Cybersecurity for Industry 4.0 (eBook)

Analysis for Design and Manufacturing

Lane Thames, Dirk Schaefer (Herausgeber)

eBook Download: PDF
2017 | 1st ed. 2017
XIII, 265 Seiten
Springer International Publishing (Verlag)
978-3-319-50660-9 (ISBN)

Lese- und Medienproben

Cybersecurity for Industry 4.0 -
Systemvoraussetzungen
117,69 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book introduces readers to cybersecurity and its impact on the realization of the Industry 4.0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4.0 landscape and details the existing cybersecurity threats faced by Industry 4.0, as well as state-of-the-art solutions with regard to both academic research and practical implementations.

Industry 4.0 and its associated technologies, such as the Industrial Internet of Things and cloud-based design and manufacturing systems are examined, along with their disruptive innovations. Further, the book analyzes how these phenomena capitalize on the economies of scale provided by the Internet.

The book offers a valuable resource for practicing engineers and decision makers in industry, as well as researchers in the design and manufacturing communities and all those interested in Industry 4.0 and cybersecurity.



Lane Thames has more than fifteen years experience in information technology, computer communications, and software engineering, all with a focus on cybersecurity. Over the past 10 years, he has conducted research at the intersection of cybersecurity, advanced information technologies, advanced manufacturing, and machine learning. His PhD dissertation was focused on distributed Internet cybersecurity, high-speed packet
classification, and autonomous cyber-attack detection with machine learning algorithms. Since 2011, he has investigated numerous foundational aspects of Industry 4.0 within the scope of Cloud-based Design and Manufacturing (CBDM) along with its associated cybersecurity needs and applications. Since 2013, he has been investigating cyber security for applications within the so-called Industrial Internet and the Industrial Internet of Things.

Dirk Schaefer has more than twenty years experience in computer-aided design, engineering, and manufacturing, both in industry and academia. Over the past fifteen years, he has conducted research on product modeling, variant design, product life-cycle management, design-with-manufacture integration, standardized product data exchange, and digital and virtual engineering. Since 2011 he has been spearheading research on Cloud-based Design and Manufacturing (CBDM) and Social Product Development (SPD), which are considered high-impact areas in the context of Industry 4.0 and cyber-physical product creation.

Lane Thames has more than fifteen years experience in information technology, computer communications, and software engineering, all with a focus on cybersecurity. Over the past 10 years, he has conducted research at the intersection of cybersecurity, advanced information technologies, advanced manufacturing, and machine learning. His PhD dissertation was focused on distributed Internet cybersecurity, high-speed packetclassification, and autonomous cyber-attack detection with machine learning algorithms. Since 2011, he has investigated numerous foundational aspects of Industry 4.0 within the scope of Cloud-based Design and Manufacturing (CBDM) along with its associated cybersecurity needs and applications. Since 2013, he has been investigating cyber security for applications within the so-called Industrial Internet and the Industrial Internet of Things.Dirk Schaefer has more than twenty years experience in computer-aided design, engineering, and manufacturing, both in industry and academia. Over the past fifteen years, he has conducted research on product modeling, variant design, product life-cycle management, design-with-manufacture integration, standardized product data exchange, and digital and virtual engineering. Since 2011 he has been spearheading research on Cloud-based Design and Manufacturing (CBDM) and Social Product Development (SPD), which are considered high-impact areas in the context of Industry 4.0 and cyber-physical product creation.

