Auflistung nach Schlagwort "IIoT"
1 - 10 von 10
Treffer pro Seite
Sortieroptionen
- ZeitschriftenartikelBlockchain in Industrie 4.0: Beyond cryptocurrency(it - Information Technology: Vol. 60, No. 3, 2018) Laabs, Martin; Đukanović, SinišaIndustrie 4.0, the transition from static, centrally controlled production to dynamic, decentralized manufacturing, is aiming to increase product quality, customization and efficiency. Autonomous production systems and flexible inter-organizational cooperation are key challenges. Blockchain seems to be a natural fit to cope with these challenges. This article derives major challenges of I4.0 and compares them with benefits of blockchain technology. Use cases demonstrate where challenges and benefits match. Also, well known blockchain issues and possible solutions are addressed.
- ZeitschriftenartikelIndustrial Internet of Things(IIoT)-Plattformtypen im Maschinen- und Anlagenbau(HMD Praxis der Wirtschaftsinformatik: Vol. 59, No. 4, 2022) Scheel, Laura; Bender, BenedictDas Angebot digitaler Plattformen ist mittlerweile auch im Maschinen- und Anlagenbau weit verbreitet. Dabei konnte in den letzten Jahren der Trend verzeichnet werden, dass die Herstellerunternehmen von Maschinen und Anlagen nicht mehr ausschließlich physische Produkte veräußern, sondern zusätzliche auf das Produkt abgestimmte Dienstleistungen, wie bspw. digitale Services. Dieser Wandel kann einen großen Einfluss auf die Veränderung des Geschäftsmodells haben und je nach Komplexität der digitalen Plattformen unterschiedliche Ausmaße annehmen, die auch strategische Entscheidungen bestimmen können. In diesem Beitrag wird eine Klassifizierung der digitalen Plattformen im deutschen Maschinen- und Anlagenbau vorgenommen, mithilfe derer unterschiedliche Plattformtypen auf Grundlage ihrer Funktionszusammensetzung identifiziert werden. Demnach können bspw. Plattformen, über die lediglich grundlegende Funktionen wie die Verwaltung von Maschinen angeboten werden, von umfangreicheren Plattformen unterschieden werden, die eine höhere Komplexität aufweisen und somit einen größeren Einfluss auf die Veränderung des Geschäftsmodells haben. Diese Einteilung unterschiedlicher Plattformtypen kann Unternehmen im Maschinen- und Anlagenbau dabei unterstützen, strategische Entscheidungen bezüglich der Entwicklung und des Angebots digitaler Plattformen zu treffen und eine Einordnung ihrer digitalen Plattform im Wettbewerb vorzunehmen. The offer of digital platforms has become very popular in mechanical and plant engineering. In recent years, there has been a trend for machinery and plant manufacturers to no longer sell only physical products, but also additional product-related services, such as digital services. This change can have a major impact on the transformation of the business model and can take on different dimensions depending on the complexity of the digital platforms, which can also determine strategic decisions. In this paper, a classification of digital platforms in the German machinery and plant engineering sector is made, with the help of which different platform types are identified based on their functions. Accordingly, platforms that only offer basic functions such as the management of machines can be distinguished from more extensive platforms that are more complex and thus have a greater influence on the change of the business model. This classification of different platform types can help companies in the mechanical and plant engineering sector to make strategic decisions regarding the development and offering of digital platforms and to classify their digital platform in the competitive environment.
- TextdokumentInteroperability and Security Challenges of Industry 4.0(INFORMATIK 2017, 2017) Watson, Venesa; Tellabi, Asmaa; Sassmannahausen, Jochen; Lou, XinxinIndustrie 4.0 (I4.0) is the fourth industrial revolution, which will see the digital transformation of manufacturing, through the integration on Industrial Internet of Things (IIoT), Data and Services, and the convergence of Information Technology (IT) and Operational Technology (OT). With any such transformation, there exists challenges that must first be addressed for a successful outcome. For I4.0, these are interoperability and security, which respectively arise from the interconnection of devices from different manufacturers and/or with different communication protocols; and the interconnection of networks with competing critical and non-critical traffic, and the increased access to initially isolated networks. This paper presents an overview of standards, such as IEC 62443, the ISO 27000 series, IEC 62541 Open Connectivity Unified Architecture (OPC UA) and Time Sensitive Networks (TSN) (IEEE 1722-2016), which addresses these challenges.
- ZeitschriftenartikelIoT Best Practices(HMD Praxis der Wirtschaftsinformatik: Vol. 56, No. 6, 2019) Barenkamp, Marco; Schoenke, Jan; Zarvic, Novica; Thomas, OliverDas Internet der Dinge treibt die Digitalisierung in vielen Lebensbereichen und vor allem in der Industrie stark voran. Dabei ergeben sich eine Vielzahl von neuen und verbesserten Anwendungsszenarien und Geschäftsmodellen. Getrieben durch die (theoretisch) unbegrenzten Möglichkeiten der Umsetzung, müssen besonders in der Planung zentrale Sachverhalte vorab evaluiert und bewertet werden, um in Bereichen wie Sicherheit, Betriebsfähigkeit, Skalierung, Wirtschaftlichkeit sowie Geschäftsmodell eine bestmögliche Qualität zu erreichen. Wir geben einen Überblick über die Bedeutung und Zusammenhänge dieser verschiedenen Aspekte und zeigen an einem internationalen IIoT-Projekt konkrete Fallstricke und die getroffenen Gegenmaßnahmen auf. Auf Basis dieser Erkenntnisse geben wir Empfehlungen an Best Practices ab, um neu zu beginnende IoT Projekte zukünftig zielgerichtet planen zu können. The Internet of Things is driving forward digitalization in many areas of life and especially in industry. This results in a large number of new and improved application scenarios and business models. Driven by the (theoretically) unlimited possibilities of implementation, central issues in particular must be evaluated in advance in order to achieve the best possible quality in areas such as security, operability, scaling, cost-effectiveness and business model. We give an overview of the significance and interrelations of these different aspects and point out specific pitfalls and the mitigations taken in an international IoT project in order to recommend best practices to plan new IIoT projects in a more sophisticated way.
- ZeitschriftenartikelIoT Security Best Practices(HMD Praxis der Wirtschaftsinformatik: Vol. 58, No. 2, 2021) Barenkamp, MarcoDer Artikel gibt einen Überblick über Best-Practice-Standards zur Authentifizierung von IoT (Internet of Things) Zugängen. Es wird aufgezeigt, dass clientseitige Authentifizierung gegenüber einer herkömmlichen Authentifizierung und Blockchain-basierten Ansätzen das höchste Potential für sichere Prozessautomatisierung bei hoher Interaktionsfrequenz bietet. Ein neuartiges Konzept des clientseitigen automatisierten Zugangsmanagements auf Basis von TLS (transport layer security), welches sich im Agriculture Segment seit über einem Jahr bewährt hat, wird vorgestellt. Gegenüber derzeitig eingesetzten Authentifizierungsverfahren bietet es den Vorteil höherer Sicherheit bei gleichzeitig automatisierter Anmeldung jeglicher Endgeräte auf dem IoT-Server. Aufgrund dieser Potentiale eignet sich der dargestellte Authentifizierungsstandard zukünftig als allgemeines branchenübergreifendes Zugangssystem für IoT-Anwendungen. The article gives an overview of best practice standards for IoT (Internet of things) access authentication. It is shown that client-side authentication offers the highest potential for secure process automation at high interaction frequency compared to default authentication and blockchain-based-approaches. A novel concept of client-side automated access management using the TLS (transport layer security) standard, which has proven in the agriculture segment for over a year, is presented. Compared to established authentication methods, it offers the advantage of higher security with simultaneous automated login of multiple end devices on the IoT server. Due to these potentials, the presented new authentication standard is suitable as a general cross-industry access concept for IoT applications.
- TextdokumentModel-based Integrity Monitoring of Industrial Automation And Control Systems(INFORMATIK 2022, 2022) Peters,Ludger; Khalaf,Mahmoud; Waedt,Karl; Schindler,Josef; Belaidi,SiwarThis paper aims to enhance cyber security within Electrical Power Systems (EPS) of power plants by extending and using an updated plant simulator. In this paper, we assume a sophisticated attacker, as part of an Advanced Persistent Threat (APT), who gradually damages or manipulates primary assets (in the sense of ISO/IEC 27005:2018, e. g. main cooling water pumps, feedwater pumps, safety valves, and circuit breakers). Accordingly, we assume that the attack agent performs gradual manipulations at the application level. Detecting and predicting a potential anomaly is designed and implemented based on machine learning of expected behavior. The paper will include examples of attacks executed over an extended time period by gradually manipulating combinations of analog and binary signal values or set-points. Challenges related to the training of the detection algorithms, avoidance of false positives, and concise reporting to non-security domain experts will also be addressed.
- TextdokumentOperational Security Analysis and Challenge for IoT Solutions(INFORMATIK 2020, 2021) Gao, Yuan; Lou, XinxinThe marketing engagement of Internet of Things (IoT) shows a wide vista together with Industry 4.0 regarding modern manufacturing and services. However, the evolution of technologies and rising regulation concerns regarding security and privacy are bring challenges to IoT solutions. On one side, the security analysis of IoT solutions has to consider the security posture in a much wider scope including both edge and cloud sides even across global geo-locations. On the other side, new regulation requirements demand a full tracking of data access. In addition, authorizations should be evaluated explicitly and can be revoked any time for maximizing data protection. Both challenges can be solved by implementing a novel security model targeting those requirements while zero trust model is a good candidate. Thus in this paper, we compared the most commonly used perimeter security model and the zero trust model under the circumstance for modern IoT solutions. Furthermore, from the regulation perspective, the concepts of zero trust model are analyzed to show its compliance with regulation requirements. For easing the discussion of IoT solutions, a general IoT architecture is proposed and relevant zero trust model implementations are described. Especially, the zero trust model relevant security controls are highlighted as a guidance for the design of IoT solutions. As the conclusion, we propose a general implementation of zero trust model within the context of IoT solution to solve the challenges facing by the industry.
- KonferenzbeitragOperational Security Modeling and Analysis for IACS(INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), 2019) Gao, Yuan; Ben Zid, Ines; Lou, Xinxin; Parekh, MithilSecurity Certifications based on international standards, like ISO 27000 and IEC 62443 series, are strongly favored by industrial manufactures and (critical) facility owners. However, comparing to mature safety certification procedures, there is only a small portion of security certifications available on the market for the booming Industry 4.0 solutions and IoT/IIoT products. The major challenge is how to define a practical working scope, which is compatible with frequent system updates as well as creations of new systems by coupling supplier services. Meanwhile, the potential security impacts should be quantitatively predictable since some of them are tolerable, which are different from most of safety constraints. Thus, in this paper, we proposed an operational security model, which intends to support monitoring and analysis on a dynamically running system. It was extended from the 3-domains security model we proposed in previous work by introducing run-time perspectives and procedures. In addition, cooperating with the security in design concept, the proposed operational procedures were developed following the guidance of the security standard series IEC 62443. For addressing the external threats, Open Source Intelligence (OSINT) were involved to query whether some confidential information, like user-credentials and system vulnerabilities are already collected and publicly known to adversaries. The introduction of OSINT can support more transparent risk assessment approaches. As the conclusion, with the operational security model, we proposed a hybrid approach which consists of security certifications and continuous monitoring/consulting to solve the current challenge.
- KonferenzbeitragSecurity Challenges and Best Practices for IIoT(INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik – Informatik für Gesellschaft (Workshop-Beiträge), 2019) Bajramovic, Edita; Gupta, Deeksha; Guo, Yun; Waedt, Karl; Bajramovic, AnisSecurity concerns regarding the Industrial Internet of Things (IIoT) are constantly increasing, causing issues in industrial facilities, where heavy machinery and dangerous systems are operated and controlled with connected devices. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to IIoT, including nuclear facilities. Yet, as industrial systems become more and more interconnected, comparable cyber-attacks could happen in other industrial domains in the future. Therefore, adequate international standards and best practices can decrease occurrence of such attacks.
- KonferenzbeitragSecurity challenges and best practices for resilient IIoT Networks: Network Segmentation(INFORMATIK 2023 - Designing Futures: Zukünfte gestalten, 2023) Yatagha, Romarick; Waedt, Karl; Schindler, Josef; Kirdan, ErkanThe surging prominence of the Industrial Internet of Things (IIoT) introduces both unique prospects and complex issues for industrial control systems, notably within the cybersecurity sphere. Cybersecurity concerns are particularly acute for smart factories, entities that leverage IIoT capabilities like networked sensors and machine learning to streamline production. The heterogeneous devices from diverse manufacturers and vast interconnected networks heighten their susceptibility to cyber threats. This paper examines the contemporary cybersecurity landscape within smart factories, pinpointing current vulnerabilities and imminent threats. Drawing on this analysis, we put forth a suite of best practices and strategic measures to fortify IIoT networks, including but not limited to network segmentation and stringent access controls. We pay specific attention to network segmentation, a technique used to break down a computer network into manageable subnetworks, thus mitigating the risk of attacks. We propose an innovative network segmentation policy that leverages clustering, an unsupervised learning algorithm. This algorithm classifies network traffic into distinct categories based on, but not limited to, source and destination IP addresses, employed protocol, and packet size. This data-driven classification simplifies network segmentation and configuration, minimizing their complexity. The paper also underlines the critical role of employee training and awareness in establishing robust security practices, particularly for the design, integration, and deployment of IIoT devices and edge computing. Our findings offer actionable insights for industrial control systems operators and cybersecurity professionals, empowering them to fortify their IIoT networks against cyber threats effectively.