Abstract
Networked manufacturing changes conventional enterprise activities. With a networked manufacturing system, enterprises are able to perform a range of activities, such as product planning, design, production, and marketing, in collaboration with international partners, regardless of geographical location. However, strict security measures are required, as the authentication and information transfers for networked manufacturing are conducted over a network. With the development of biometric technology, more and more enterprises are using the unique biometric data of individuals to verify the identity of users, in order to restrict and provide access to technology research centers or factory facilities. This paper analyzes the vulnerabilities of the biometric system used for access control and the authentication of access to confidential information in the networked manufacturing system. In addition, the biometric systems that can be built in an open network environment are classified into 9 general models, and a biometric network protocol is suggested that is secure and compatible with international standards.
Similar content being viewed by others
References
Articles Biometrics in the Manufacturing & Pharamaceutical Environment. (2008). BSPA Labs. Available at http://www.bspalabs.org.
AVISPA. (2003). Deliverable 2.1: The high-level protocol specification language. Available at http://www.avispa-project.org/publications.html.
DePriest M. S. (1997) Network security considerations in TCP/IP-based manufacturing autormation. ISA Transactions 36(1): 37–48
Dierks, T., & Rescorla, E. (2006). The transport layer security (TLS) protocol version 1.1. Network Working Group, IETF RFC4346.
Drielsma, P. H. (2003). The specification of the TLS protocol in the HLPSL. Available at http://www.avispa-project.org/library.
Etessami, K., & Rajamani, S. K. (2005). The AVISPA tool for automated validation of internet security protocols and applications, CAV 2005 (Vol. 3576), LNCS. Springer.
IBG. (2006). Biometric Market and Industry Report 2006–2010. International Biometric Group Report, pp. 60–61.
ISO/IEC JTC1 SC 37. (2007). BioAPI interworking protocol (BIP). ITU-T draft Recommendation.
ITU-T SG17 Q.8. (2006). X.tsm-part1: Telebiometrics system mechanism—general biometric authentication protocol and system model profile for telecommunication systems. ITU-T draft Recommendation.
ITU-T SG17 Q.8. (2007). X.tpp-part1: A guideline of technical and managerial countermeasures for biometric data security. ITU-T draft Recommendation.
Kang Y.G., Wang Z., Li R., Jiang C. (2007) A fixture design system for networked manufacturing. International Journal of Computer Integrated Manufacturing 20: 143–159
Larmouth, J. (1999). ASN.1 complete, open system solutions.
Leong K.K., Yu K.M., Lee W.B. (2003) A security model for distributed product data management system. Computers in Industry 50: 179–193
Liu F., Yin C., Liu S. (2000) Regional networked manufacturing system. Chinese Journal of Mechanical Engineering 13: 97–103
Molina A., Santaella A.R. (2006) Achieving e-manufacturing: multihead control and web technology for the implementation of a manufacturing execution system. Journal of Intelligent Manufacturer 17: 715–724
Montreuil B., Frayret J.M., D’amours S. (2000) A strategic framework for networked manufacturing. Computers in Industry 42: 299–317
NACFAM. (2001). Exploiting e-manufacturing: Interoperability of software systems used by U.S. manufacturers. National Coalition for Advanced Manufacturing.
National Industrial Security Center. (2008). Security research for high industrial technology (pp. 41–42). National Intelligence Service.
Shin, Y.-N. (2007). Protection profile of telecommunication device for telebiometric system mechanism (TSM). In The 8th International Common Criteria Conference Proceeding (pp. 51–53).
Wang, L., Li, A., & Xu, L.(2007). A security model for networked manufacturing system. In The 2007 International Computational Intelligence and Security Conference Proceeding (pp.747–749).
Yan J.Q. (2000) Digitized, network-based manufacturing. Industrial Engineering and Management 1: 8–11
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shin, Y., Shin, W. A telebiometric system mechanism model and biometric network protocol for the security of networked manufacturing. J Intell Manuf 21, 595–605 (2010). https://doi.org/10.1007/s10845-009-0242-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10845-009-0242-5