Skip to main content
Top

2019 | OriginalPaper | Chapter

8. Security Challenges in the Industry 4.0 Era

Authors : Mohammed M. Alani, Mohamed Alloghani

Published in: Industry 4.0 and Engineering for a Sustainable Future

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Although the concept of Industry 4.0 was introduced in 2011 at the Hannover Fair, it was only recently that it gained major attention. The fourth industrial revolution, referred to as Industry 4.0, is based mainly on cyber-physical systems along with their supporting technologies. The four design principles of Industry 4.0 are interoperability, information transparency, technical assistance, and decentralized decisions. Each one of these design principles generates new attack surfaces that can be exploited by malicious attackers. As with any other system, security challenges arise with every new technology used. These challenges can range from simple threats that can easily be mitigated or even ignored, all the way up to threats that can render the whole system unusable. In this chapter, we introduce a detailed survey of threats and security challenges in different components of the Industry 4.0 systems. These threats will be categorized based on their possible impact on systems, and information about some countermeasures will be introduced as well.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Akaev, A., Rudskoi, A., & Devezas, T. (2018). Digital economy and the models of income distribution in the society. In SHS Web of Conferences, Vol. 44. EDP Sciences, 2018, p. 00005. Akaev, A., Rudskoi, A., & Devezas, T. (2018). Digital economy and the models of income distribution in the society. In SHS Web of Conferences, Vol. 44. EDP Sciences, 2018, p. 00005.
go back to reference Alani, M. M. (2016). Elements of cloud computing security: A survey of key practicalities. Springer. Alani, M. M. (2016). Elements of cloud computing security: A survey of key practicalities. Springer.
go back to reference Aloul, F., Al-Ali, A., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1(1), 1–6.CrossRef Aloul, F., Al-Ali, A., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1(1), 1–6.CrossRef
go back to reference Ani, U. P. D., He, H., & Tiwari, A. (2017). Review of cybersecurity issues in industrial critical infrastructure: Manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32–74.CrossRef Ani, U. P. D., He, H., & Tiwari, A. (2017). Review of cybersecurity issues in industrial critical infrastructure: Manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32–74.CrossRef
go back to reference Antao, L., Pinto, R., Reis, J., Gonçalves, G. (2018). Requirements for testing and validating the industrial internet of things. In 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2018, pp. 110–115. Antao, L., Pinto, R., Reis, J., Gonçalves, G. (2018). Requirements for testing and validating the industrial internet of things. In 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2018, pp. 110–115.
go back to reference Baena, F., Guarin, A., Mora, J., Sauza, J., & Retat, S. (2017). Learning factory: The path to industry 4.0. Procedia Manufacturing, 9, 73–80.CrossRef Baena, F., Guarin, A., Mora, J., Sauza, J., & Retat, S. (2017). Learning factory: The path to industry 4.0. Procedia Manufacturing, 9, 73–80.CrossRef
go back to reference Baheti, R., & Gill, H. (2011). Cyber-physical systems. The Impact of Control Technology, 12(1), 161–166. Baheti, R., & Gill, H. (2011). Cyber-physical systems. The Impact of Control Technology, 12(1), 161–166.
go back to reference Bahri, A., Bouaziz, R., & Gargouri, F. (2012). “Towards an efficient datalog based evaluation of the FSAQL query language. In International Workshop on Resource Discovery. Springer, 2012, pp. 150–180. Bahri, A., Bouaziz, R., & Gargouri, F. (2012). “Towards an efficient datalog based evaluation of the FSAQL query language. In International Workshop on Resource Discovery. Springer, 2012, pp. 150–180.
go back to reference Balador, A., Ericsson, N., & Bakhshi, Z. (2017). Communication middleware technologies for industrial distributed control systems: A literature review. In Emerging Technologies and Factory Automation (ETFA), 2017 22nd IEEE International Conference on. IEEE, 2017, pp. 1–6. Balador, A., Ericsson, N., & Bakhshi, Z. (2017). Communication middleware technologies for industrial distributed control systems: A literature review. In Emerging Technologies and Factory Automation (ETFA), 2017 22nd IEEE International Conference on. IEEE, 2017, pp. 1–6.
go back to reference Beissel, S. (2016). Cybersecurity investments. Springer. Beissel, S. (2016). Cybersecurity investments. Springer.
go back to reference Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: A survey. Future Generation Computer Systems, 56, 684–700.CrossRef Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: A survey. Future Generation Computer Systems, 56, 684–700.CrossRef
go back to reference Boye, C. A., Kearney, P., & Josephs, M. (2018). Cyber-risks in the industrial internet of things (IIoT): To- wards a method for continuous assessment. In International Conference on Information Security. Springer, 2018, pp. 502–519. Boye, C. A., Kearney, P., & Josephs, M. (2018). Cyber-risks in the industrial internet of things (IIoT): To- wards a method for continuous assessment. In International Conference on Information Security. Springer, 2018, pp. 502–519.
go back to reference Cassandras, C. G. (2016). Smart cities as cyber-physical social systems. Engineering, 2(2), 156–158.CrossRef Cassandras, C. G. (2016). Smart cities as cyber-physical social systems. Engineering, 2(2), 156–158.CrossRef
go back to reference Cazzola, P., Gorner, M., Schuitmaker, R., & Maroney, E. (2018). Global ev outlook 2018. France: International Energy Agency. Cazzola, P., Gorner, M., Schuitmaker, R., & Maroney, E. (2018). Global ev outlook 2018. France: International Energy Agency.
go back to reference Chaâri, R., Ellouze, F., Koubâa, A., Qureshi, B., Pereira, N., Youssef, H., & Tovar, E. (2016). Cyber-physical systems clouds: A survey. Computer Networks, 108, 260–278. Elsevier.CrossRef Chaâri, R., Ellouze, F., Koubâa, A., Qureshi, B., Pereira, N., Youssef, H., & Tovar, E. (2016). Cyber-physical systems clouds: A survey. Computer Networks, 108, 260–278. Elsevier.CrossRef
go back to reference Ehrlich, M., Wisniewski, L., Trsek, H., & Jasperneite, J. (2018) Modelling and automatic mapping of cyber security requirements for industrial applications: Survey, problem exposition, and research focus. In 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS). IEEE, 2018, pp. 1–9. Ehrlich, M., Wisniewski, L., Trsek, H., & Jasperneite, J. (2018) Modelling and automatic mapping of cyber security requirements for industrial applications: Survey, problem exposition, and research focus. In 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS). IEEE, 2018, pp. 1–9.
go back to reference Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud computing: Concepts, technology, & architecture. Pearson Education. Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud computing: Concepts, technology, & architecture. Pearson Education.
go back to reference Falco, G., Caldera, C., & Shrobe, H. (2018). IIoT cybersecurity risk modeling for SCADA systems. IEEE Internet of Things Journal. Falco, G., Caldera, C., & Shrobe, H. (2018). IIoT cybersecurity risk modeling for SCADA systems. IEEE Internet of Things Journal.
go back to reference Graves, A., Mohamed, A.-R., & Hinton, G. (2013). Speech recognition with deep recurrent neural net- works. In Acoustics, speech and signal processing (ICASSP), 2013 IEEE international conference on. IEEE, 2013, pp. 6645–6649. Graves, A., Mohamed, A.-R., & Hinton, G. (2013). Speech recognition with deep recurrent neural net- works. In Acoustics, speech and signal processing (ICASSP), 2013 IEEE international conference on. IEEE, 2013, pp. 6645–6649.
go back to reference Gubán, M., & Kovács, G. (2017). Industry 4.0 conception. Acta Technica Corviniensis-Bulletin of Engineering, 10(1), 111. Gubán, M., & Kovács, G. (2017). Industry 4.0 conception. Acta Technica Corviniensis-Bulletin of Engineering, 10(1), 111.
go back to reference Hartmann, M., & Halecker, B. (2015) Critical infrastructure security in smart ecosystems,” in Future City Challenges Conference, HTW Berlin & Metropolia, Berlin, Germany, Vol. 15, p. 16. Hartmann, M., & Halecker, B. (2015) Critical infrastructure security in smart ecosystems,” in Future City Challenges Conference, HTW Berlin & Metropolia, Berlin, Germany, Vol. 15, p. 16.
go back to reference He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., & Gabrys, B. (2016) “The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In Evolutionary Computation (CEC), 2016 IEEE Congress on. IEEE, 2016, pp. 1015–1021. He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., & Gabrys, B. (2016) “The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In Evolutionary Computation (CEC), 2016 IEEE Congress on. IEEE, 2016, pp. 1015–1021.
go back to reference Heikkilä, M., Rättyä, A., Pieskä, S., & Jämsä, J. (2016) Security challenges in small-and medium-sized manufacturing enterprises. In Small-scale Intelligent Manufacturing Systems (SIMS), International Symposium on. IEEE, 2016, pp. 25–30. Heikkilä, M., Rättyä, A., Pieskä, S., & Jämsä, J. (2016) Security challenges in small-and medium-sized manufacturing enterprises. In Small-scale Intelligent Manufacturing Systems (SIMS), International Symposium on. IEEE, 2016, pp. 25–30.
go back to reference Helo, P., Suorsa, M., Hao, Y., & Anussornnitisarn, P. (2014). Toward a cloud-based manufacturing execution system for distributed manufacturing. Computers in Industry, 65(4), 646–656.CrossRef Helo, P., Suorsa, M., Hao, Y., & Anussornnitisarn, P. (2014). Toward a cloud-based manufacturing execution system for distributed manufacturing. Computers in Industry, 65(4), 646–656.CrossRef
go back to reference Herterich, M. M., Uebernickel, F., & Brenner, W. (2015). The impact of cyber-physical systems on in- dustrial services in manufacturing. Procedia CIRP, 30, 323–328.CrossRef Herterich, M. M., Uebernickel, F., & Brenner, W. (2015). The impact of cyber-physical systems on in- dustrial services in manufacturing. Procedia CIRP, 30, 323–328.CrossRef
go back to reference Hertzberg, J., & Chatila, R. (2008). Ai reasoning methods for robotics. In B. Siciliano & O. Khatib (Eds.), Springer handbook of robotics (pp. 207–223). Berlin/Heidelberg: Springer.CrossRef Hertzberg, J., & Chatila, R. (2008). Ai reasoning methods for robotics. In B. Siciliano & O. Khatib (Eds.), Springer handbook of robotics (pp. 207–223). Berlin/Heidelberg: Springer.CrossRef
go back to reference Hoeller, A., & Toegl, R.(2018) Trusted platform modules in cyber-physical systems: On the interference between security and dependability. In 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2018, pp. 136–144. Hoeller, A., & Toegl, R.(2018) Trusted platform modules in cyber-physical systems: On the interference between security and dependability. In 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2018, pp. 136–144.
go back to reference Hsu, C.-L., & Lin, J. C.-C. (2016). An empirical examination of consumer adoption of internet of things services: Network externalities and concern for information privacy perspectives. Computers in Human Behavior, 62, 516–527.CrossRef Hsu, C.-L., & Lin, J. C.-C. (2016). An empirical examination of consumer adoption of internet of things services: Network externalities and concern for information privacy perspectives. Computers in Human Behavior, 62, 516–527.CrossRef
go back to reference Johnson, R. C. (1993). What is cognitive computing? Dr. Dobb’s Journal, 18(2), 18–24. Johnson, R. C. (1993). What is cognitive computing? Dr. Dobb’s Journal, 18(2), 18–24.
go back to reference Kagermann, H. (2015). Change through digitization—value creation in the age of industry 4.0. In Management of permanent change. Springer, 2015, pp. 23–45. Kagermann, H. (2015). Change through digitization—value creation in the age of industry 4.0. In Management of permanent change. Springer, 2015, pp. 23–45.
go back to reference Kelly, J. E. (2015). Computing, cognition and the future of knowing. Whitepaper, IBM Research, p. 2. Kelly, J. E. (2015). Computing, cognition and the future of knowing. Whitepaper, IBM Research, p. 2.
go back to reference Khan, A., & Turowski, K. (2016) A survey of current challenges in manufacturing industry and preparation for industry 4.0. In Proceedings of the First International Scientific Conference “Intelligent Information Technologies for Industry”(IITI’16). Springer, 2016, pp. 15–26. Khan, A., & Turowski, K. (2016) A survey of current challenges in manufacturing industry and preparation for industry 4.0. In Proceedings of the First International Scientific Conference “Intelligent Information Technologies for Industry”(IITI’16). Springer, 2016, pp. 15–26.
go back to reference Khondoker, R., Larbig, P., Scheuermann, D., Weber, F., & Bayarou, K. (2017) Addressing industry 4.0 security by software-defined networking. In Guide to Security in SDN and NFV. Springer, 2017, pp. 229–251. Khondoker, R., Larbig, P., Scheuermann, D., Weber, F., & Bayarou, K. (2017) Addressing industry 4.0 security by software-defined networking. In Guide to Security in SDN and NFV. Springer, 2017, pp. 229–251.
go back to reference Kopetz, H. (2011). Internet of things. In Real-time systems. Real-time systems series. (pp. 307–323). Boston: Springer.MATH Kopetz, H. (2011). Internet of things. In Real-time systems. Real-time systems series. (pp. 307–323). Boston: Springer.MATH
go back to reference Lee, J., Kao, H.-A., & Yang, S. (2014). Service innovation and smart analytics for industry 4.0 and big data environment. Procedia CIRP, 16, 3–8.CrossRef Lee, J., Kao, H.-A., & Yang, S. (2014). Service innovation and smart analytics for industry 4.0 and big data environment. Procedia CIRP, 16, 3–8.CrossRef
go back to reference Leitão, P., Colombo, A. W., & Karnouskos, S. (2016). Industrial automation based on cyber-physical systems technologies: Prototype implementations and challenges. Computers in Industry, 81, 11–25.CrossRef Leitão, P., Colombo, A. W., & Karnouskos, S. (2016). Industrial automation based on cyber-physical systems technologies: Prototype implementations and challenges. Computers in Industry, 81, 11–25.CrossRef
go back to reference Liddy, E. D. (2001). Natural language processing. In Encyclopedia of library and information science (2nd ed.). New York: Marcel Decker, Inc. Liddy, E. D. (2001). Natural language processing. In Encyclopedia of library and information science (2nd ed.). New York: Marcel Decker, Inc.
go back to reference Liu, Y., & Xu, X. (2017). Industry 4.0 and cloud manufacturing: A comparative analysis. Journal of Manufacturing Science and Engineering, 139(3), 034701.CrossRef Liu, Y., & Xu, X. (2017). Industry 4.0 and cloud manufacturing: A comparative analysis. Journal of Manufacturing Science and Engineering, 139(3), 034701.CrossRef
go back to reference Liu, S., Liu, X. P., & El Saddik, A. (2013) Denial-of-service (dos) attacks on load frequency control in smart grids. In Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES. IEEE, 2013, pp. 1–6. Liu, S., Liu, X. P., & El Saddik, A. (2013) Denial-of-service (dos) attacks on load frequency control in smart grids. In Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES. IEEE, 2013, pp. 1–6.
go back to reference Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., & Leung, V. C. (2018). A survey on security threats and defensive techniques of machine learning: A data driven view. IEEE Access, 6., pp. 12 103–12 117. Liu, Q., Li, P., Zhao, W., Cai, W., Yu, S., & Leung, V. C. (2018). A survey on security threats and defensive techniques of machine learning: A data driven view. IEEE Access, 6., pp. 12 103–12 117.
go back to reference Magruk, A. (2016). Uncertainty in the sphere of the industry 4.0–potential areas to research. Business, Management and Education, 14(2), 275–291.CrossRef Magruk, A. (2016). Uncertainty in the sphere of the industry 4.0–potential areas to research. Business, Management and Education, 14(2), 275–291.CrossRef
go back to reference Malina, L., Dzurenda, P., Hajny, J., & Martinasek, Z. (2018) Assessment of cryptography support and security on programmable smart cards. In 2018 41st International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2018, pp. 1–5. Malina, L., Dzurenda, P., Hajny, J., & Martinasek, Z. (2018) Assessment of cryptography support and security on programmable smart cards. In 2018 41st International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2018, pp. 1–5.
go back to reference de Man, J. C., & Strandhagen, J. O. (2017). An industry 4.0 research agenda for sustainable business models. Procedia CIRP, 63, 721–726.CrossRef de Man, J. C., & Strandhagen, J. O. (2017). An industry 4.0 research agenda for sustainable business models. Procedia CIRP, 63, 721–726.CrossRef
go back to reference Masoni, R., Ferrise, F., Bordegoni, M., Gattullo, M., Uva, A. E., Fiorentino, M., Carrabba, E., & Di Donato, M. (2017). Supporting remote maintenance in industry 4.0 through augmented reality. Procedia Manufacturing, 11, 1296–1302.CrossRef Masoni, R., Ferrise, F., Bordegoni, M., Gattullo, M., Uva, A. E., Fiorentino, M., Carrabba, E., & Di Donato, M. (2017). Supporting remote maintenance in industry 4.0 through augmented reality. Procedia Manufacturing, 11, 1296–1302.CrossRef
go back to reference Meany, T. (2017). Functional safety and industrie 4.0. In Signals and Systems Conference (ISSC), 2017 28th Irish. IEEE, 2017, pp. 1–7. Meany, T. (2017). Functional safety and industrie 4.0. In Signals and Systems Conference (ISSC), 2017 28th Irish. IEEE, 2017, pp. 1–7.
