没有合适的资源?快使用搜索试试~ 我知道了~
Security on the Industrial Internet of Things
需积分: 9 12 下载量 132 浏览量
2018-06-02
15:34:20
上传
评论 1
收藏 1.1MB PDF 举报
温馨提示
SECURIT Y ON THE INDUSTRIAL INTERNET OF THINGS How companies can defend themselves against cyber attacks.
资源推荐
资源详情
资源评论
securitY
ON THE INDUSTRIAL
INTERNET OF THINGS
How companies can defend themselves against cyber attacks.
2
contents
Introduction .............................................................................................................................................................3
Industry in Change ................................................................................................................................................4
Automation and Digitization of Industrial Processes .....................................................................................4
The Internet of Things (IoT): local – regional – global ....................................................................................5
The Challenge: Secure Machine Communication .........................................................................................6
Risks .......................................................................................................................................................................6
Security Strategies ...............................................................................................................................................6
Defense in Depth ..................................................................................................................................................8
Security by Design ...............................................................................................................................................9
Protection Objectives in Industrial Networks – Confidentiality and Integrity .......................................... 10
Availability .......................................................................................................................................................... 11
Authenticity ........................................................................................................................................................ 12
The Essentials of a Secure Network ..............................................................................................................13
Interplay of modules, terminal devices and networks: a use case … .........................................................13
Safety precautions for SIM Cards ...................................................................................................................14
Attacks on SIM Security ................................................................................................................................... 16
Radio Scanners ................................................................................................................................................. 16
Data Platforms for Industry 4.0 Applications – The role of Cloud Computing on the IoT .................18
Secure Data Storage and Processing ............................................................................................................ 19
Security in the Cloud – Security at Work ....................................................................................................... 19
Further Requirements, Risks and Protective Mechanisms .......................................... ..............................19
A Practical Example: Recording and Relaying Machine Data ...................................................................20
The Basis: Secure Professional Cloud Data Centers .................................................................................. 22
Recommendations ............................................................................................................................................. 24
Annex ..................................................................................................................................................................... 26
SEcURITy ON THE INDUSTRIAL INTERNET OF THINGS contents
3
introDuction
More and more objects, sensors and actuators can be connected by means of intelligent soft-
ware solutions. Including connected industrial plant, machinery and equipment, they can all be
automated further by means of production, manufacturing and logistics processes, leading both to
many opportunities and to new security risks.
According to the German electrical engineering industry association VDE, seven out of ten decision
makers in industry have misgivings about IT security. They see it as the most serious obstacle to
the spread of Industry 4.0 in Germany. Federal Research Minister Johanna Wanka’s view is that
“without secure data interchange, Industry 4.0 or the fusion of production and services with the
Internet will not be possible”. IT security, she says, is one of the key preconditions for making use
of the opportunities that Industry 4.0 offers. Secure communi cation is the only way to create confi-
dence in the new networked production processes.
An industrial Internet of Things thus requires comprehensive security management in order to limit
access to interfaces, systems, sensors, (remote) maintenance access points and equipment to an
authorized group of persons or to authorized processes.
Without laying claim to be complete, this white paper illuminates relevant risks, protection targets,
and aspects of security for communication and data traffic in networks. In addition, it points out
possible solutions to ensure that connecting machines, and storing and sharing data are largely
automated and secure.
The degree of security that a company needs must always be considered in the context of its busi-
ness model. There is no patent remedy or 100 percent guarantee of security, but a security solution
corresponding to the risks in question can certainly be achieved.
securitY Will MaKe inDustrY 4.0 Possible
IT security is one of the central preconditions for making use of
the opportunities of Industry 4.0. On the following pages you will
find solutions for connecting machines, and for making data inter-
change largely automated and secure.
SEcURITy ON THE INDUSTRIAL INTERNET OF THINGS introDuction
4
inDustrY in chanGe
autoMation anD DiGitiZation oF inDustrial Processes
Comprehensive and cross-enterprise digitization and automation characterize the fourth industrial
revolution. They include remote maintenance of plant and machinery by means of an Internet of
Things (IoT) solution, and self-controlling, decentralized processes in production facilities, and
connection of management software and production systems. Operating resources such as plant
and machinery are, along with hardware and software, connected devices and employees, cyber-
physical systems (CPS) that can fulfill customers’ requirements swiftly and flexibly in “smart factories”.
