Abstract
Problematic questions of the state of the Industry 4.0 mechatronic elements have been considered. The prerequisites determining the need to use external monitoring systems have been revealed. The type and statistical characteristics of behavioral patterns used for the analysis have been demonstrated. The proposed approach to the analysis of the autonomous object state is based on clustering methods and allows for the identification of the current state based on the processing of digitized signal traces. An experiment aimed at obtaining statistical information on various types of movement of a mechatronic device element has been described. The obtained data were processed using the k-means method. The approach to identifying the state of Industry 4.0 mechatronic elements based on the processing of digitized sequences received through external channels has been proposed. At the minimum time of the statistical information accumulation with the use of the proposed approach, it becomes possible to reveal differences in the manoeuvres performed by the object, with the probability close to 0.7. The proposed approach to the signal information processing can be used as an additional independent element for identifying the state of Industry 4.0 mechatronic elements. The approach can be quickly adapted to achieve the specified quality of the probabilistic assessment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chopra, A.: Paradigm shift and challenges in IoT security. In: Journal of Physics: Conference Series. V. 1432. First International Conference on Emerging Electrical Energy, Electronics and Computing Technologies; 30–31 October 2019, Melaka, Malaysia (2019). https://doi.org/10.1088/1742-6596/1432/1/012083
Teilans, A.A., Romanov, A.V., Merkuryev Yu, A., Dorogov, P.P., Kleins Ya, A., Potryasaev, S.A.: Assessment of cyber physical system risks with domain specific modelling and simulation. SPIIRAS Proceedings; 2018, vol. 4, no. 59, pp 115–139 (2018). https://doi.org/10.15622/sp.59.5
Gorbachev, I.E., Glukhov, A.P.: Modeling of processes of information security violations of critical infrastructure. In: SPIIRAS Proceedings, 2015, vol. 1, no. 38, pp 112–135 (2015). https://doi.org/10.15622/sp.38.7
Semenov, V.V., Lebedev, I.S.: Processing of signal information in problems of monitoring information security of unmanned autonomous objects. Sci. Tech. Bull. Inf.n Technol. Mech. Optics 19(3), 492–498 (2019). https://doi.org/10.17586/2226-1494-2019-19-3-492-498
Sukhoparov, M.E., Semenov, V.V., Lebedev, I.S.: Information security monitoring of elements of cyber-physical systems using artificial neural networks. Methods Tech. Means Inf. Saf. Provis. 27, 59–60 (2018)
Salakhutdinova, K.I., Lebedev, I.S., Krivtsova, I.E., Sukhoparov, M.E.: Research of the descriptor and ratio selection influence at signature formation in the task on identification of programs problems of information security. Comput. Syst. 1, 136–141 (2018)
Lebedev, I.S., Korzhuk, V., Krivtsova, I.E., Salakhutdinova, K.I, Sukhoparov, M.E, Tikhonov, D.: Using preventive measures for the purpose of assuring information security of wireless communication channels. In: Conference of Open Innovation Association, FRUCT 18. Series “Proceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technology, FRUCT-ISPIT 2016, pp 167–173 (2016)
Devesh, M., Kant, A.K., Suchit, Y.R., Tanuja, P., Kumar, S.N.: Fruition of CPS and IoT in context of industry 4.0. In: Choudhury, S., Mishra, R., Mishra, R.G., Kumar, A. (eds.) Intelligent Communication, Control and Devices. AISC, vol. 989, pp. 367–375. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-8618-3_39
Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proceedings of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp 85–101 (2004)
Semenov, V.V., Lebedev, I.S., Sukhoparov, M.E.: The state identification of individual cyber-physical system elements based on of the external behavioral characteristics. Appl. Inform. 13(77), 72–83 (2018)
Hayashi, Y.I., Homma, N., Watanabe, T., Price, W.O., Radasky, W.A. Introduction to the Special Section on Electromagnetic Information Security. IEEE Trans. Electromagnetic Compatibil. 55(3), 539–546 (2013)
Kocher, P., Jaffe, J., Jun, B.: Introduction to differential power analysis and related attacks. In: Proceedings CRYPTO 1998; 1998, LNCS, vol. 1109, pp 104–113 (1998)
de Souza Faria, G., Kim, H.Y.: Differential audio analysis: a new side-channel attack on PIN pads. Int. J. Inf. Secur. 18(1), 73–84 (2018). https://doi.org/10.1007/s10207-018-0403-7
Gupta, H., Sural, S., Atluri, V., Vaidya, J.: A side-channel attack on smartphones: deciphering key taps using built-in microphones. J. Comput. Secur. 26(2), 255–281 (2018). https://doi.org/10.3233/jcs-17975
Spatz, D., Smarra, D., Ternovskiy, I.: A review of anomaly detection techniques leveraging side-channel emissions. In: Proceedings of SPIE – The International Society for Optical Engineering. Cyber Sensing 2019, vol. 11011 (2019). https://doi.org/10.1117/12.2521450
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Sukhoparov, M.E., Semenov, V.V., Salakhutdinova, K.I., Boitsova, E.P., Lebedev, I.S. (2020). The State Identification of Industry 4.0 Mechatronic Elements Based on Behavioral Patterns. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2020 2020. Lecture Notes in Computer Science(), vol 12525. Springer, Cham. https://doi.org/10.1007/978-3-030-65726-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-65726-0_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-65725-3
Online ISBN: 978-3-030-65726-0
eBook Packages: Computer ScienceComputer Science (R0)