Cybersecurity for industry 4.0 : analysis for design and manufacturing

This book introduces readers to cybersecurity and its impact on the realization of the Industry 4.0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4.0 landscape and details the existing cybersecurity threats faced by Industry 4.0, as well as state-o...

Full description

Saved in:
Bibliographic Details
Other Authors Thames, Lane (Editor), Schaefer, Dirk, 1961- (Editor)
Format Electronic eBook
LanguageEnglish
Published Cham, Switzerland : Springer, [2017]
SeriesSpringer series in advanced manufacturing.
Subjects
Online AccessFull text
ISBN9783319506609
9783319506593
Physical Description1 online resource : illustrations

Cover

Table of Contents:
  • Preface; Contents; Contributors; 1 Industry 4.0: An Overview of Key Benefits, Technologies, and Challenges; 1 Introduction: Background and Motivation; 2 Industry 4.0 and Smart Manufacturing; 2.1 Industrial Internet and the Industrial Internet of Things; 2.2 New 21st Century Product Development Paradigms; 3 Cloud-Based Design and Manufacturing; 4 Defining Cloud-Based Design and Manufacturing (CBDM); 4.1 Cloud Based Design; 4.2 Cloud Based Manufacturing; 4.3 CBDM Services; 5 CBDM: A First Generation Implementation.
  • 5.1 An Infrastructure for Distributed Collaborative Design and Manufacturing Inspired by the Cloud Computing Paradigm5.2 A CBDM Workflow Example; 6 Software Defined Cloud Manufacturing; 6.1 Software-Defined Systems; 6.2 A Software Defined Cloud Manufacturing Architecture; 6.3 SDCM Domain Specific Configuration Language; 6.4 SDCM Workflow Scenarios; 7 Closure; References; 2 Customized Encryption of CAD Models for Cloud-Enabled Collaborative Product Development; Abstract; 1 Introduction; 2 Related Research; 2.1 Watermark of CAD Models; 2.2 Access Control of CAD Models in a Network Environment.
  • 2.3 Multi-level Design Data Sharing Based on the Multi-resolution Models2.4 Encryption of CAD Models; 2.5 Summary of the Related Works; 3 Customized Encryption of Feature-Based CAD Models; 3.1 Encryption of a CAD Model; 3.1.1 Encryption of Sketches; 3.1.2 Encryption Algorithm of CAD Models; 3.2 Encryption Based Secure Sharing of CAD Models; 3.2.1 Key-Based Authorization Algorithm; 3.2.2 Customized Geometric Transformation Algorithm; 4 Case Study for Approach Validation; 5 Conclusion and Future Works; Acknowledgements; References; 3 A New Approach to Cyberphysical Security in Industry 4.0.
  • Abstract1 Introduction; 2 Background; 3 Secure Manufacturing Information Architecture; 3.1 Pilot of Direct-to-Machine Security; 4 Manufacturing Security Enforcement Device; 5 Pilot of the Manufacturing Security Enforcement Device; 6 Conclusion; Acknowledgements; References; 4 SCADA System Forensic Analysis Within IIoT; 1 Introduction; 1.1 SCADA Progression and the Development of IIoT; 2 Conceptual Architecture of a SCADA System; 2.1 SCADA Hardware; 2.2 SCADA Software; 2.3 Networking; 3 Examples of SCADA System Incidents Prior to IIoT; 3.1 Trans-Siberian Pipeline Explosion.
  • 3.2 Maroochy Shire Water System3.3 Stuxnet; 3.4 Duqu; 3.5 Flame; 4 SCADA Forensics Within IIoT; 4.1 Forensic Challenges; 4.2 Current Data Acquisition Methods for SCADA Systems; 5 Forensic Acquisition of SCADA Artefacts; 5.1 Network Data Acquisition; 5.2 Device Data Acquisition; 5.3 Half-Life of Data Within a SCADA System; 6 SCADA Forensic Process; 6.1 Existing Incident Response Models; 6.2 Forensic Methodology for SCADA Within IIoT; 6.3 SCADA Forensic Workstation; 7 Conclusion; 8 List of Abbreviations; References; 5 Big Data Security Intelligence for Healthcare Industry 4.0; Abstract.