全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Enhancing Security for Legacy Factory Machines: A Continuous Key Renewal Algorithm for Securing Group of Machines

DOI: 10.4236/jsea.2023.1612037, PP. 714-743

Keywords: Sustainable Industries, Cybersecurity, Networks, Protocols, Side-Channel Analysis

Full-Text   Cite this paper   Add to My Lib

Abstract:

Companies are generally focused on how to improve their global performance. Concepts, methods and tools are regularly used to transform them. Key performance indicators are used to measure how performance is increased. Industry 4.0 concepts and sustainability expectations actually contribute to this performance improvement. Indeed, cybersecurity as one of these concepts is required to increase the company performance. Even if it is well-known and applied in companies through the protection of their information systems, progress is expected in research on how to ensure the security of data and factory processes in the manufacturing, as the number of cyberattacks towards industries is growing these last few years. This paper aims to increase the company performance and sustainability to enforce factory machines protection by creating private security network groups. But currently, most of the Programmable Logic Controller PLC protocols have not been securely designed. Thus, the creation of secure groups of machines by combining strong authentication, strong or lightweight ciphering, and data stream integrity is proposed. The security is enforced by a continuous key’s renewal algorithm. An experiment on an industry’s architecture has been led to validate the concepts of the proposition. The study is compared to existing OPC-UA and MACsec standards in terms of drawbacks and advantages. This work could be implemented in hardware for further performance improvement.

References

[1]  Lang, J., Burian, J., Cooke, J., Crook, S., Dialani, M., Eriksen, L., Filkins, P., Finalle, P. and Krishnan, S. (2021) IDC FutureScape: Worldwide IT/OT Convergence 2022 Predictions, Oct 2021—Doc Document number: # US47131521.
[2]  Mueller, P. and Yadegari, B. (2012) The Stuxnet Worm. University of Arizona, Tucson.
[3]  Sen, R., Verma, A. and Heim, G.R. (2020) Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets. Journal of Management Information Systems, 37, 191-216.
https://doi.org/10.1080/07421222.2019.1705511
[4]  Knaap, E.D. and Langill, J.T. (2015) Industrial Network Security. 2nd Edition, Springer, Berlin.
https://doi.org/10.1016/B978-0-12-420114-9.00006-X
[5]  Adams, C. and Lloyd, S. (2003) Understanding PKI: Concepts, Standards and Deployment Considerations. 2nd Edition, Addison Wesley, Boston.
[6]  Rijmen, V. and Daemen, J. (2002) The Design of Rijndael: AES—The Advanced Encryption Standard.
[7]  National Institute of Standards and Technology (2001) Advanced Encryption Standard. Federal Information Processing Standard (FIPS) Publication 197.
[8]  Bernstein, D.J. (2008) ChaCha, a Variant of Salsa20.
[9]  Adomnicai, A., Fournier, J.J.A. and Masson, L. (2018) Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software, IACR Cryptol. ePrint Archive 2018/708.
[10]  Adomnicai, A. (2019) Cryptographie légère pour l’internet des objets: Implémentations et intégrations sécurisées. Université de Lyon, Lyon.
[11]  Da Silveira, G., Borenstein, D. and Fogliatto, F.S. (2001) Mass Customization: Literature Review and Research Directions. International Journal of Production Economics, 72, 1-13.
https://doi.org/10.1016/S0925-5273(00)00079-7
[12]  Hankel, M. and Rexroth, B. (2015) The Reference Architectural Model Industries 4.0 (RAMI 4.0).
[13]  Stock, T. and Seliger, G. (2016) Opportunities of Sustainable Manufacturing in Industry 4.0. Procedia CIRP, 40, 536-541.
https://doi.org/10.1016/j.procir.2016.01.129
[14]  Vial, G. (2019) Understanding Digital Transformation: A Review and a Research Agenda. The Journal of Strategic Information Systems, 28, 118-144.
https://doi.org/10.1016/j.jsis.2019.01.003
[15]  Wagner, T., Herrmann, C. and Tiede, S. (2017) Industry 4.0 Impacts on Lean Production Systems. Procedia CIRP, 63, 125-131.
https://doi.org/10.1016/j.procir.2017.02.041
[16]  Nandakumar, N., Saleeshya, P.G. and Harikumar, P. (2020) Bottleneck Identification and Process Improvement by Lean Six Sigma DMAIC Methodology. Materials Today: Proceedings, 24, 1217-1224.
https://doi.org/10.1016/j.matpr.2020.04.436
[17]  Lee, B.C.Y., Mahtab, M.S., Neo, T.H., Farooqi, I.H. and Khursheed, A. (2022) Comprehensive Review of Design of Experiment (DOE) for Water and Wastewater Treatment Application—Key Concepts, Methodology and Contextualized Application. Journal of Water Processing Engineering, 47, Article ID: 102673.
https://doi.org/10.1016/j.jwpe.2022.102673
[18]  Chen, D., Vallespir, B. and Doumeingts, G. (1997) GRAI Integrated Methodology and Its Mapping on to Generic Enterprise Reference Architecture and Methodology. Computers in Industry, 33, 387-394.
https://doi.org/10.1016/S0166-3615(97)00043-2
[19]  Tang, C. and Tang, C. (2017) Key Performance Indicators for Process Control System Cybersecurity Performance Analysis. US Department of Commerce, National Institute of Standards and Technology, Washington DC.
https://doi.org/10.6028/NIST.IR.8188
[20]  Ebert, C. and Duarte, C.H.C. (2018) Digital Transformation. IEEE Software, 35, 16-21.
https://doi.org/10.1109/MS.2018.2801537
[21]  Soori, M., Behrooz, A. and Dastre, R. (2023) Machine Learning and Artificial Intelligence in CNC Machine Tools: A Review. Sustainable Manufacturing and Service Economics, 2, Article ID: 100009.
https://doi.org/10.1016/j.smse.2023.100009
[22]  Ong, P., Lee, W.K. and Lau, R.J.H. (2019) Tool Condition Monitoring in CNC end Milling Using Wavelet Neural Network Based on Machine Vision. The International Journal of Advanced Manufacturing Technology, 104, 1369-1379.
https://doi.org/10.1007/s00170-019-04020-6
[23]  Wen, Y., Rahman, M.F., Xu, H. and Tseng, T.-L.B. (2022) Recent Advances and Trends of Predictive Maintenance from Data-Driven Machine Prognostics Perspective. Measurement, 187, Article ID: 110276.
https://doi.org/10.1016/j.measurement.2021.110276