go back to reference Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (draft) (p. 800). NIST Spec. Publ. 7, National Institute of Standards and Technology, Gaithersburg. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (draft) (p. 800). NIST Spec. Publ. 7, National Institute of Standards and Technology, Gaithersburg.
go back to reference Murphy, K. (2012). Machine learning — A probabilistic perspective. The MIT Press, National Institute of Standards and Technology, Gaithersburg. Murphy, K. (2012). Machine learning — A probabilistic perspective. The MIT Press, National Institute of Standards and Technology, Gaithersburg.
go back to reference Osorno, M., Millar, T., & Rager, D. (2011). Coordinated cybersecurity incident handling: Roles, processes, and coordination networks for crosscutting incidents. Johns Hopkins University Laurel MD Applied Physics Lab, Tech. Rep. Osorno, M., Millar, T., & Rager, D. (2011). Coordinated cybersecurity incident handling: Roles, processes, and coordination networks for crosscutting incidents. Johns Hopkins University Laurel MD Applied Physics Lab, Tech. Rep.
go back to reference Pereira, T., Barreto, L., & Amaral, A. (2017). Network and information security challenges within industry 4.0 paradigm. Procedia Manufacturing, 13, 1253–1260.CrossRef Pereira, T., Barreto, L., & Amaral, A. (2017). Network and information security challenges within industry 4.0 paradigm. Procedia Manufacturing, 13, 1253–1260.CrossRef
go back to reference Poindexter, D. F. (2018). The Chinese information war: Espionage, cyberwar, communications control and related threats to United States interests. McFarland. Poindexter, D. F. (2018). The Chinese information war: Espionage, cyberwar, communications control and related threats to United States interests. McFarland.
go back to reference Rennung, F., Luminosu, C. T., & Draghici, A. (2016). Service provision in the framework of industry 4.0. Procedia-Social and Behavioral Sciences, 221, 372–377.CrossRef Rennung, F., Luminosu, C. T., & Draghici, A. (2016). Service provision in the framework of industry 4.0. Procedia-Social and Behavioral Sciences, 221, 372–377.CrossRef
go back to reference Sadeghi, A.-R., Wachsmann, C., & Waidner, M. (2015). Security and privacy challenges in industrial internet of things. In Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE. IEEE, 2015, pp. 1–6. Sadeghi, A.-R., Wachsmann, C., & Waidner, M. (2015). Security and privacy challenges in industrial internet of things. In Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE. IEEE, 2015, pp. 1–6.
go back to reference Shahzad, A., Kim, Y.-G., & Elgamoudi, A. (2017). Secure IoT platform for industrial control systems. In Platform Technology and Service (PlatCon), 2017 International Conference on. IEEE, 2017, pp. 1–6. Shahzad, A., Kim, Y.-G., & Elgamoudi, A. (2017). Secure IoT platform for industrial control systems. In Platform Technology and Service (PlatCon), 2017 International Conference on. IEEE, 2017, pp. 1–6.
go back to reference Smith-Atakan, S. (2006). Human-computer interaction (pp. 54–57). London: Thomson Learning. Smith-Atakan, S. (2006). Human-computer interaction (pp. 54–57). London: Thomson Learning.
go back to reference Stock, T., & Seliger, G. (2016). Opportunities of sustainable manufacturing in industry 4.0. Procedia CIRP, 40, 536–541.CrossRef Stock, T., & Seliger, G. (2016). Opportunities of sustainable manufacturing in industry 4.0. Procedia CIRP, 40, 536–541.CrossRef
go back to reference Tupa, J., Simota, J., & Steiner, F. (2017). Aspects of risk management implementation for industry 4.0. Procedia Manufacturing, 11, 1223–1230.CrossRef Tupa, J., Simota, J., & Steiner, F. (2017). Aspects of risk management implementation for industry 4.0. Procedia Manufacturing, 11, 1223–1230.CrossRef
go back to reference Ustundag, A., & Cevikcan, E. (2018). Industry 4.0: Managing the digital transformation. Cham: Springer.CrossRef Ustundag, A., & Cevikcan, E. (2018). Industry 4.0: Managing the digital transformation. Cham: Springer.CrossRef
go back to reference Vaidyaa, S., Ambadb, P., & Bhoslec, S. (2018). Industry 4.0–a glimpse. Design Engineering, 2351, 9789. Vaidyaa, S., Ambadb, P., & Bhoslec, S. (2018). Industry 4.0–a glimpse. Design Engineering, 2351, 9789.