Preface 6
Contents 9
Contributors 11
1 Industry 4.0: An Overview of Key Benefits, Technologies, and Challenges 14
1 Introduction: Background and Motivation 14
2 Industry 4.0 and Smart Manufacturing 15
2.1 Industrial Internet and the Industrial Internet of Things 16
2.2 New 21st Century Product Development Paradigms 19
3 Cloud-Based Design and Manufacturing 22
4 Defining Cloud-Based Design and Manufacturing (CBDM) 24
4.1 Cloud Based Design 26
4.2 Cloud Based Manufacturing 27
4.3 CBDM Services 27
5 CBDM: A First Generation Implementation 29
5.1 An Infrastructure for Distributed Collaborative Design and Manufacturing Inspired by the Cloud Computing Paradigm 31
5.2 A CBDM Workflow Example 34
6 Software Defined Cloud Manufacturing 34
6.1 Software-Defined Systems 36
6.2 A Software Defined Cloud Manufacturing Architecture 38
6.3 SDCM Domain Specific Configuration Language 40
6.4 SDCM Workflow Scenarios 41
7 Closure 44
References 45
2 Customized Encryption of CAD Models for Cloud-Enabled Collaborative Product Development 47
Abstract 47
1 Introduction 48
2 Related Research 49
2.1 Watermark of CAD Models 50
2.2 Access Control of CAD Models in a Network Environment 51
2.3 Multi-level Design Data Sharing Based on the Multi-resolution Models 52
2.4 Encryption of CAD Models 53
2.5 Summary of the Related Works 53
3 Customized Encryption of Feature-Based CAD Models 53
3.1 Encryption of a CAD Model 54
3.1.1 Encryption of Sketches 56
3.1.2 Encryption Algorithm of CAD Models 59
3.2 Encryption Based Secure Sharing of CAD Models 61
3.2.1 Key-Based Authorization Algorithm 61
3.2.2 Customized Geometric Transformation Algorithm 63
4 Case Study for Approach Validation 63
5 Conclusion and Future Works 66
Acknowledgements 67
References 67
3 A New Approach to Cyberphysical Security in Industry 4.0 70
Abstract 70
1 Introduction 70
2 Background 71
3 Secure Manufacturing Information Architecture 74
3.1 Pilot of Direct-to-Machine Security 78
4 Manufacturing Security Enforcement Device 79
5 Pilot of the Manufacturing Security Enforcement Device 80
6 Conclusion 80
Acknowledgements 82
References 82
4 SCADA System Forensic Analysis Within IIoT 84
1 Introduction 85
1.1 SCADA Progression and the Development of IIoT 86
2 Conceptual Architecture of a SCADA System 89
2.1 SCADA Hardware 90
2.2 SCADA Software 91
2.3 Networking 91
3 Examples of SCADA System Incidents Prior to IIoT 93
3.1 Trans-Siberian Pipeline Explosion 94
3.2 Maroochy Shire Water System 94
3.3 Stuxnet 94
3.4 Duqu 95
3.5 Flame 95
4 SCADA Forensics Within IIoT 96
4.1 Forensic Challenges 96
4.2 Current Data Acquisition Methods for SCADA Systems 99
5 Forensic Acquisition of SCADA Artefacts 99
5.1 Network Data Acquisition 99
5.2 Device Data Acquisition 101
5.3 Half-Life of Data Within a SCADA System 104
6 SCADA Forensic Process 104
6.1 Existing Incident Response Models 104
6.2 Forensic Methodology for SCADA Within IIoT 105
6.3 SCADA Forensic Workstation 108
7 Conclusion 109
8 List of Abbreviations 110
References 111
5 Big Data Security Intelligence for Healthcare Industry 4.0 113
Abstract 113
1 Introduction 114
1.1 Three Kinds of Integration in Industry 4.0 114
1.1.1 Horizontal Integration 114
1.1.2 Vertical Integration 114
1.1.3 End-To-End Engineering Integration 115
1.2 Big Data Use in Healthcare Industry 115
1.3 Challenges and Potential Solutions in Healthcare Industry 115
1.4 Open Research Issues in Healthcare Industry 117
2 Overview of the Smarter HealthCare Industry 117
2.1 Internet of Things and Internet of Everything 117
2.2 Recent Work in Smart Healthcare Industry 121
2.3 Security and Privacy Requirements in Smart HealthCare Industry 122
3 Industry 4.0 for Smart HealthCare Monitoring System 124
3.1 Meta Cloud-Redirection (MC-R) Architecture 124
3.1.1 Data Collection Phase 126
3.1.2 Data Transfer Phase 126
3.1.3 Data Processing Phase 126
Log File Processing 127
MapReduce Algorithm for Log Processing in Distributed Cloud Data Centers 127
Mapper Function 127
Reducer Function 128
3.1.4 Categorization of the Data 128
Critical Data 128
Sensitive Data 128
Normal Data 129
3.1.5 Big Data Storage Phase 129
3.1.6 Security Phase 129
3.2 Big Data Knowledge System for Industry 4.0 Systems 130
3.2.1 Data Volumes 130
3.2.2 Data Integrity and Security 130
4 Discussions 132
4.1 Security Issues in Various Cloud Deployment Models of Meta Cloud Data Storage Architecture 132
4.1.1 Security in Data Transfer 132
4.1.2 Security in Data Storage 132
4.1.3 Data Lineage 132
4.2 Merge Industry 4.0 with Other Healthcare Applications 133
5 Conclusion 135
References 135
6 Decentralized Cyber-Physical Systems: A Paradigm for Cloud-Based Smart Factory of Industry 4.0 137
Abstract 137
1 Introduction 138
2 Smart Factory of Industry 4.0 141
2.1 Industry 4.0 141
2.1.1 Background of Industry 4.0 141
2.1.2 Introduction of Industry 4.0 145
2.2 Smart Factory of Industry 4.0 148
2.2.1 Present Manufacturing Industry 148
2.2.2 Introduction to Smart Factories 151
Physical Factory 152
Adjoining Course 153
Cloud 154
Effect 155
3 Decentralized Cyber-Physical Systems Agents 156
3.1 Conceptual Model 156
3.1.1 Functions of Agents 156
3.1.2 The Biological Concept for Reference 159
3.1.3 Appearance and User Interface of Agents 160
3.2 Operation Mechanism 161
3.3 Key Technologies 163
4 A Cloud-Based Smart Manufacturing Paradigm 165
4.1 Implementation Approach 165
4.2 Business Model 169
4.2.1 Internal Integration Within the Company 169
4.2.2 External Integration Among the Companies 170
Horizontal Integration Along a Supply Chain 171
Cloud Factory 172
4.2.3 Service-Oriented Trend of Manufacturing 173
5 Application Case 175
5.1 Background 175
5.2 Application Situations 176
6 Conclusion 180
Acknowledgements 180
References 181
7 Applying and Assessing Cybersecurity Controls for Direct Digital Manufacturing (DDM) Systems 182
Abstract 182
1 Introduction 182
1.1 Power and Energy a Case Study: Consequence of not Addressing Security Before a Technology Infrastructure Is at a National Level 183
2 Defining Direct Digital Manufacturing 184
2.1 Installing a “New Printer” 185
3 Security Lessons from Past Industry Digitization 186
3.1 Telecommunication: An Organizational and Policy Approach to Security 186
3.2 Power and Energy: A Lesson About the False Separation of Operational Technology Versus Information Technology 187
4 Defining the DDM Cybersecurity Threats, Vulnerabilities, and Risk Management 188
4.1 Tenants of DDM Cybersecurity 189
4.2 DDM Cybersecurity Threats 189
4.3 DDM Cyber Vulnerabilities 190
4.4 DDM Risk Management Overview 191
4.5 DDM Cyber Risks: Theft, Disruption, and Sabotage 192
5 Walking the DDM Digital Thread 194
5.1 Data Storage and Transfers 195
5.2 Stereolithography File Attack Research 195
5.3 Printer Components 197
5.4 Engineering and Production Practices 198
5.5 Assessment Methodology 199
5.6 System Assessment 199
6 Recommendations 199
7 Conclusion 200
References 203
8 The Resource Usage Viewpoint of Industrial Control System Security: An Inference-Based Intrusion Detection System 204
Abstract 204
1 Introduction 205
2 Advanced Persistent Threat 207
3 Resource Usage View Point of Security 209
4 Related Work 216
5 RTOS, CPU Load, ICMP Network Traffic, and Machine Learning 219
6 Stuxnet-Type Threat Model 222
7 The PowerCyber Smartgrid Test-Bed 224
8 Experimental Evaluation 225
8.1 Experimental Setup 225
8.2 Experimental Procedure 225
9 Case Study: Discerning Between the Normal States of Intelligent Electronic Devices (IED) in Smartgrids 227
10 Results and Discussion 228
11 Summary and Future Work 230
Acknowledgements 231
References 231
9 Practical Security Aspects of the Internet of Things 233
Abstract 233
1 Introduction 234
2 IoT Security Threats 234
2.1 Top Security Issues in IoT Systems 235
2.2 The Architecture of IoT Systems 237
2.3 Security Issues in the IoT Stack 238
2.3.1 Threats at the IoT Edge 239
2.4 IoT Communication Technology 241
3 Technical Example: Remote Maintenance of Machine Tools 244
3.1 IoT Remote Maintenance Architecture 244
3.2 A Novel Modular IoT Unit 246
4 Summary and Conclusion 248
Acknowledgements 249
References 249
10 Cybersecurity for Industry 4.0 and Advanced Manufacturing Environments with Ensemble Intelligence 251
1 Cyberattack Detection: Methodologies and Algorithms 252
2 Cyberattack Detection and Response Within the Software-Defined Cloud Manufacturing Architecture 253
3 Neural Networks and Genetic Algorithms 254
3.1 Neural Networks 254
3.2 Genetic Algorithms 257
4 Cyberattack Detection with Ensembles of Computational Intelligence Systems 258
4.1 The NNO Classification Algorithm 259
5 Datasets and Performance Metrics for Evaluating Cyberattack Detection Systems 260
5.1 Datasets 261
5.2 Performance Metrics 262
5.3 NNO Ensemble Intelligence: Simulation Results 263
6 Summary 269
References 271

Erscheint lt. Verlag 3.4.2017
Reihe/Serie Springer Series in Advanced Manufacturing
Springer Series in Advanced Manufacturing
Zusatzinfo XIII, 265 p. 112 illus., 99 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Mathematik / Informatik Informatik
Sozialwissenschaften Politik / Verwaltung
Technik Bauwesen
Technik Nachrichtentechnik
Wirtschaft Betriebswirtschaft / Management Logistik / Produktion
Schlagworte Cyber-Physical Systems • Disruptive innovation • Industrial Internet of Things • Industrial systems • Product Development
ISBN-10 3-319-50660-9 / 3319506609
ISBN-13 978-3-319-50660-9 / 9783319506609
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 9,0 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Grundlagen – Use-Cases – unternehmenseigene KI-Journey

von Ralf T. Kreutzer

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
42,99