[24]  Li, C., Zheng, P., Yin, Y., Wang, B. and Wang, L. (2023) Deep Reinforcement Learning in Smart Manufacturing: A Review and Prospects. CIRP Journal of Manufacturing Science and Technology, 40, 75-101.
https://doi.org/10.1016/j.cirpj.2022.11.003
[25]  Chen, X., Yao, L., McAuley, J., Zhou, G. and Wang, X. (2023) Deep Reinforcement Learning in Recommender Systems: A Survey and New Perspectives. Knowledge-Based Systems, 264, Article ID: 110335.
https://doi.org/10.1016/j.knosys.2023.110335
[26]  Mughees, H.A. and Rahimi, A. (2023) Deep Learning Methods for Object Detection in Smart Manufacturing. The Journal of Manufacturing Systems, 64, 181-196.
https://doi.org/10.1016/j.jmsy.2022.06.011
[27]  Tao, F., Qi, Q., Wang, L. and Nee, A. (2019) Digital Twins and Cyber-Physical Systems toward Smart Manufacturing and Industry 4.0: Correlation and Comparison. Engineering, 5, 653-661.
https://doi.org/10.1016/j.eng.2019.01.014
[28]  La, H.J. and Kim, S.D. (2010) A Service-Based Approach to Designing Cyber Physical Systems. IEEE/ACIS 9th International Conference on Computer and Information Science, Kaminoyama, 18-20 August 2010, 895-900.
https://doi.org/10.1109/ICIS.2010.73
[29]  Zayat, W., Kilic, H.S., Yalcin, S., Zaim, S. and Delen, D. (2023) Application of MADM Methods in Industry 4.0: A Literature Review. Computers & Industrial Engineering, 177, Article ID: 109075.
https://doi.org/10.1016/j.cie.2023.109075
[30]  Martell, F., López, J.M., Sánchez, I.Y., Paredes, C.A. and Pisano, E. (2023) Evaluation of the Degree of Automation and Digitalization Using a Diagnostic and Analysis Tool for a Methodological Implementation of Industry 4.0. Computers & Industrial Engineering, 177, Article ID: 109097.
https://doi.org/10.1016/j.cie.2023.109097
[31]  Brundtland, G.H. (1987) Our Common Future World Commission on Environment and Development.
https://doi.org/10.1017/S0376892900016805
[32]  European Commission. Directorate General for Research and Innovation (2021) Industry 5.0, a Transformative Vision for Europe: Governing Systemic Transformations towards a Sustainable Industry. LU: Publications Office.
[33]  Golovianko, M., Terziyan, V., Branytskyi, V. and Malyk, D. (2023) Industry 4.0 vs. Industry 5.0: Co-Existence, Transition, or a Hybrid. Procedia Computer Science, 217, 102-113.
https://doi.org/10.1016/j.procs.2022.12.206
[34]  Dadhich, M. and Hiran, K.K. (2022) Empirical Investigation of Extended TOE Model on Corporate Environment Sustainability and Dimensions of Operating Performance of SMEs: A High Order PLS-ANN Approach. Journal of Cleaner Production, 363, Article ID: 132309.
https://doi.org/10.1016/j.jclepro.2022.132309
[35]  Yang, L., Zou, H., Shang, C., Ye, X. and Rani, P. (2023) Adoption of Information and Digital Technologies Sustainable Smart Manufacturing Systems for Industry 4.0 in Small, Medium and Micro Enterprises. Technological Forecasting and Social Change, 188, Article ID: 122308.
https://doi.org/10.1016/j.techfore.2022.122308
[36]  Ndubisi, N.O., Zhai, X.A. and Lai, K.H. (2021) Small and Medium Manufacturing Enterprises and Asia’s Sustainable Economic Development. International Journal of Production Economics, 233, Article ID: 107971.
https://doi.org/10.1016/j.ijpe.2020.107971
[37]  Mahmoodi, E., Fathi, M. and Ghobakhloo, M. (2022) The Impact of Industry 4.0 on Bottleneck Analysis in Production and Manufacturing: Current Trends and Future Perspectives. Computers & Industrial Engineering, 174, Article ID: 108801.
https://doi.org/10.1016/j.cie.2022.108801
[38]  Mahdiraji, H.A., Yaftiyan, F., Abbasi-Kamardi, A. and Garza-Reyes, J.A. (2022) Investigating Potential Interventions on Disruptive Impacts of Industry 4.0 Technologies in Circular Supply Chains: Evidence from SMEs on an Emerging Economy. Computers & Industrial Engineering, 174, Article ID: 108753.
https://doi.org/10.1016/j.cie.2022.108753
[39]  Cezarino, L.O., Liboni, L.B., Stefanelli, N.O., Oliveira, B.G. and Stocco, L.C. (2019) Diving into Emerging Economies Bottleneck: Industry 4.0 and Implications for a Circular Economy. Management Decision, 59, 1841-1862.
https://doi.org/10.1108/MD-10-2018-1084
[40]  De Paula Ferreira, W. Armellini, F., De Santa Eulalia, L.A. and Thomasset-Laperrière, V. (2022) A Framework for Identifying and Analyzing Industry 4.0 Scenarios. The Journal of Manufacturing Systems, 65, 192-207.
https://doi.org/10.1016/j.jmsy.2022.09.002
[41]  Torbacki, W. (2021) A Hybrid MCDM Model Combining DANP and PROMETHEE II Methods for the Assessment of Cybersecurity in Industry 4.0. Sustainability, 13, Article No. 8833.
https://doi.org/10.3390/su13168833
[42]  Sadik, S., Ahmed, M., Sikos, L.F. and Islam, A.N. (2020) Toward a Sustainable Cybersecurity Ecosystem. Computers, 9, Article No. 74.
https://doi.org/10.3390/computers9030074
[43]  Lee, I. (2021) Cybersecurity: Risk Management Framework and Investment Cost Analysis. Business Horizons, 64, 659-671.
https://doi.org/10.1016/j.bushor.2021.02.022
[44]  Sulich, A., Rutkowska, M., Krawczyk-Jezierska, A., Jezierski, J. and Zema, T. (2021) Cybersecurity and Sustainable Development. Procedia Computer Science, 192, 20-28.
https://doi.org/10.1016/j.procs.2021.08.003
[45]  AL-Dosari, K., Fetais, N. and Kucukvar, M. (2023) A Shift to Green Cybersecurity Sustainability Development: Using Triple Bottom-Line Sustainability Assessment in Qatar Transportation Sector. International Journal of Sustainable Transportation, 17, 1287-1301.
https://doi.org/10.1080/15568318.2023.2171321
[46]  Vrchota, J., Pech, M., Rolinek, L. and Bednář, J. (2020) Sustainability Outcomes of Green Processes in Relation to Industry 4.0 in Manufacturing: Systematic Review. Sustainability, 12, Article No. 5968.
https://doi.org/10.3390/su12155968
[47]  Rodger, J.A. and George, J.A. (2017) Triple Bottom Line Accounting for Optimizing Natural Gas Sustainability: A Statistical Linear Programming Fuzzy ILOWA Optimized Sustainment Model Approach to Reducing Supply Chain Global Cybersecurity Vulnerability through Information and Communications Technology. Journal of Cleaner Production, 142, 1931-1949.
https://doi.org/10.1016/j.jclepro.2016.11.089
[48]  Knaap, E.D. and Langill, J.T. (2014) Industrial Network Security, Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. 2nd Edition.
[49]  Mantravadi, S., Schnyder, R., Møller, C. and Brunoe, T.D. (2020) Securing IT/OT Links for Low Power IIoT Devices: Design Considerations for Industry 4.0. IEEE Access, 8, 200305-200321.
https://doi.org/10.1109/ACCESS.2020.3035963
[50]  Banga, A.O., Rao, U.P., Visconti, A., Brighente, A. and Conti, M. (2022) An IoT Inventory before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions. Computers & Security, 123, Article ID: 102914.
https://doi.org/10.1016/j.cose.2022.102914
[51]  Mantravadi, S., Schnyder, R., Møller, C. and Brunoe, T.D. (2020) Securing IT/OT Links for Low Power IIoT Devices: Design Considerations for Industry 4.0. IEEE Access, 8, 200305-200321.
https://doi.org/10.1109/ACCESS.2020.3035963
[52]  Rezaeibagha, F., Mu, Y., Huang, X.Y., et al. (2019) Fully Secure Lightweight Certificateless Signature Scheme for IIoT. IEEE Access, 7, 144433-144443.
https://doi.org/10.1109/ACCESS.2019.2944631
[53]  Lackorzyński, T. (2022) Practical Encryption Gateways to Integrate Legacy Industrial Machinery. Dissertation.
[54]  Dubroca, S. (2016) MACsec: Encryption for the Wired LAN. Proceedings of NETDEV 1.1, Seville, 10-12 February 2016, 1-5.
https://legacy.netdevconf.info/1.1/proceedings/papers/MACsec-Encryption-for-the-wired-LAN.pdf
[55]  Bogdanov, A., Khovratovich, D. and Rechberger, C. (2011) Biclique Cryptanalysis of the Full AES. 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, 4-8 December 2011, 344-371.
https://doi.org/10.1007/978-3-642-25385-0_19
[56]  Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D. and Shamir, A. (2010) Key Recovery Attack of Practical Complexity on AES-256 Variants with up to 10 Rounds. 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, 30 May-3 June 2010, 299-319.
https://doi.org/10.1007/978-3-642-13190-5_15
[57]  Kamucheka, T., Fahr, M., Teague, T., Nelson, A., Andrews, D. and Huang, M.Q. (2021) Power-Based Side Channel Attack Analysis on PQC Algorithms, Department of Computer Science and Computer Engineering, University of Arkansas. 3rd NIST PQC Standardization Conference, 7-9 June 2021, 1-9.
[58]  Jungk, B. and Bhasin, S. (2017) Don’t Fall into a Trap: Physical Side-Channel Analysis of ChaCha20-Poly1305. Design, Automation & Test in Europe Conference & Exhibition (DATE), Lausanne, 27-31 March 2017, 1110-1115.
https://doi.org/10.23919/DATE.2017.7927155
[59]  Alexandre, A., Jacques, F. and Laurent, M. (2017) Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round. 18th International Conference on Cryptology, Chennai, 10-13 December 2017, 65-84.
https://doi.org/10.1007/978-3-319-71667-1_4

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133