Skip to main content
Log in

A telebiometric system mechanism model and biometric network protocol for the security of networked manufacturing

  • Published:
Journal of Intelligent Manufacturing Aims and scope Submit manuscript

Abstract

Networked manufacturing changes conventional enterprise activities. With a networked manufacturing system, enterprises are able to perform a range of activities, such as product planning, design, production, and marketing, in collaboration with international partners, regardless of geographical location. However, strict security measures are required, as the authentication and information transfers for networked manufacturing are conducted over a network. With the development of biometric technology, more and more enterprises are using the unique biometric data of individuals to verify the identity of users, in order to restrict and provide access to technology research centers or factory facilities. This paper analyzes the vulnerabilities of the biometric system used for access control and the authentication of access to confidential information in the networked manufacturing system. In addition, the biometric systems that can be built in an open network environment are classified into 9 general models, and a biometric network protocol is suggested that is secure and compatible with international standards.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Articles Biometrics in the Manufacturing & Pharamaceutical Environment. (2008). BSPA Labs. Available at http://www.bspalabs.org.

  • AVISPA. (2003). Deliverable 2.1: The high-level protocol specification language. Available at http://www.avispa-project.org/publications.html.

  • DePriest M. S. (1997) Network security considerations in TCP/IP-based manufacturing autormation. ISA Transactions 36(1): 37–48

    Article  Google Scholar 

  • Dierks, T., & Rescorla, E. (2006). The transport layer security (TLS) protocol version 1.1. Network Working Group, IETF RFC4346.

  • Drielsma, P. H. (2003). The specification of the TLS protocol in the HLPSL. Available at http://www.avispa-project.org/library.

  • Etessami, K., & Rajamani, S. K. (2005). The AVISPA tool for automated validation of internet security protocols and applications, CAV 2005 (Vol. 3576), LNCS. Springer.

  • IBG. (2006). Biometric Market and Industry Report 2006–2010. International Biometric Group Report, pp. 60–61.

  • ISO/IEC JTC1 SC 37. (2007). BioAPI interworking protocol (BIP). ITU-T draft Recommendation.

  • ITU-T SG17 Q.8. (2006). X.tsm-part1: Telebiometrics system mechanism—general biometric authentication protocol and system model profile for telecommunication systems. ITU-T draft Recommendation.

  • ITU-T SG17 Q.8. (2007). X.tpp-part1: A guideline of technical and managerial countermeasures for biometric data security. ITU-T draft Recommendation.

  • Kang Y.G., Wang Z., Li R., Jiang C. (2007) A fixture design system for networked manufacturing. International Journal of Computer Integrated Manufacturing 20: 143–159

    Article  Google Scholar 

  • Larmouth, J. (1999). ASN.1 complete, open system solutions.

  • Leong K.K., Yu K.M., Lee W.B. (2003) A security model for distributed product data management system. Computers in Industry 50: 179–193

    Article  Google Scholar 

  • Liu F., Yin C., Liu S. (2000) Regional networked manufacturing system. Chinese Journal of Mechanical Engineering 13: 97–103

    Article  Google Scholar 

  • Molina A., Santaella A.R. (2006) Achieving e-manufacturing: multihead control and web technology for the implementation of a manufacturing execution system. Journal of Intelligent Manufacturer 17: 715–724

    Article  Google Scholar 

  • Montreuil B., Frayret J.M., D’amours S. (2000) A strategic framework for networked manufacturing. Computers in Industry 42: 299–317

    Article  Google Scholar 

  • NACFAM. (2001). Exploiting e-manufacturing: Interoperability of software systems used by U.S. manufacturers. National Coalition for Advanced Manufacturing.

  • National Industrial Security Center. (2008). Security research for high industrial technology (pp. 41–42). National Intelligence Service.

  • Shin, Y.-N. (2007). Protection profile of telecommunication device for telebiometric system mechanism (TSM). In The 8th International Common Criteria Conference Proceeding (pp. 51–53).

  • Wang, L., Li, A., & Xu, L.(2007). A security model for networked manufacturing system. In The 2007 International Computational Intelligence and Security Conference Proceeding (pp.747–749).

  • Yan J.Q. (2000) Digitized, network-based manufacturing. Industrial Engineering and Management 1: 8–11

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Woochang Shin.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shin, Y., Shin, W. A telebiometric system mechanism model and biometric network protocol for the security of networked manufacturing. J Intell Manuf 21, 595–605 (2010). https://doi.org/10.1007/s10845-009-0242-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10845-009-0242-5

Keywords

Navigation