go back to reference Waidner, M., & Kasper, M. (2016) Security in industrie 4.0-challenges and solutions for the fourth industrial revolution. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2016. IEEE, 2016, pp. 1303–1308. Waidner, M., & Kasper, M. (2016) Security in industrie 4.0-challenges and solutions for the fourth industrial revolution. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2016. IEEE, 2016, pp. 1303–1308.
go back to reference Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5), 1344–1371.CrossRef Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5), 1344–1371.CrossRef
go back to reference Wang, S., Wan, J., Zhang, D., Li, D., & Zhang, C. (2016a). Towards smart factory for industry 4.0: A self- organized multi-agent system with big data based feedback and coordination. Computer Networks, 101, 158–168.CrossRef Wang, S., Wan, J., Zhang, D., Li, D., & Zhang, C. (2016a). Towards smart factory for industry 4.0: A self- organized multi-agent system with big data based feedback and coordination. Computer Networks, 101, 158–168.CrossRef
go back to reference Wang, S., Wan, J., Li, D., & Zhang, C. (2016b). Implementing smart factory of industrie 4.0: An outlook. International Journal of Distributed Sensor Networks, 12(1), 3159805.CrossRef Wang, S., Wan, J., Li, D., & Zhang, C. (2016b). Implementing smart factory of industrie 4.0: An outlook. International Journal of Distributed Sensor Networks, 12(1), 3159805.CrossRef
go back to reference Waslo, R., Lewis, T., Hajj, R., & Carton, R. (2017). Industry 4.0 and cybersecurity: Managing risk in an age of connected production. Deloitte University Press, National Institute of Standards and Technology, Gaithersburg. Waslo, R., Lewis, T., Hajj, R., & Carton, R. (2017). Industry 4.0 and cybersecurity: Managing risk in an age of connected production. Deloitte University Press, National Institute of Standards and Technology, Gaithersburg.
go back to reference Weyer, S., Schmitt, M., Ohmer, M., & Gorecky, D. (2015). Towards industry 4.0-standardization as the crucial challenge for highly modular, multi-vendor production systems. IFAC-Papersonline, 48(3), 579–584.CrossRef Weyer, S., Schmitt, M., Ohmer, M., & Gorecky, D. (2015). Towards industry 4.0-standardization as the crucial challenge for highly modular, multi-vendor production systems. IFAC-Papersonline, 48(3), 579–584.CrossRef
go back to reference Yan, J., Meng, Y., Lu, L., & Li, L. (2017). Industrial big data in an industry 4.0 environment: Challenges, schemes, and applications for predictive maintenance. IEEE Access, 5., pp. 23 484–23 491. Yan, J., Meng, Y., Lu, L., & Li, L. (2017). Industrial big data in an industry 4.0 environment: Challenges, schemes, and applications for predictive maintenance. IEEE Access, 5., pp. 23 484–23 491.
go back to reference Zawadzki, P., & Żywicki, K. (2016). Smart product design and production control for effective mass customization in the industry 4.0 concept. Management and Production Engineering Review, 7(3), 105–112.CrossRef Zawadzki, P., & Żywicki, K. (2016). Smart product design and production control for effective mass customization in the industry 4.0 concept. Management and Production Engineering Review, 7(3), 105–112.CrossRef
go back to reference Zezulka, F., Marcon, P., Vesely, I., & Sajdl, O. (2016). Industry 4.0–an introduction in the phenomenon. IFAC-PapersOnLine, 49(25), 8–12.CrossRef Zezulka, F., Marcon, P., Vesely, I., & Sajdl, O. (2016). Industry 4.0–an introduction in the phenomenon. IFAC-PapersOnLine, 49(25), 8–12.CrossRef
go back to reference Zhou, L., Yeh, K.-H., Hancke, G., Liu, Z., & Su, C. (2018). Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints. IEEE Signal Processing Magazine, 35(5), 76–87.CrossRef Zhou, L., Yeh, K.-H., Hancke, G., Liu, Z., & Su, C. (2018). Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints. IEEE Signal Processing Magazine, 35(5), 76–87.CrossRef
go back to reference Zuehlke, D. (2010). Smartfactory—Towards a factory-of-things. Annual Reviews in Control, 34(1), 129–138.CrossRef Zuehlke, D. (2010). Smartfactory—Towards a factory-of-things. Annual Reviews in Control, 34(1), 129–138.CrossRef
Metadata
Title
Security Challenges in the Industry 4.0 Era
Authors
Mohammed M. Alani
Mohamed Alloghani
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-12953-8_8