Skip to main content

IT-Security Concept Cornerstones in Industrie 4.0

  • Conference paper
  • First Online:
Transactions on Engineering Technologies (IMECS 2017)

Included in the following conference series:

Abstract

The majority of enterprises identified the potential and the benefits of Industrie 4.0. However, many companies consider Industrie 4.0 more as a security challenge than an opportunity to optimize their processes or an enabler for new business models. Therefore effective security methods to protect the Industrie 4.0 systems and its associated values and assets are needed. Based on the connectivity infrastructure in the shopfloor, the diversity in the corporate landscape of the global mechanical and plant engineering ultimately causes that every enterprise has to develop its own way of production IT security management. The purpose of the followed sections is to analyze the challenges of IT security in Industrie 4.0 and to identify and combine the requirements from manufacturing automation, mechanical engineering, process engineering and the properties of cyber-physical systems with well-established core elements of IT security descriptions. A process model, which consists of a data model and an algorithm as its core element is developed to consider the challenges and to cope with the requirements. As a prototypical implementation security measures and their properties are presented in a technological Industrie 4.0 Toolbox IT-Security, as the result of the whole process and data model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Y. Wang, R. Fakhry, R. Anderl, Combined secure process and data model for IT-Security in Industrie 4.0, in Proceedings of the International MultiConference of Engineers and Computer Scientists 2017. Lecture Notes in Engineering and Computer Science, (Hong Kong, 15–17 Mar 2017), pp. 846–852

    Google Scholar 

  2. H. Kagermann, W. Wahlster, J. Helbig, Recommendations for implementing the strategic initiative Industrie 4.0—securing the future of German manufacturing industry, Apr 2013

    Google Scholar 

  3. E. Abele, R. Anderl, J. Metternich, A. Wank, O. Anokhin, A. Arndt, T. Meudt, M. Sauer, Effiziente Fabrik 4.0—Einzug von Industrie 4.0 in bestehende Produktionssysteme, published in ZWF—Zeitschrift für wirtschaftlichen Fabrikbetrieb, pp. 150–153 (2015)

    Google Scholar 

  4. BMBF, Zukunftsbild Industrie 4.0 (2014). http://www.bmbf.de/pubRD/Zukunftsbild_Industrie_40.pdf. Accessed 17 Nov 2016

  5. BITKOM, VDMA, ZVEI, Umsetzungsstrategie Industrie 4.0—Ergebnisbericht der Plattform Industrie 4.0, April 2015

    Google Scholar 

  6. R. Anderl, Industrie 4.0—technological approaches, use cases, and implementation, published in at—Automatisierungstechnik, vol. 63, pp. 753–765 (2015)

    Google Scholar 

  7. BMWi, IT-Sicherheit für Industrie 4.0 (2016). http://www.bmwi.de/BMWi/Redaktion/PDF/Publikationen/Studien/it-sicherheit-fuer-industrie-4-0-. Accessed 30 Nov 2016

  8. T. Bauernhansl, M. ten Hompel, B. Vogel-Heuser, Industrie 4.0 in Produktion, Automatisierung und Logistik. Wiesbaden (Springer Fachmedien Wiesbaden, 2014)

    Google Scholar 

  9. BMWi, Autonomik für die Industrie 4.0 (2016), http://www.autonomik.de/de/1003.php. Accessed 10 July 2016

  10. K. Böttinger, B. Filipovic, M. Hutle, S. Rohr, Leitfaden Industrie 4.0 Security—Handlungs-empfehlungen für den Mittelstand. Frankfurt am Main, VDMA (2016)

    Google Scholar 

  11. T. Phinney, IEC 62443: Industrial Network and System Security, Published in ISA (2016). http://www.isa.org/autowest/pdf/Industrial-Networking-and-Security/Phinneydone.pdf. Accessed 10 Nov 2016

  12. D. Kuipers, M. Fabro, Control Systems Cyber Security: Defense in Depth Strategies—Recommended Best Practice: Defense in Depth, INL-Idaho National Laboratory (2006)

    Google Scholar 

  13. Homeland Security, Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies—Control Systems Security: National Cyber Security Division (2009)

    Google Scholar 

  14. A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, S. Sastry, Challenges for Securing Cyber Physical Systems (2016), https://chess.eecs.berkeley.edu/pubs/601/. Accessed 10 Nov 2016

  15. Plattform Industrie 4.0, Neue Chancen für unsere Produktion—17 Thesen des Wissenschaftlichen Beirats der Plattform Industrie 4.0 (2016), http://www.its-owl.de/fileadmin/PDF/Industrie_4.0/Thesen_des_wissenschaftlichen_Beirats_Industrie_4.0.pdf. Accessed 19 Nov 2016

  16. R. Anderl, A. Picard, Y. Wang, J. Fleischer, S. Dosch, B. Klee, J. Bauer, Guideline Industrie 4.0—Guiding principles for the implementation of Industrie 4.0 in small and medium sized businesses, VDMA Forum Industrie 4.0, Frankfurt (2015). ISBN: 978-3-8163-0687-0

    Google Scholar 

  17. Y. Wang, G. Wang, R. Anderl, Generic Procedure Model to Introduce Industrie 4.0 in Small and Medium-sized Enterprises, in Proceedings of the World Congress on Engineering and Computer Science 2016. Lecture Notes in Engineering and Computer Science (San Francisco, USA, 19–21 Oct 2016), pp. 971–976. ISBN: 978-988-14048-2-4

    Google Scholar 

  18. K. Stouffer, J. Falco, K. Scarfone, Guide to Industrial Control Systems (ICS) Security—NIST Special Publication 800–82. Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC): Recommendations of the National Institute of Standards and Technology. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.353.2376. Accessed 15 Nov 2016

  19. Bundesamt für Sicherheit in der Informationstechnik, IT-Sicherheitskriterien (1989). https://www.bsi.bund.de/DE/Themen/ZertifizierungundAnerkennung/Produktzertifizierung/ZertifizierungnachCC/ITSicherheitskriterien/DeutscheITSicherheitskriterien/dtitsec.html. Accessed 19 Nov 2016

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yübo Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y., Fakhry, R., Rohr, S., Anderl, R. (2018). IT-Security Concept Cornerstones in Industrie 4.0. In: Ao, SI., Kim, H., Castillo, O., Chan, AS., Katagiri, H. (eds) Transactions on Engineering Technologies. IMECS 2017. Springer, Singapore. https://doi.org/10.1007/978-981-10-7488-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7488-2_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7487-5

  • Online ISBN: 978-981-10-7488-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics