Advertisement

Security Challenges in the Industry 4.0 Era

  • Mohammed M. AlaniEmail author
  • Mohamed Alloghani
Chapter
  • 506 Downloads

Abstract

Although the concept of Industry 4.0 was introduced in 2011 at the Hannover Fair, it was only recently that it gained major attention. The fourth industrial revolution, referred to as Industry 4.0, is based mainly on cyber-physical systems along with their supporting technologies. The four design principles of Industry 4.0 are interoperability, information transparency, technical assistance, and decentralized decisions. Each one of these design principles generates new attack surfaces that can be exploited by malicious attackers. As with any other system, security challenges arise with every new technology used. These challenges can range from simple threats that can easily be mitigated or even ignored, all the way up to threats that can render the whole system unusable. In this chapter, we introduce a detailed survey of threats and security challenges in different components of the Industry 4.0 systems. These threats will be categorized based on their possible impact on systems, and information about some countermeasures will be introduced as well.

Keywords

Cyber-physical systems Internet of Things Cognitive computing Cloud computing Elastic Compute Cloud (EC2) Industry 4.0 components Augmented reality Cybernetic systems Cyber-Physical Production Systems (CPPSs) Business cyber-espionage Denial-of-service (DoS) Smart Factory IoT-enabled manufacturing Security of legacy systems Data-driven cybersecurity 

References

  1. Akaev, A., Rudskoi, A., & Devezas, T. (2018). Digital economy and the models of income distribution in the society. In SHS Web of Conferences, Vol. 44. EDP Sciences, 2018, p. 00005.Google Scholar
  2. Alani, M. M. (2016). Elements of cloud computing security: A survey of key practicalities. Springer.Google Scholar
  3. Aloul, F., Al-Ali, A., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1(1), 1–6.CrossRefGoogle Scholar
  4. Ani, U. P. D., He, H., & Tiwari, A. (2017). Review of cybersecurity issues in industrial critical infrastructure: Manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32–74.CrossRefGoogle Scholar
  5. Antao, L., Pinto, R., Reis, J., Gonçalves, G. (2018). Requirements for testing and validating the industrial internet of things. In 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2018, pp. 110–115.Google Scholar
  6. Baena, F., Guarin, A., Mora, J., Sauza, J., & Retat, S. (2017). Learning factory: The path to industry 4.0. Procedia Manufacturing, 9, 73–80.CrossRefGoogle Scholar
  7. Baheti, R., & Gill, H. (2011). Cyber-physical systems. The Impact of Control Technology, 12(1), 161–166.Google Scholar
  8. Bahri, A., Bouaziz, R., & Gargouri, F. (2012). “Towards an efficient datalog based evaluation of the FSAQL query language. In International Workshop on Resource Discovery. Springer, 2012, pp. 150–180.Google Scholar
  9. Balador, A., Ericsson, N., & Bakhshi, Z. (2017). Communication middleware technologies for industrial distributed control systems: A literature review. In Emerging Technologies and Factory Automation (ETFA), 2017 22nd IEEE International Conference on. IEEE, 2017, pp. 1–6.Google Scholar
  10. Barwick, H. (2012). “The ‘Four Vs’ of big data.” Implementing information infrastructure symposium, Computerworld Australia. http://www.computerworld.com.au/article/ 396198/iiis_four_vs_big_data/.
  11. Beissel, S. (2016). Cybersecurity investments. Springer.Google Scholar
  12. Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: A survey. Future Generation Computer Systems, 56, 684–700.CrossRefGoogle Scholar
  13. Boye, C. A., Kearney, P., & Josephs, M. (2018). Cyber-risks in the industrial internet of things (IIoT): To- wards a method for continuous assessment. In International Conference on Information Security. Springer, 2018, pp. 502–519.Google Scholar
  14. Cassandras, C. G. (2016). Smart cities as cyber-physical social systems. Engineering, 2(2), 156–158.CrossRefGoogle Scholar
  15. Cazzola, P., Gorner, M., Schuitmaker, R., & Maroney, E. (2018). Global ev outlook 2018. France: International Energy Agency.Google Scholar
  16. Chaâri, R., Ellouze, F., Koubâa, A., Qureshi, B., Pereira, N., Youssef, H., & Tovar, E. (2016). Cyber-physical systems clouds: A survey. Computer Networks, 108, 260–278. Elsevier.CrossRefGoogle Scholar
  17. Ehrlich, M., Wisniewski, L., Trsek, H., & Jasperneite, J. (2018) Modelling and automatic mapping of cyber security requirements for industrial applications: Survey, problem exposition, and research focus. In 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS). IEEE, 2018, pp. 1–9.Google Scholar
  18. Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud computing: Concepts, technology, & architecture. Pearson Education.Google Scholar
  19. Falco, G., Caldera, C., & Shrobe, H. (2018). IIoT cybersecurity risk modeling for SCADA systems. IEEE Internet of Things Journal.Google Scholar
  20. Fernández-Caramés, T. M., & Fraga-Lamas, P. (2018). A review on human-centered IoT-connected smart labels for the industry 4.0. IEEE Access, 6, 25939–25957.  https://doi.org/10.1109/ACCESS.2018.2833501.CrossRefGoogle Scholar
  21. Fraile, F., Tagawa, T., Poler, R., & Ortiz, A. (2018). Trustworthy industrial IoT gateways for interoperability platforms and ecosystems. IEEE Internet of Things Journal, 5(6), 4506–4514.  https://doi.org/10.1109/JIOT.2018.2832041.CrossRefGoogle Scholar
  22. Geissbauer, R., Vedso, J., & Schrauf, S. (2016). Industry 4.0: Building the digital enterprise. Retrieved from PwC Website: https://www.pwc.com/gx/en/industries/industries-4.0/landing-page/industry-4.0-building-your-digital-enterprise-april-2016.pdf
  23. Graves, A., Mohamed, A.-R., & Hinton, G. (2013). Speech recognition with deep recurrent neural net- works. In Acoustics, speech and signal processing (ICASSP), 2013 IEEE international conference on. IEEE, 2013, pp. 6645–6649.Google Scholar
  24. Gubán, M., & Kovács, G. (2017). Industry 4.0 conception. Acta Technica Corviniensis-Bulletin of Engineering, 10(1), 111.Google Scholar
  25. Hartmann, M., & Halecker, B. (2015) Critical infrastructure security in smart ecosystems,” in Future City Challenges Conference, HTW Berlin & Metropolia, Berlin, Germany, Vol. 15, p. 16.Google Scholar
  26. He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., & Gabrys, B. (2016) “The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In Evolutionary Computation (CEC), 2016 IEEE Congress on. IEEE, 2016, pp. 1015–1021.Google Scholar
  27. Heikkilä, M., Rättyä, A., Pieskä, S., & Jämsä, J. (2016) Security challenges in small-and medium-sized manufacturing enterprises. In Small-scale Intelligent Manufacturing Systems (SIMS), International Symposium on. IEEE, 2016, pp. 25–30.Google Scholar
  28. Helo, P., Suorsa, M., Hao, Y., & Anussornnitisarn, P. (2014). Toward a cloud-based manufacturing execution system for distributed manufacturing. Computers in Industry, 65(4), 646–656.CrossRefGoogle Scholar
  29. Herterich, M. M., Uebernickel, F., & Brenner, W. (2015). The impact of cyber-physical systems on in- dustrial services in manufacturing. Procedia CIRP, 30, 323–328.CrossRefGoogle Scholar
  30. Hertzberg, J., & Chatila, R. (2008). Ai reasoning methods for robotics. In B. Siciliano & O. Khatib (Eds.), Springer handbook of robotics (pp. 207–223). Berlin/Heidelberg: Springer.CrossRefGoogle Scholar
  31. Hoeller, A., & Toegl, R.(2018) Trusted platform modules in cyber-physical systems: On the interference between security and dependability. In 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2018, pp. 136–144.Google Scholar
  32. Hsu, C.-L., & Lin, J. C.-C. (2016). An empirical examination of consumer adoption of internet of things services: Network externalities and concern for information privacy perspectives. Computers in Human Behavior, 62, 516–527.CrossRefGoogle Scholar
  33. IBM Watson. https://www.ibm.com/watson/. Accessed September 15, 2018.
  34. IoT devices used in DDoS attacks. https://www.ibm.com/blogs/internet-of-things/ddos-iot-platform-security/. Accessed September 20, 2018.
  35. Johnson, R. C. (1993). What is cognitive computing? Dr. Dobb’s Journal, 18(2), 18–24.Google Scholar
  36. Kagermann, H. (2015). Change through digitization—value creation in the age of industry 4.0. In Management of permanent change. Springer, 2015, pp. 23–45.Google Scholar
  37. Kelly, J. E. (2015). Computing, cognition and the future of knowing. Whitepaper, IBM Research, p. 2.Google Scholar
  38. Khan, A., & Turowski, K. (2016) A survey of current challenges in manufacturing industry and preparation for industry 4.0. In Proceedings of the First International Scientific Conference “Intelligent Information Technologies for Industry”(IITI’16). Springer, 2016, pp. 15–26.Google Scholar
  39. Khondoker, R., Larbig, P., Scheuermann, D., Weber, F., & Bayarou, K. (2017) Addressing industry 4.0 security by software-defined networking. In Guide to Security in SDN and NFV. Springer, 2017, pp. 229–251.Google Scholar
  40. Kopetz, H. (2011). Internet of things. In Real-time systems. Real-time systems series. (pp. 307–323). Boston: Springer.zbMATHGoogle Scholar
  41. Lee, J., Kao, H.-A., & Yang, S. (2014). Service innovation and smart analytics for industry 4.0 and big data environment. Procedia CIRP, 16, 3–8.CrossRefGoogle Scholar
  42. Leitão, P., Colombo, A. W., & Karnouskos, S. (2016). Industrial automation based on cyber-physical systems technologies: Prototype implementations and challenges. Computers in Industry, 81, 11–25.CrossRefGoogle Scholar
  43. Liddy, E. D. (2001). Natural language processing. In Encyclopedia of library and information science (2nd ed.). New York: Marcel Decker, Inc.Google Scholar
  44. Liu, Y., & Xu, X. (2017). Industry 4.0 and cloud manufacturing: A comparative analysis. Journal of Manufacturing Science and Engineering, 139(3), 034701.CrossRefGoogle Scholar
  45. Liu, S., Liu, X. P., & El Saddik, A. (2013) Denial-of-service (dos) attacks on load frequency control in smart grids. In Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES. IEEE, 2013, pp. 1–6.Google Scholar
  46. Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., & Leung, V. C. (2018). A survey on security threats and defensive techniques of machine learning: A data driven view. IEEE Access, 6., pp. 12 103–12 117.Google Scholar
  47. Magruk, A. (2016). Uncertainty in the sphere of the industry 4.0–potential areas to research. Business, Management and Education, 14(2), 275–291.CrossRefGoogle Scholar
  48. Malina, L., Dzurenda, P., Hajny, J., & Martinasek, Z. (2018) Assessment of cryptography support and security on programmable smart cards. In 2018 41st International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2018, pp. 1–5.Google Scholar
  49. de Man, J. C., & Strandhagen, J. O. (2017). An industry 4.0 research agenda for sustainable business models. Procedia CIRP, 63, 721–726.CrossRefGoogle Scholar
  50. Masoni, R., Ferrise, F., Bordegoni, M., Gattullo, M., Uva, A. E., Fiorentino, M., Carrabba, E., & Di Donato, M. (2017). Supporting remote maintenance in industry 4.0 through augmented reality. Procedia Manufacturing, 11, 1296–1302.CrossRefGoogle Scholar
  51. Meany, T. (2017). Functional safety and industrie 4.0. In Signals and Systems Conference (ISSC), 2017 28th Irish. IEEE, 2017, pp. 1–7.Google Scholar
  52. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (draft) (p. 800). NIST Spec. Publ. 7, National Institute of Standards and Technology, Gaithersburg.Google Scholar
  53. Murphy, K. (2012). Machine learning — A probabilistic perspective. The MIT Press, National Institute of Standards and Technology, Gaithersburg.Google Scholar
  54. Osorno, M., Millar, T., & Rager, D. (2011). Coordinated cybersecurity incident handling: Roles, processes, and coordination networks for crosscutting incidents. Johns Hopkins University Laurel MD Applied Physics Lab, Tech. Rep.Google Scholar
  55. Pereira, T., Barreto, L., & Amaral, A. (2017). Network and information security challenges within industry 4.0 paradigm. Procedia Manufacturing, 13, 1253–1260.CrossRefGoogle Scholar
  56. Poindexter, D. F. (2018). The Chinese information war: Espionage, cyberwar, communications control and related threats to United States interests. McFarland.Google Scholar
  57. Rennung, F., Luminosu, C. T., & Draghici, A. (2016). Service provision in the framework of industry 4.0. Procedia-Social and Behavioral Sciences, 221, 372–377.CrossRefGoogle Scholar
  58. Sadeghi, A.-R., Wachsmann, C., & Waidner, M. (2015). Security and privacy challenges in industrial internet of things. In Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE. IEEE, 2015, pp. 1–6.Google Scholar
  59. Shahzad, A., Kim, Y.-G., & Elgamoudi, A. (2017). Secure IoT platform for industrial control systems. In Platform Technology and Service (PlatCon), 2017 International Conference on. IEEE, 2017, pp. 1–6.Google Scholar
  60. Smith-Atakan, S. (2006). Human-computer interaction (pp. 54–57). London: Thomson Learning.Google Scholar
  61. Stock, T., & Seliger, G. (2016). Opportunities of sustainable manufacturing in industry 4.0. Procedia CIRP, 40, 536–541.CrossRefGoogle Scholar
  62. The only coke machine on the internet. https://www.cs.cmu.edu/~coke/history_long.txt. Accessed September 15, 2018.
  63. Tupa, J., Simota, J., & Steiner, F. (2017). Aspects of risk management implementation for industry 4.0. Procedia Manufacturing, 11, 1223–1230.CrossRefGoogle Scholar
  64. Ustundag, A., & Cevikcan, E. (2018). Industry 4.0: Managing the digital transformation. Cham: Springer.CrossRefGoogle Scholar
  65. Vaidyaa, S., Ambadb, P., & Bhoslec, S. (2018). Industry 4.0–a glimpse. Design Engineering, 2351, 9789.Google Scholar
  66. Waidner, M., & Kasper, M. (2016) Security in industrie 4.0-challenges and solutions for the fourth industrial revolution. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2016. IEEE, 2016, pp. 1303–1308.Google Scholar
  67. Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5), 1344–1371.CrossRefGoogle Scholar
  68. Wang, S., Wan, J., Zhang, D., Li, D., & Zhang, C. (2016a). Towards smart factory for industry 4.0: A self- organized multi-agent system with big data based feedback and coordination. Computer Networks, 101, 158–168.CrossRefGoogle Scholar
  69. Wang, S., Wan, J., Li, D., & Zhang, C. (2016b). Implementing smart factory of industrie 4.0: An outlook. International Journal of Distributed Sensor Networks, 12(1), 3159805.CrossRefGoogle Scholar
  70. Waslo, R., Lewis, T., Hajj, R., & Carton, R. (2017). Industry 4.0 and cybersecurity: Managing risk in an age of connected production. Deloitte University Press, National Institute of Standards and Technology, Gaithersburg.Google Scholar
  71. Weyer, S., Schmitt, M., Ohmer, M., & Gorecky, D. (2015). Towards industry 4.0-standardization as the crucial challenge for highly modular, multi-vendor production systems. IFAC-Papersonline, 48(3), 579–584.CrossRefGoogle Scholar
  72. Wolf, W. H. (2009). Cyber-physical systems. IEEE Computer, 42(3), 88–89.CrossRefGoogle Scholar
  73. Yan, J., Meng, Y., Lu, L., & Li, L. (2017). Industrial big data in an industry 4.0 environment: Challenges, schemes, and applications for predictive maintenance. IEEE Access, 5., pp. 23 484–23 491.Google Scholar
  74. Zawadzki, P., & Żywicki, K. (2016). Smart product design and production control for effective mass customization in the industry 4.0 concept. Management and Production Engineering Review, 7(3), 105–112.CrossRefGoogle Scholar
  75. Zezulka, F., Marcon, P., Vesely, I., & Sajdl, O. (2016). Industry 4.0–an introduction in the phenomenon. IFAC-PapersOnLine, 49(25), 8–12.CrossRefGoogle Scholar
  76. Zhou, L., Yeh, K.-H., Hancke, G., Liu, Z., & Su, C. (2018). Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints. IEEE Signal Processing Magazine, 35(5), 76–87.CrossRefGoogle Scholar
  77. Zuehlke, D. (2010). Smartfactory—Towards a factory-of-things. Annual Reviews in Control, 34(1), 129–138.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Khawarizmi International CollegeAbu DhabiUAE
  2. 2.Liverpool John Moores UniversityLiverpoolUK

Personalised recommendations