IoT community network security is critical.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ERBESSD INSTRUMENTS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/erbessdinstrumentsco\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-13T01:15:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-17T16:44:03+00:00\" \/>\n<meta name=\"author\" content=\"Luis Sabido\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/Wireless-Accelerometer-Triaxial-450x279-1.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@ErbessdRel\" \/>\n<meta name=\"twitter:site\" content=\"@ErbessdRel\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luis Sabido\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"17\u00a0Minuten\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Wireless & Network Security (Reliability Guide) - Erbessd Instruments\u00ae","description":"As wireless sensor technology begins to take the leading edge within the industrial IoT community network security is critical.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/","og_locale":"de_DE","og_type":"article","og_title":"The Reliability Engineer\u2019s Guide to Understanding Wireless & Network Security","og_description":"As wireless sensor technology begins to take the leading edge within the industrial IoT community network security is critical.","og_url":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/","og_site_name":"ERBESSD INSTRUMENTS","article_publisher":"https:\/\/www.facebook.com\/erbessdinstrumentsco","article_published_time":"2020-11-13T01:15:28+00:00","article_modified_time":"2025-06-17T16:44:03+00:00","author":"Luis Sabido","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/Wireless-Accelerometer-Triaxial-450x279-1.jpg","twitter_creator":"@ErbessdRel","twitter_site":"@ErbessdRel","twitter_misc":{"Verfasst von":"Luis Sabido","Gesch\u00e4tzte Lesezeit":"17\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/#article","isPartOf":{"@id":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/"},"author":{"name":"Luis Sabido","@id":"https:\/\/www.erbessd-instruments.com\/#\/schema\/person\/ee1f2ca5483820c9d1a6c1533ff347fe"},"headline":"The Reliability Engineer\u2019s Guide to Understanding Wireless &#038; Network Security","datePublished":"2020-11-13T01:15:28+00:00","dateModified":"2025-06-17T16:44:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/"},"wordCount":2969,"publisher":{"@id":"https:\/\/www.erbessd-instruments.com\/#organization"},"image":{"@id":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/Wireless-Accelerometer-Triaxial-450x279-1.jpg","keywords":["Guide to Security","IIoT","IOT","IoT Security","Maintenance Manager","Network Security","Reliability Engineer","Security","Vibration Analyst","Wireless","Wireless Security"],"articleSection":["Articles"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/","url":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/","name":"Wireless & Network Security (Reliability Guide) - Erbessd Instruments\u00ae","isPartOf":{"@id":"https:\/\/www.erbessd-instruments.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/#primaryimage"},"image":{"@id":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/Wireless-Accelerometer-Triaxial-450x279-1.jpg","datePublished":"2020-11-13T01:15:28+00:00","dateModified":"2025-06-17T16:44:03+00:00","description":"As wireless sensor technology begins to take the leading edge within the industrial IoT community network security is critical.","breadcrumb":{"@id":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/#primaryimage","url":"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/Wireless-Accelerometer-Triaxial-450x279-1.jpg","contentUrl":"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/Wireless-Accelerometer-Triaxial-450x279-1.jpg","width":450,"height":279,"caption":"Wireless accelerometer WiSER 3x"},{"@type":"BreadcrumbList","@id":"https:\/\/www.erbessd-instruments.com\/articles\/the-reliability-engineers-guide-to-understanding-iiot-device-lan-and-wan-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.erbessd-instruments.com\/"},{"@type":"ListItem","position":2,"name":"The Reliability Engineer\u2019s Guide to Understanding Wireless &#038; Network Security"}]},{"@type":"WebSite","@id":"https:\/\/www.erbessd-instruments.com\/#website","url":"https:\/\/www.erbessd-instruments.com\/","name":"ERBESSD INSTRUMENTS","description":"Vibration Analyzer, Online Monitoring, Video Deflection, &amp; Balancing Machine Manufacturer","publisher":{"@id":"https:\/\/www.erbessd-instruments.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.erbessd-instruments.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.erbessd-instruments.com\/#organization","name":"ERBESSD INSTRUMENTS","url":"https:\/\/www.erbessd-instruments.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.erbessd-instruments.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/erbessd_instruments_logo.png","contentUrl":"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/erbessd_instruments_logo.png","width":1073,"height":138,"caption":"ERBESSD INSTRUMENTS"},"image":{"@id":"https:\/\/www.erbessd-instruments.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/erbessdinstrumentsco","https:\/\/x.com\/ErbessdRel","https:\/\/www.linkedin.com\/company\/erbessdinstrumentsco","https:\/\/www.pinterest.com\/4d2ab37d590061eda78ee907c11410\/","https:\/\/www.youtube.com\/channel\/UCMi2XxcHeufIw5WVkcPg98A"]},{"@type":"Person","@id":"https:\/\/www.erbessd-instruments.com\/#\/schema\/person\/ee1f2ca5483820c9d1a6c1533ff347fe","name":"Luis Sabido","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/5b5de89e0d6d9935856608c103b4a89b555b118d3d7e61226c6a8db90959dd1c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5b5de89e0d6d9935856608c103b4a89b555b118d3d7e61226c6a8db90959dd1c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5b5de89e0d6d9935856608c103b4a89b555b118d3d7e61226c6a8db90959dd1c?s=96&d=mm&r=g","caption":"Luis Sabido"},"url":"https:\/\/www.erbessd-instruments.com\/de\/author\/luis-sabido\/"}]}},"_links":{"self":[{"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/posts\/10080489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/comments?post=10080489"}],"version-history":[{"count":94,"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/posts\/10080489\/revisions"}],"predecessor-version":[{"id":10152411,"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/posts\/10080489\/revisions\/10152411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/media\/10085053"}],"wp:attachment":[{"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/media?parent=10080489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/categories?post=10080489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/tags?post=10080489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}