Skip to main content

The State Identification of Industry 4.0 Mechatronic Elements Based on Behavioral Patterns

  • Conference paper
  • First Online:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (NEW2AN 2020, ruSMART 2020)

Abstract

Problematic questions of the state of the Industry 4.0 mechatronic elements have been considered. The prerequisites determining the need to use external monitoring systems have been revealed. The type and statistical characteristics of behavioral patterns used for the analysis have been demonstrated. The proposed approach to the analysis of the autonomous object state is based on clustering methods and allows for the identification of the current state based on the processing of digitized signal traces. An experiment aimed at obtaining statistical information on various types of movement of a mechatronic device element has been described. The obtained data were processed using the k-means method. The approach to identifying the state of Industry 4.0 mechatronic elements based on the processing of digitized sequences received through external channels has been proposed. At the minimum time of the statistical information accumulation with the use of the proposed approach, it becomes possible to reveal differences in the manoeuvres performed by the object, with the probability close to 0.7. The proposed approach to the signal information processing can be used as an additional independent element for identifying the state of Industry 4.0 mechatronic elements. The approach can be quickly adapted to achieve the specified quality of the probabilistic assessment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chopra, A.: Paradigm shift and challenges in IoT security. In: Journal of Physics: Conference Series. V. 1432. First International Conference on Emerging Electrical Energy, Electronics and Computing Technologies; 30–31 October 2019, Melaka, Malaysia (2019). https://doi.org/10.1088/1742-6596/1432/1/012083

  2. Teilans, A.A., Romanov, A.V., Merkuryev Yu, A., Dorogov, P.P., Kleins Ya, A., Potryasaev, S.A.: Assessment of cyber physical system risks with domain specific modelling and simulation. SPIIRAS Proceedings; 2018, vol. 4, no. 59, pp 115–139 (2018). https://doi.org/10.15622/sp.59.5

  3. Gorbachev, I.E., Glukhov, A.P.: Modeling of processes of information security violations of critical infrastructure. In: SPIIRAS Proceedings, 2015, vol. 1, no. 38, pp 112–135 (2015). https://doi.org/10.15622/sp.38.7

  4. Semenov, V.V., Lebedev, I.S.: Processing of signal information in problems of monitoring information security of unmanned autonomous objects. Sci. Tech. Bull. Inf.n Technol. Mech. Optics 19(3), 492–498 (2019). https://doi.org/10.17586/2226-1494-2019-19-3-492-498

  5. Sukhoparov, M.E., Semenov, V.V., Lebedev, I.S.: Information security monitoring of elements of cyber-physical systems using artificial neural networks. Methods Tech. Means Inf. Saf. Provis. 27, 59–60 (2018)

    Google Scholar 

  6. Salakhutdinova, K.I., Lebedev, I.S., Krivtsova, I.E., Sukhoparov, M.E.: Research of the descriptor and ratio selection influence at signature formation in the task on identification of programs problems of information security. Comput. Syst. 1, 136–141 (2018)

    Google Scholar 

  7. Lebedev, I.S., Korzhuk, V., Krivtsova, I.E., Salakhutdinova, K.I, Sukhoparov, M.E, Tikhonov, D.: Using preventive measures for the purpose of assuring information security of wireless communication channels. In: Conference of Open Innovation Association, FRUCT 18. Series “Proceedings of the 18th Conference of Open Innovations Association FRUCT and Seminar on Information Security and Protection of Information Technology, FRUCT-ISPIT 2016, pp 167–173 (2016)

    Google Scholar 

  8. Devesh, M., Kant, A.K., Suchit, Y.R., Tanuja, P., Kumar, S.N.: Fruition of CPS and IoT in context of industry 4.0. In: Choudhury, S., Mishra, R., Mishra, R.G., Kumar, A. (eds.) Intelligent Communication, Control and Devices. AISC, vol. 989, pp. 367–375. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-8618-3_39

    Chapter  Google Scholar 

  9. Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proceedings of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp 85–101 (2004)

    Google Scholar 

  10. Semenov, V.V., Lebedev, I.S., Sukhoparov, M.E.: The state identification of individual cyber-physical system elements based on of the external behavioral characteristics. Appl. Inform. 13(77), 72–83 (2018)

    Google Scholar 

  11. Hayashi, Y.I., Homma, N., Watanabe, T., Price, W.O., Radasky, W.A. Introduction to the Special Section on Electromagnetic Information Security. IEEE Trans. Electromagnetic Compatibil. 55(3), 539–546 (2013)

    Google Scholar 

  12. Kocher, P., Jaffe, J., Jun, B.: Introduction to differential power analysis and related attacks. In: Proceedings CRYPTO 1998; 1998, LNCS, vol. 1109, pp 104–113 (1998)

    Google Scholar 

  13. de Souza Faria, G., Kim, H.Y.: Differential audio analysis: a new side-channel attack on PIN pads. Int. J. Inf. Secur. 18(1), 73–84 (2018). https://doi.org/10.1007/s10207-018-0403-7

    Article  Google Scholar 

  14. Gupta, H., Sural, S., Atluri, V., Vaidya, J.: A side-channel attack on smartphones: deciphering key taps using built-in microphones. J. Comput. Secur. 26(2), 255–281 (2018). https://doi.org/10.3233/jcs-17975

  15. Spatz, D., Smarra, D., Ternovskiy, I.: A review of anomaly detection techniques leveraging side-channel emissions. In: Proceedings of SPIE – The International Society for Optical Engineering. Cyber Sensing 2019, vol. 11011 (2019). https://doi.org/10.1117/12.2521450

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Viktor V. Semenov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sukhoparov, M.E., Semenov, V.V., Salakhutdinova, K.I., Boitsova, E.P., Lebedev, I.S. (2020). The State Identification of Industry 4.0 Mechatronic Elements Based on Behavioral Patterns. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2020 2020. Lecture Notes in Computer Science(), vol 12525. Springer, Cham. https://doi.org/10.1007/978-3-030-65726-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-65726-0_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-65725-3

  • Online ISBN: 978-3-030-65726-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics