Skip to main content
Log in

Hare and Tortoise

Can Industry 4.0 win the race against Counterfeiting and Piracy?

  • Schwerpunkt
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

Abstract

Although there are many legal, technical and organizational protective measures the damage caused by counterfeiting has been continuously growing. Industry 4.0 will make the situation even worse: the horizontal integration of inter-corporation value network and the vertical integration of factory inside give new starting points for know-how theft. Unfortunately the necessary protective measures such as a globally accepted trust infrastructure that will permit (legally, technically and trustworthy) consistent verification and authentication methods will only be available in years. A possible way for OEMs to protect their products may be on the expansion of their products to smart products. Part of this work will also be published at ISSE 2015 [6].

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Refrences

  1. VDMA: VDMA Study Product Piracy, 2014

  2. Scott Cadzow, Georgios Giannopoulos Alain Merle, Tyson Storch, Claire Vishik, Slawomir Gorniak, Demosthenes Ikono: Supply Chain Integrity: An overview of the ICT supply chain risks and challenges, and vision for the way forward. ENISA, 2012, URL https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/sci/at_download/fullReport

    Google Scholar 

  3. Brice Colombier, Lilian Bossuet: Survey of hardware protection of design data for integrated circuits and intellectual properties. IET Comput. Digit. Tech., Vol. 8, 2014, Iss. 6, pp. 274–287

    Article  Google Scholar 

  4. Bartol Filipovic, Oliver Schimmel: Protecting embedded systems against product piracy: technological background and preventive measures. Fraunhofer AISEC, 2012, URL https://www.aisec.fraunhofer.de/content/dam/aisec/Dokumente/Publikationen/Studien_TechReports/englisch/Whitepaper_ProductProtection.pdf

    Google Scholar 

  5. International Chamber of Commerce: Estimating the global economic and social impacts of counterfeiting and piracy. Frontier Economics Ltd, London, 2011, URL http://www.iccwbo.org/Data/Documents/Bascap/Global-Impacts-Study-Full-Report/

  6. Christian Thiel, Christoph Thiel: Industry 4.0–Challenges in Anti-Counterfeiting. To appear in ISSE 2015

    Google Scholar 

  7. Henning Kagermann, Wolfgang Wahlster, Johannes Helbigacatech: Securing the future of German manufacturing industry: Recommendations for implementing the strategic initiative INDUSTRIE 4.0. acatech, Industry 4.0 Working Group, 2013, URL http://www.acatech.de/fileadmin/user_upload/Baumstruktur_nach_Website/Acatech/root/de/Material_fuer_Sonderseiten/Industrie_4.0/Final_report__Industrie_4.0_accessible.pdf

    Google Scholar 

  8. Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier: Challenges in Anti-Counterfeiting of Cyber-Physical Systems. International Journal of So-cial, Behavioral, Educational, Economic and Management Engineering Vol:9, No:5, 2015

    Google Scholar 

  9. Meiwald, Thomas.: Konzepte zum Schutz vor Produktpiraterie und unerwünschtem Know-how-Abfluss. Dr. Hut Verlag, München 2011, ISBN 978- 3-8439-0167-3

    Google Scholar 

  10. PROFIBUS & PROFINET International (PI): PROFINET Security Guideline Version 2.0. PROFIBUS Nutzerorganisation e.V, Order No.: 7.002, 2013 http://www.profibus.com/nc/download/specifications-standards/downloads/profinet-security-guideline/download/16511/

  11. Masoud Rostami, Farinaz Koushanfar, Ramesh Karri: A Primer on Hardware Security: Models, Methods, and Metrics. Proceedings of the IEEE Vol. 102, No. 8, 2014, Digital Object Identifier: 10.1109/JPROC.2014.2335155

    Article  Google Scholar 

  12. VDMA Working Group Product and Know-how Protection: Product and Know how Protection Guidelines / A Generic Process Model for Introducing Means of Protection against Product Piracy and the Loss of Know-How. 2013, 1st edition DuD

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christian Thiel.

Additional information

Prof. Dr. Christian Thiel Dozent für Wirt schaftsinformatik, Institut für Infor mations und Prozessmanagement FHS St. Gallen, Hochschule für Angewandte Wissenschaften.

Prof. Dr. Christoph Thiel Professor für sichere und zuverlässige Softwaresysteme an der Fachhochschule Bielefeld, Standort Minden

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thiel, C., Thiel, C. Hare and Tortoise. Datenschutz Datensich 39, 663–667 (2015). https://doi.org/10.1007/s11623-015-0494-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-015-0494-5

Navigation