Studies and experts forecast a perceptible growth impetus as a result of Industry 4.0. According to
a survey by Bitkom and the Fraunhofer IAO Institute of Labor Economics and Organization (IAO),
a value-added potential of EUR 78 billion awaits the machinery and plant engineering, electrical
engineering, automotive, and chemical industries, agriculture, and information and communication
technology by 2025. This corresponds to an average annual growth of 1.7 percent. Experts say
that digitization offers small and midrange enterprises in particular opportunities to improve their
competitiveness, and hold their own against (international) competition.
SEcURITy ON THE INDUSTRIAL INTERNET OF THINGS inDustrY in chanGe
5
the internet oF thinGs (iot): local – reGional – Global
Where process automation is concerned, the digital factory is already a
reality. The constantly growing deployment of automated production
equipment and robots, and their consistent connection in a local area
such as a production facility are supported by network technologies like
Ethernet, WLAN, Bluetooth, RFID or Low Power Wide Area Networks. In
addition, these technologies facilitate to some extent the networking of
regional locations, as long as their respective network infrastructures do
not differ totally from one another.
Telcos such as Deutsche Telekom provide building blocks for secure supra-
regional or global connections in the form of network technologies for
Wide Area Networks. Their solutions include, in particular, broadband
connections like fiber optic, and cellular or mobile connections. LTE
technology delivers performance on a par with that of a fixed-line network.
LTE also shortens latencies – with the result that LTE mobile networks
provide a sound basis for the Internet of Things and Industry 4.0.
IDC market researchers estimate that by 2020 about 30 billion “things”
such as machines, cars, washing machines and refrigerators will be con-
nected via the Internet around the world. With the adoption of the IPv6
standard the technical preconditions are in place. Instead of around four
billion addresses as in the days of IPv4, about 340 sextillion addresses
can be allocated under IPv6. So 30 billion connected “things” are just
the beginning – and nowhere near the end of the IoT and Industry 4.0.
In these IoT networks individual components will talk with cyber-physical
systems. They will do so on the basis of previously passive devices or
things being equipped with microcontrollers, identifiers, sensors and
actuators that are known as embedded systems. They serve inter alia to
receive and relay data, to identify objects unequivocally, to determine
status, and to check and actively control (production) processes. A smart
container, for example, can be identified indirectly via an RFID transponder.
Depending on how frequently data is recorded and transmitted, the trans-
ponder can then relay at any time required information about the container’s
most recent position and contents. Standardized interfaces and defined
protocols ensure that interaction processes between modules or intelligent
systems are executed and can, as required, be adjusted or replaced at
any time.
reMote Maintenance oF MachinerY
at DürKoPP aDler aG.
The sewing machine manufacturer Dürkopp Adler demonstrates
opportunities that can be opened up by means of connected
machines. The Bielefeld-based company has connected its in-
dustrial sewing machines in collaboration with Deutsche Telekom.
If the customer so wishes, the manufacturer can monitor from its
head office in Germany the status of machinery at a factory in,
say, Bangladesh. If the monitoring system reports problems, the
configuration can be adjusted from Bielefeld.
Dürkopp Adler reduces in this way both machine downtimes
and the cost of sending service technicians out to rectify faults
on site. To check connected sewing machines, Dürkopp Adler
uses the Cloud of Things (see also practical example on page
20), a cloud-based software platform that manages, controls and
evaluates data from connected devices, and also contains certifi-
cated hardware components and SIM cards with a data tariff.
SEcURITy ON THE INDUSTRIAL INTERNET OF THINGS inDustrY in chanGe
剩余27页未读,继续阅读
资源评论
dmn0123
- 粉丝: 13
- 资源: 17
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- (源码)基于ROS的PickPlace机械臂控制系统.zip
- (源码)基于树莓派(Raspberry Pi)的环境监控与警报系统.zip
- (源码)基于Spring Boot和LayUI的仓库管理系统.zip
- (源码)基于C++的通用数据处理系统.zip
- (源码)基于C语言的操作系统进程调度模拟实验.zip
- (源码)基于DSO算法的视觉里程计系统.zip
- (源码)基于C语言Unixlike操作系统框架的shell程序.zip
- (源码)基于Java Web的学生资料管理系统.zip
- (源码)基于嵌入式系统的Marble Run项目.zip
- (源码)基于Spring Boot和Vue的博客支付管理系统.zip
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功