Featured Research

from universities, journals, and other organizations

Security tools for Industry 4.0

Date:
March 5, 2014
Source:
Fraunhofer-Gesellschaft
Summary:
An increasing number of unsecured, computer-guided production machinery and networks in production facilities are gradually evolving into gateways for data theft. New security technologies may directly shield the sensitive data that is kept there.

To protect the applications of Industry 4.0 – such as Fraunhofer IGD’s visual computing solutions – Fraunhofer SIT engineered security solutions that safeguard both people and equipment.
Credit: © Fraunhofer IGD

An increasing number of unsecured, computer-guided production machinery and networks in production facilities are gradually evolving into gateways for data theft. New security technologies may directly shield the sensitive data that is kept there.

You can hear the metallic buzz as the milling machine bores into the workpiece. Just a few last drill holes, and the camshaft is complete. The computer-guided machine performed the entire job -- thanks to the digital manufacturing data that were uploaded onto its embedded computer beforehand. Everything runs without a hitch, only -- the data are stolen.

Manufacturing data determine the production process for a product, and are just as valuable today as the design plans. They contain distinctive, inimitable information about the product and its manufacture. Whoever possesses this info merely needs the right equipment, et voilà: the pirated or counterfeit product is done. Whereas design data are well-protected from unauthorized outside access today, production data often lie exposed and unsecured in the computer-assisted machinery. An infected computer on the network, or just a USB stick, are all a thief would need to heist the data. Or hackers could directly attack the IT network -- for instance, through unsecured network components, like routers or switches.

Encrypting manufacturing data upon creation

Researchers at the Fraunhofer Institute for Secure Information Technology SIT in Darmstadt are exhibiting how these security gaps can be closed up at this year's CeBIT from 10 to 14 March, 2014 (Hall 9, Booth E40). They will be presenting, for example, a software application that immediately encrypts manufacturing data as soon as they emerge. Integrated into computer and equipment, they ensure that both communicate with each other through a protected transportation channel and that only licensed actions are executed. "To the best of our knowledge, no comparable safeguard has previously existed for manufacturing data that reside directly in the machine tool," states Thomas Dexheimer from the SIT's Security Testlab. Digital Rights Management (DRM) controls all important parameters of the assignment, such as designated use, quantity, etc. This way, brand manufacturers are able to guarantee that even external producers can only produce an authorized quantity, as instructed in advance -- and no additional pirated units.

His colleague at SIT, Dr. Carsten Rudolph, is more involved with secured networks. At CeBIT, Rudolph will exhibit his "Trusted Core Network." "Hackers can also gain access to sensitive production data via unsecured network components. These are small computers themselves, and can be easily manipulated," says the "Trust and Compliance" department head at SIT. In order to prevent this, he called upon one piece of technology that, for the most part, lies dormant (in deep slumber) and, for all intents and purposes, unused on our PCs: the Trusted Platform Module. This relates to a small computer chip that can encrypt, decrypt, and digitally sign the data. Installed into a network component, it indicates which software is running on the component, and assigns a distinct identity to it. "As soon as the software changes in a component, the adjacent component registers this occurrence and notifies the administrator. Hacker attacks can be exposed quickly and easily this way," says Rudolph.

"Both security technologies are important building blocks for the targeted Industry 4.0 scenario," says Dexheimer. The term "Industry 4.0" stands for the fourth industrial revolution. After water and steam power, followed by electrical energy, electronics and information technology, now, the cyber-physical systems (IT systems embedded in machinery that communicate with each other via wireless or cabled networks) and the Internet of Things are expected to move into the factory halls. "This revolution can only work if the intellectual property is sufficiently protected. And that's a tall order, because the targets of production IT will increase exponentially, due to ever growing digitization and networking," explains Dexheimer.

At this year's CeBIT, both researchers -- Dexheimer and Rudolph -- will present a computer-assisted machine tool using a CAD computer and a 3D printer. SIT's security software is installed both on the computer and the printer. The data are encrypted on the computer, and decrypted by the printer. The printer also validates the licensed authorization to conduct the print job. To ensure that the data are also securely embedded in the network, the scientists have built a Trusted Platform Module into multiple routers, and are displaying this as a demo. "An attacker cannot hack this there, because he or she will get nowhere near the built-in key," explains Rudolph.


Story Source:

The above story is based on materials provided by Fraunhofer-Gesellschaft. Note: Materials may be edited for content and length.


Cite This Page:

Fraunhofer-Gesellschaft. "Security tools for Industry 4.0." ScienceDaily. ScienceDaily, 5 March 2014. <www.sciencedaily.com/releases/2014/03/140305084610.htm>.
Fraunhofer-Gesellschaft. (2014, March 5). Security tools for Industry 4.0. ScienceDaily. Retrieved September 2, 2014 from www.sciencedaily.com/releases/2014/03/140305084610.htm
Fraunhofer-Gesellschaft. "Security tools for Industry 4.0." ScienceDaily. www.sciencedaily.com/releases/2014/03/140305084610.htm (accessed September 2, 2014).

Share This




More Computers & Math News

Tuesday, September 2, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Japan Firm Showcases 'touchable' 3D Technology

Japan Firm Showcases 'touchable' 3D Technology

AFP (Sep. 2, 2014) — Technology that generates touchable 3D imagery is unveiled in Japan, with its developers saying users could pull and push objects that are not really there. Duration: 01:07 Video provided by AFP
Powered by NewsLook.com
Why Is This Madden NFL Video Game Character 14 Inches Tall?

Why Is This Madden NFL Video Game Character 14 Inches Tall?

Newsy (Sep. 2, 2014) — The newest Madden NFL video game has a few glitches, including a 14-inch player who's actually more than 6 feet tall in real life. Video provided by Newsy
Powered by NewsLook.com
Home Depot Data Breach Could Affect All Stores Nationwide

Home Depot Data Breach Could Affect All Stores Nationwide

Newsy (Sep. 2, 2014) — Home Depot is investigating a potentially "massive" data breach that analysts say could be much larger than Target's 40 million leaked card numbers. Video provided by Newsy
Powered by NewsLook.com
Oops! Microsoft Hints At Windows 9 Launch, Rumors Abound

Oops! Microsoft Hints At Windows 9 Launch, Rumors Abound

Newsy (Sep. 2, 2014) — Microsoft's Chinese offices may have just named and set a rough date for the company's next operating system, Windows 9. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
 
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:  

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:  

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile iPhone Android Web
Follow Facebook Twitter Google+
Subscribe RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins