A Review of Industry 4.0 Manufacturing Process Security Risks
Abstract
:1. Introduction
2. A Complete Paradigm Shift
2.1. Traditional Approach to Manufacturing Process Security
2.2. Convergence of IT and OT
2.3. Cloud-Based Design
2.4. Definining Industry 4.0 in Context
3. Identifying the Problem
3.1. Case Studies of Cyber-Physical Attacks
3.1.1. The Zotob Worm
3.1.2. Stuxnet
3.1.3. Duqu and Flamer—Followers of Stuxnet
3.1.4. BlackEnergy3 and the Ukraine Power Grid
3.2. Types of Cyber-Physical Attacks
3.2.1. Zero-Day Attacks
3.2.2. Eavesdropping Attacks
3.2.3. Denial of Service Attacks
3.2.4. False Data Injection Attacks
3.2.5. Replay Attacks
3.3. Lifecycle of an Attack
3.4. The Problem in the Context of Industry 4.0
3.4.1. The Manufacturing Information Architecture
3.4.2. Industrial Networks and Security Measure Scalability
3.4.3. System Security and Safety
3.4.4. CAD Model Security Gaps
3.4.5. The Human Element
4. Solutions
4.1. Securing the Manufacturing Information Architecture
4.1.1. Network Security and Information Flow
4.1.2. Architectural Approach to System Design and Integration
4.1.3. Cryptographic Techniques
4.1.4. Security Policies and Procedures
4.2. Efficient and Secure Scaling of Information Networks
4.2.1. 5G and the Internet of Things
4.2.2. Software-Defined Networks and Network Function Virtualization
4.3. CAD Model Security
4.4. Side-Channel Analysis
4.5. Post-Production Analysis
4.6. Further Research and Development
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Zhang, Z.; Demir, K.G.; Gu, G.X. Developments in 4D-printing: A Review on Current Smart Materials, Technologies, and Applications. Int. J. Smart Nano Mater. 2019, 10, 205–224. [Google Scholar] [CrossRef]
- Sayfayn, N.; Madnick, S. Cybersafety Analysis of the Maroochy Shire Sewage Spill; MIT Management Sloan School: Cambridge, UK, 2017. [Google Scholar]
- Tuptuk, N.; Hailes, S. Security of Smart Manufacturing Systems. J. Manuf. Syst. 2018, 47, 93–106. [Google Scholar] [CrossRef]
- SHODAN Website. Available online: https://www.shodan.io/ (accessed on 25 May 2019).
- Van der Meulen, R. Gartner Says 8.4 Billion Connected ”Things” Will Be in Use in 2017, Up 31 Percent From 2016. Available online: https://www.gartner.com/newsroom/id/3598917 (accessed on 26 September 2019).
- Jacob, E.; Astorga, J.; Galan, J.J.U.; Huarte, M.; Conejo, D.G.; De Marcaide, L.N.L. Towards a 5G Compliant and Flexible Connected Manufacturing Facility; DYNA: Federación Asociaciones Ingenieros Industriales: Bilbao, Spain, 2018. [Google Scholar]
- Chang, J.; He, J.; Mao, M.; Zhou, W.; Lei, Q.; Li, X.; Li, D.; Chua, C.K.; Zhao, X. Advanced Material Strategies for Next-Generation Additive Manufacturing. Materials 2018, 11, 166. [Google Scholar] [CrossRef] [PubMed]
- Thames, L.; Schaefer, D. Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing; Springer: Cham, Switzerland, 2017. [Google Scholar]
- Gilchrist, A. Industry 4.0: The Industrial Internet of Things; Apress Media: Berkeley, CA, USA, 2016. [Google Scholar]
- NASA Office of Inspector General. Industrial Control System Security within NASA’s Critical and Supporting Infrastructure; NASA: Washington, DC, USA, 2017. [Google Scholar]
- Zeltmann, S.E.; Gupta, N.; Tsoutsos, N.G.; Maniatakos, M.; Rajendran, J.; Karri, R. Manufacturing and Security Challenges in 3D Printing. JOM J. Miner. Met. Mater. Soc. 2016, 68, 1872–1881. [Google Scholar] [CrossRef]
- Kellner, T. The FAA Cleared the First 3D Printed Part to Fly in a Commercial Jet Engine from GE. Available online: https://www.ge.com/reports/post/116402870270/the-faa-cleared-the-first-3d-printed-part-to-fly-2/ (accessed on 29 May 2019).
- Belikovetsky, S.; Yampolskiy, M.; Toh, J.; Gatlin, J.; Elovici, Y. dr0wned-Cyber-Physical Attack with Additive Manufacturing. In Proceedings of the WOOT’17 11th USENIX Conference on Offensive Technologies, Austin, TX, USA, 10–12 August 2016. [Google Scholar]
- WinRAR 4.20 ZIP File Name Spoofing Vulnerability. Available online: https://www.rarlab.com/vuln_zip_spoofing_4.20.html (accessed on 29 May 2019).
- Birkel, H.S.; Veile, J.W.; Müller, J.M.; Hartmann, E.; Voigt, K.-I. Development of a Risk Framework for Industry 4.0 in the Context of Sustainability for Established Manufacturers. Sustainability 2019, 11, 384. [Google Scholar] [CrossRef]
- Khan, A.; Turowski, K. A Survey of Current Challenges in Manufacturing Industry and Preparation for Industry 4.0. In Proceedings of the First International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’16), Sochi, Russia, 16–21 May 2016; Springer: Cham, Switzerland, 2017; pp. 15–26. [Google Scholar]
- Kiel, D.; Arnold, C.; Müller, J.M.; Voigt, K.-I. Sustainable Industrial Value Creation: Benefits and Challenges of Industry 4.0. Int. J. Innov. Manag. 2017, 21, 1740015. [Google Scholar] [CrossRef]
- Müller, J.M.; Kiel, D.; Voigt, K.I. What Drivers the Implementation of Industry 4.0? The Role of Opportunities and Challenges in the Context of Sustainability. Sustainability 2018, 10, 247. [Google Scholar] [CrossRef]
- Yan, J.; Meng, Y.; Lu, L.; Li, L. Industrial Big Data in an Industry 4.0 Environment: Challenges, Schemes and Applications for Predictive Maintenance. IEEE Access 2017, 5. [Google Scholar] [CrossRef]
- Tupa, J.; Simota, J.; Steiner, F. Aspects of Risk Management Implementation for Industry 4.0. In Proceedings of the 27th International Conference on Flexible Automation and Intelligent Manufacturing, Modena, Italy, 27–30 June 2017. [Google Scholar]
- Liao, Y.; Deschamps, F.; De Freitas Rocha Loures, F.; Pierin Ramos, L.F. Past, Present and Future of Industry 4.0—A Systematic Literature Review and Research Agenda Proposal. Int. J. Prod. Res. 2017, 55, 3609–3629. [Google Scholar] [CrossRef]
- Elkington, J. Partnerships from cannibals with forks: The triple bottom line of 21st-century business. Environ. Qual. Manag. 1998, 8. [Google Scholar] [CrossRef]
- Norman, W.; MacDonald, C.; Arnold, D.G. Getting to the Bottom of “Triple Bottom Line”. Bus. Ethics Q. 2004, 14, 243–262. [Google Scholar] [CrossRef]
- Roberts, P.F. Zotob, PnP Worms Slam 13 DaimlerChrysler Plants. Available online: https://www.eweek.com/security/zotob-pnp-worms-slam-13-daimlerchrysler-plants (accessed on 29 May 2019).
- W32.Zotob.E. Available online: https://www.symantec.com/security-center/writeup/2005-081615-4443-99 (accessed on 29 May 2019).
- Microsoft Security Bulletin MS05-039—Critical. Available online: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-039 (accessed on 29 May 2019).
- Falliere, N.; Murchu, L.O.; Chien, E. W32.Stuxnet Dossier; Symantec Security Response: Cupertino, CA, USA, 2011. [Google Scholar]
- Microsoft Security Bulletin MS10-046—Critical. Available online: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046 (accessed on 16 October 2019).
- Symantec. W32.Duqu: The Precursor to the Next Stuxnet; Symantec Security Response: Mountain View, CA, USA, 2011. [Google Scholar]
- Nahorney, B. Symantec Intelligence Report: May 2012; Symantec Intelligence: Mountain View, CA, USA, 2012. [Google Scholar]
- Miková, T. Cyber Attack on Ukrainian Power Grid. Bachelor’s Thesis, Masaryk University, Brno, Czech Republic, 2018. [Google Scholar]
- Bilge, L.; Dumitras, T. Before We Knew It: An Empirical Study of Zero-Day Attacks in the Real World; Symantec Research Laboraties: Raleigh, NC, USA, 2012. [Google Scholar]
- Symantec. An ISTR Special Report: Ransomware and Businesses 2016; Symantec: Mountain View, CA, USA, 2016. [Google Scholar]
- Song, C.; Lin, F.; Ba, Z.J.; Ren, K.; Zhou, C.; Xu, W.Y. My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks against 3D Printers. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016. [Google Scholar]
- Hojjati, A.; Adhikari, A.; Struckmann, K.; Chou, E.; Tho, N.; Thi, N.; Madan, K.; Winslett, M.S.; Gunter, C.A.; King, W.P. Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets. In Proceedings of the 2016 ACM SIGSAC Conference, Vienna, Austria, 24–28 October 2016. [Google Scholar]
- Backes, M.; Durmuth, M.; Gerling, S.; Pinkal, M.; Sporleder, C. Acoustic Side-Channel Attacks on Printers. In Proceedings of the 19th USENIX Security Symposium, Washington, DC, USA, 11–13 August 2010. [Google Scholar]
- Faruque, M.A.A.; Chhetri, S.R.; Canedo, A.; Wan, J. Acoustic Side-Channel Attacks on Additive Manufacturing Systems. In Proceedings of the 7th International Conference on Cyber-Physical Systems, Vienna, Austria, 11–14 April 2016. [Google Scholar]
- Yampolskiy, M.; Andel, T.R.; Mcdonald, J.T.; Glisson, W.; Yasinsac, A. Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop, New Orleans, LA, USA, 9 December 2014. [Google Scholar]
- Riel, A.; Kreiner, C.; Macher, G.; Messnarz, R. Integrated design for tackling safety and security challenges of smart products and digital manufacturing. CIRP Ann. 2017, 66, 177–180. [Google Scholar] [CrossRef]
- Riel, A.; Kreiner, C.; Messnarz., R.; Alexander, M. An architectural approach to the integration of safety and security requirements in smart products and systems design. CIRP Ann. 2018, 67, 173–176. [Google Scholar] [CrossRef]
- National Defense Industrial Association. Cybersecurity for Advanced Manufacturing White Paper; National Defense Industrial Association: Arlington, VA, USA, 2014. [Google Scholar]
- Pham, G.N. Two-Dimensional (2D) Slices Encryption-Based Security Solution for Three-Dimensional (3D) Printing Industry. Safe Secur. Embed. Syst. 2018, 7, 64. [Google Scholar] [CrossRef]
- Shamir, A. How to Share a Secret; Communications of the ACM: Cambridge, MA, USA, 1979; pp. 612–613. [Google Scholar]
- Stouffer, K.; Pillitteri, V.; Lightman, S.; Abrams, M.; Hahn, A. Guide to Industrial Control Systems (ICS) Security; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2014. [Google Scholar]
- DesRuisseaux, D. Cybersecurity Assessment—The Most Critical Step to Secure an Industrial Control System; Schneider Electric: Andover, MA, USA, 2018. [Google Scholar]
- Li, S.; Xu, L.D.; Zhao, S. 5G Internet of Things: A Survey. J. Ind. Inf. Integr. 2019, 10, 1–9. [Google Scholar] [CrossRef]
- GSA. The Road to 5G: Drivers, Applications, Requirements and Technical Development; Global Mobile Suppliers Association: Farnham, UK, 2015. [Google Scholar]
- ONF. Software-Defined Networking: The New Norm for Networks; Open Networking Foundation: Palo Alto, CA, USA, 2012. [Google Scholar]
- Latif, Z.; Sharif, K.; Li, F.; Karim, M.M.; Wang, Y. A Comprehensive Survey of Interface Protocols for Software Defined Networks. arXiv 2019, arXiv:1902.07913v1. [Google Scholar]
- Haleplidis, E.; Salim, J.H.; Halpern, J.M.; Hares, S.; Pentikousis, K.; Ogawa, K.; Wang, W.; Denazis, S.; Koufopavlou, O. Network Programmability with Forces. IEEE Commun. Surv. Tutor. 2015, 17, 1423–1440. [Google Scholar] [CrossRef]
- Ben, P.; Bruce, D. The Open Switch Database Management Protocol. Internet Engineering Task Force, RFC 7047. December 2013. Available online: http://www.ietf.org/rfc/rfc7047.txt (accessed on 5 October 2019).
- Song, H. Protocol-oblivious Forwarding: Unleash the Power of SDN through a Future-proof Forwarding Plane. In Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, Hong Kong, China, 16 August 2013. [Google Scholar]
- Éluard, M.; Maetz, Y.; Doërr, G. Geometry-preserving Encryption for 3D Meshes. In Proceedings of the IEEE International Conference on Image Processing, Paris, France, 27–30 October 2014. [Google Scholar]
- Pham, G.N.; Kwon, K.-R.; Lee, E.-J.; Lee, S.-H. Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain. J. Comput. Sci. Eng. 2017, 11, 152–159. [Google Scholar] [CrossRef]
- Chhetri, S.R.; Canedo, A.; Al Faruque, M.A. KCAD: Kinetic Cyber-Attack Detection Method for Cyber-Physical Additive Manufacturing Systems. In Proceedings of the 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), Austin, TX, USA, 7–10 November 2016. [Google Scholar]
- Bayens, C.; Le, T.; Garcia, L.; Beyah, R.; Javanmard, M.; Zonouz, S. See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Pattern Detection in Additive Manufacturing. In Proceedings of the USENIX Security Symposium, Vancouver, BC, Canada, 16–18 August 2017. [Google Scholar]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Prinsloo, J.; Sinha, S.; von Solms, B. A Review of Industry 4.0 Manufacturing Process Security Risks. Appl. Sci. 2019, 9, 5105. https://doi.org/10.3390/app9235105
Prinsloo J, Sinha S, von Solms B. A Review of Industry 4.0 Manufacturing Process Security Risks. Applied Sciences. 2019; 9(23):5105. https://doi.org/10.3390/app9235105
Chicago/Turabian StylePrinsloo, Jaco, Saurabh Sinha, and Basie von Solms. 2019. "A Review of Industry 4.0 Manufacturing Process Security Risks" Applied Sciences 9, no. 23: 5105. https://doi.org/10.3390/app9235105
APA StylePrinsloo, J., Sinha, S., & von Solms, B. (2019). A Review of Industry 4.0 Manufacturing Process Security Risks. Applied Sciences, 9(23), 5105. https://doi.org/10.3390/app9235105