Skip to main content

Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11983))

Included in the following conference series:

Abstract

Since 2012, at the Hanover Messe Fair, Germany introduced the concept of Industry 4.0 as using transformative technologies to connect the physical world to the cyber world. The past three industrial revolutions all had their own enabling technologies, but this is the first time that so many enabling technologies are impacting manufacturing industries at the same time. In the industrial areas, these enabling technologies open a lot of possibilities, for instance, predictive maintenance, virtual commission, re-configurable factory, remote data visualization and monitoring, data analytics, etc. which leads to Industry 4.0 revolution. This article provides an overview of the main enabling technologies in Industry 4.0 and possible cybersecurity threats to them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Defining and sizing the industrial internet. http://wikibon.org/wiki/v/Defining_and_Sizing_the_Industrial_Internet. Accessed 01 July 2019

  2. Gartner identifies the top 10 strategic technology trends for 2017. https://www.gartner.com/en/newsroom/press-releases/2016-10-18-gartner-identifies-the-top-10-strategic-technology-trends-for-2017. Accessed 01 July 2019

  3. Industrial control system security top 10 threats and countermeasures 2019. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_005E.pdf?__blob=publicationFile&v=3. Accessed 01 July 2019

  4. Industrial edge from siemens adds benefits from the cloud at the field level. https://www.siemens.com/press/en/pressrelease/?press=/en/pressrelease/2018/digitalfactory/pr2018040239dfen.htm. Accessed 01 July 2019

  5. Industry 4.0 is an evolution, not a revolution. https://www.industryweek.com/technology-and-iiot/industry-40-evolution-not-revolution. Accessed 01 July 2019

  6. World first industry 4.0 testlab for swinburne. https://www.swinburne.edu.au/news/latest-news/2018/03/swinburne-to-establish-world-first-industry-40-testlab.php. Accessed 01 July 2019

  7. Aleksy, M., Vartiainen, E., Domova, V., Naedele, M.: Augmented reality for improved service delivery. In: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, pp. 382–389. IEEE (2014)

    Google Scholar 

  8. Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017)

    Article  Google Scholar 

  9. Bécue, A., et al.: Cyberfactory# 1-securing the industry 4.0 with cyber-ranges and digital twins. In: 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), pp. 1–4. IEEE (2018)

    Google Scholar 

  10. Belikovetsky, S., Yampolskiy, M., Toh, J., Gatlin, J., Elovici, Y.: dr0wned-cyber-physical attack with additive manufacturing. In: 11th USENIX Workshop on Offensive Technologies (WOOT 2017) (2017)

    Google Scholar 

  11. Choi, H., et al.: Detecting attacks against robotic vehicles: a control invariant approach. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 801–816. ACM (2018)

    Google Scholar 

  12. Disterer, G.: ISO/IEC 27000, 27001 and 27002 for information security management (2013)

    Google Scholar 

  13. Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge (2016)

    MATH  Google Scholar 

  14. Kim, D., Gil, J.M.: Reliable and fault-tolerant software-defined network operations scheme for remote 3D printing. J. Electron. Mater. 44(3), 804–814 (2015)

    Article  Google Scholar 

  15. Lee, S., Lee, S., Yoo, H., Kwon, S., Shon, T.: Design and implementation of cybersecurity testbed for industrial IoT systems. J. Supercomput. 74(9), 4506–4520 (2018)

    Article  Google Scholar 

  16. Lezzi, M., Lazoi, M., Corallo, A.: Cybersecurity for industry 4.0 in the current literature: a reference framework. Comput. Ind. 103, 97–110 (2018)

    Article  Google Scholar 

  17. Loch, F., Quint, F., Brishtel, I.: Comparing video and augmented reality assistance in manual assembly. In: 2016 12th International Conference on Intelligent Environments (IE), pp. 147–150. IEEE (2016)

    Google Scholar 

  18. Mell, P., Grance, T., et al.: The NIST definition of cloud computing (2011)

    Google Scholar 

  19. Moustafa, N., Adi, E., Turnbull, B., Hu, J.: A new threat intelligence scheme for safeguarding industry 4.0 systems. IEEE Access 6, 32910–32924 (2018)

    Article  Google Scholar 

  20. Ngo, T.D., Kashani, A., Imbalzano, G., Nguyen, K.T., Hui, D.: Additive manufacturing (3D printing): a review of materials, methods, applications and challenges. Compos. Part B Eng. 143, 172–196 (2018)

    Article  Google Scholar 

  21. Pichler, A., et al.: Towards shared autonomy for robotic tasks in manufacturing. Proc. Manuf. 11, 72–82 (2017)

    Google Scholar 

  22. Pratiba, D., Shobha, D.G.: Privacy-preserving public auditing for data storage security in cloud computing. Int. J. Comput. Eng. Technol. (IJCET) 4(3), 441–448 (2013)

    Google Scholar 

  23. Son, Y., et al.: Rocking drones with intentional sound noise on gyroscopic sensors. In: 24th USENIX Security Symposium (USENIX Security 2015), pp. 881–896 (2015)

    Google Scholar 

  24. Wan, J., Cai, H., Zhou, K.: Industrie 4.0: enabling technologies. In: Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things, pp. 135–140. IEEE (2015)

    Google Scholar 

  25. Waurzyniak, P.: Securing manufacturing data in the cloud. Advanced Manufacturing (2016)

    Google Scholar 

  26. Wu, D., Rosen, D.W., Schaefer, D.: Cloud-based design and manufacturing: status and promise. In: Schaefer, D. (ed.) Cloud-Based Design and Manufacturing (CBDM), pp. 1–24. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07398-9_1

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Shi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shi, L., Chen, X., Wen, S., Xiang, Y. (2019). Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37352-8_53

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37351-1

  • Online ISBN: 978-3-030-37352-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics