Security of controlled manufacturing systems in the connected factory: the case of industrial robots View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2019-02-13

AUTHORS

Marcello Pogliani, Davide Quarta, Mario Polino, Martino Vittone, Federico Maggi, Stefano Zanero

ABSTRACT

In modern factories, “controlled” manufacturing systems, such as industrial robots, CNC machines, or 3D printers, are often connected in a control network, together with a plethora of heterogeneous control devices. Despite the obvious advantages in terms of production and ease of maintenance, this trend raises non-trivial cybersecurity concerns. Often, the devices employed are not designed for an interconnected world, but cannot be promptly replaced: In fact, they have essentially become legacy systems, embodying design patterns where components and networks are accounted as trusted elements. In this paper, we take a holistic view of the security issues (and challenges) that arise in designing and securely deploying controlled manufacturing systems, using industrial robots as a case study—indeed, robots are the most representative instance of a complex automatically controlled industrial device. Following up to our previous experimental analysis, we take a broad look at the deployment of industrial robots in a typical factory network and at the security challenges that arise from the interaction between operators and machines; then, we propose actionable points to secure industrial cyber-physical systems, and we discuss the limitations of the current standards in industrial robotics to account for active attackers. More... »

PAGES

161-175

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s11416-019-00329-8

DOI

http://dx.doi.org/10.1007/s11416-019-00329-8

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1112113213


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Politecnico di Milano, Milan, Italy", 
          "id": "http://www.grid.ac/institutes/grid.4643.5", 
          "name": [
            "Politecnico di Milano, Milan, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Pogliani", 
        "givenName": "Marcello", 
        "id": "sg:person.012176601437.44", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012176601437.44"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "EURECOM, Biot, France", 
          "id": "http://www.grid.ac/institutes/grid.28848.3e", 
          "name": [
            "Politecnico di Milano, Milan, Italy", 
            "EURECOM, Biot, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Quarta", 
        "givenName": "Davide", 
        "id": "sg:person.016616761173.75", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016616761173.75"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Politecnico di Milano, Milan, Italy", 
          "id": "http://www.grid.ac/institutes/grid.4643.5", 
          "name": [
            "Politecnico di Milano, Milan, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Polino", 
        "givenName": "Mario", 
        "id": "sg:person.010065621302.13", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010065621302.13"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Politecnico di Milano, Milan, Italy", 
          "id": "http://www.grid.ac/institutes/grid.4643.5", 
          "name": [
            "Politecnico di Milano, Milan, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Vittone", 
        "givenName": "Martino", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Trend Micro Inc., Milan, Italy", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Trend Micro Inc., Milan, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Maggi", 
        "givenName": "Federico", 
        "id": "sg:person.012136314320.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012136314320.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Politecnico di Milano, Milan, Italy", 
          "id": "http://www.grid.ac/institutes/grid.4643.5", 
          "name": [
            "Politecnico di Milano, Milan, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zanero", 
        "givenName": "Stefano", 
        "id": "sg:person.015215560141.46", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015215560141.46"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2019-02-13", 
    "datePublishedReg": "2019-02-13", 
    "description": "In modern factories, \u201ccontrolled\u201d manufacturing systems, such as industrial robots, CNC machines, or 3D printers, are often connected in a control network, together with a plethora of heterogeneous control devices. Despite the obvious advantages in terms of production and ease of maintenance, this trend raises non-trivial cybersecurity concerns. Often, the devices employed are not designed for an interconnected world, but cannot be promptly replaced: In fact, they have essentially become legacy systems, embodying design patterns where components and networks are accounted as trusted elements. In this paper, we take a holistic view of the security issues (and challenges) that arise in designing and securely deploying controlled manufacturing systems, using industrial robots as a case study\u2014indeed, robots are the most representative instance of a complex automatically controlled industrial device. Following up to our previous experimental analysis, we take a broad look at the deployment of industrial robots in a typical factory network and at the security challenges that arise from the interaction between operators and machines; then, we propose actionable points to secure industrial cyber-physical systems, and we discuss the limitations of the current standards in industrial robotics to account for active attackers.", 
    "genre": "article", 
    "id": "sg:pub.10.1007/s11416-019-00329-8", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isFundedItemOf": [
      {
        "id": "sg:grant.5495102", 
        "type": "MonetaryGrant"
      }
    ], 
    "isPartOf": [
      {
        "id": "sg:journal.1381581", 
        "issn": [
          "1772-9890", 
          "1772-9904"
        ], 
        "name": "Journal of Computer Virology and Hacking Techniques", 
        "publisher": "Springer Nature", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "3", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "15"
      }
    ], 
    "keywords": [
      "industrial robots", 
      "manufacturing systems", 
      "Industrial Cyber-Physical Systems", 
      "cyber-physical systems", 
      "heterogeneous control devices", 
      "legacy systems", 
      "active attacker", 
      "industrial robotics", 
      "design patterns", 
      "security issues", 
      "connected factories", 
      "security challenges", 
      "cybersecurity concerns", 
      "factory network", 
      "representative instances", 
      "robot", 
      "ease of maintenance", 
      "modern factories", 
      "industrial devices", 
      "CNC machine", 
      "network", 
      "control devices", 
      "control network", 
      "interconnected world", 
      "machine", 
      "previous experimental analyses", 
      "holistic view", 
      "experimental analysis", 
      "obvious advantages", 
      "attacker", 
      "robotics", 
      "devices", 
      "case study", 
      "system", 
      "security", 
      "deployment", 
      "actionable points", 
      "factory", 
      "designing", 
      "instances", 
      "operators", 
      "printer", 
      "challenges", 
      "broad look", 
      "ease", 
      "issues", 
      "advantages", 
      "plethora", 
      "terms of production", 
      "standards", 
      "limitations", 
      "world", 
      "view", 
      "current standard", 
      "look", 
      "terms", 
      "elements", 
      "point", 
      "maintenance", 
      "components", 
      "concern", 
      "fact", 
      "production", 
      "analysis", 
      "trends", 
      "patterns", 
      "interaction", 
      "cases", 
      "study", 
      "complexes", 
      "paper", 
      "non-trivial cybersecurity concerns", 
      "typical factory network"
    ], 
    "name": "Security of controlled manufacturing systems in the connected factory: the case of industrial robots", 
    "pagination": "161-175", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1112113213"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s11416-019-00329-8"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s11416-019-00329-8", 
      "https://app.dimensions.ai/details/publication/pub.1112113213"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2022-01-01T18:52", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/article/article_799.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://doi.org/10.1007/s11416-019-00329-8"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11416-019-00329-8'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11416-019-00329-8'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11416-019-00329-8'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11416-019-00329-8'


 

This table displays all metadata directly associated to this object as RDF triples.

174 TRIPLES      21 PREDICATES      98 URIs      90 LITERALS      6 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s11416-019-00329-8 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author Nee9a99d92b5e40e19d1a7fdc7362ad54
4 schema:datePublished 2019-02-13
5 schema:datePublishedReg 2019-02-13
6 schema:description In modern factories, “controlled” manufacturing systems, such as industrial robots, CNC machines, or 3D printers, are often connected in a control network, together with a plethora of heterogeneous control devices. Despite the obvious advantages in terms of production and ease of maintenance, this trend raises non-trivial cybersecurity concerns. Often, the devices employed are not designed for an interconnected world, but cannot be promptly replaced: In fact, they have essentially become legacy systems, embodying design patterns where components and networks are accounted as trusted elements. In this paper, we take a holistic view of the security issues (and challenges) that arise in designing and securely deploying controlled manufacturing systems, using industrial robots as a case study—indeed, robots are the most representative instance of a complex automatically controlled industrial device. Following up to our previous experimental analysis, we take a broad look at the deployment of industrial robots in a typical factory network and at the security challenges that arise from the interaction between operators and machines; then, we propose actionable points to secure industrial cyber-physical systems, and we discuss the limitations of the current standards in industrial robotics to account for active attackers.
7 schema:genre article
8 schema:inLanguage en
9 schema:isAccessibleForFree true
10 schema:isPartOf N7e8e1c734ac540e1a0c0e1cb1ef76bd0
11 Nffc82a9fee52403e9adb85d71d42ff46
12 sg:journal.1381581
13 schema:keywords CNC machine
14 Industrial Cyber-Physical Systems
15 actionable points
16 active attacker
17 advantages
18 analysis
19 attacker
20 broad look
21 case study
22 cases
23 challenges
24 complexes
25 components
26 concern
27 connected factories
28 control devices
29 control network
30 current standard
31 cyber-physical systems
32 cybersecurity concerns
33 deployment
34 design patterns
35 designing
36 devices
37 ease
38 ease of maintenance
39 elements
40 experimental analysis
41 fact
42 factory
43 factory network
44 heterogeneous control devices
45 holistic view
46 industrial devices
47 industrial robotics
48 industrial robots
49 instances
50 interaction
51 interconnected world
52 issues
53 legacy systems
54 limitations
55 look
56 machine
57 maintenance
58 manufacturing systems
59 modern factories
60 network
61 non-trivial cybersecurity concerns
62 obvious advantages
63 operators
64 paper
65 patterns
66 plethora
67 point
68 previous experimental analyses
69 printer
70 production
71 representative instances
72 robot
73 robotics
74 security
75 security challenges
76 security issues
77 standards
78 study
79 system
80 terms
81 terms of production
82 trends
83 typical factory network
84 view
85 world
86 schema:name Security of controlled manufacturing systems in the connected factory: the case of industrial robots
87 schema:pagination 161-175
88 schema:productId Na3088728e5cb40daaa10e553375640e6
89 Nf3ea871ef9cc4cf79fd83b433aa4011a
90 schema:sameAs https://app.dimensions.ai/details/publication/pub.1112113213
91 https://doi.org/10.1007/s11416-019-00329-8
92 schema:sdDatePublished 2022-01-01T18:52
93 schema:sdLicense https://scigraph.springernature.com/explorer/license/
94 schema:sdPublisher Nd4a202fa987b441b9d20ef13df69a7d1
95 schema:url https://doi.org/10.1007/s11416-019-00329-8
96 sgo:license sg:explorer/license/
97 sgo:sdDataset articles
98 rdf:type schema:ScholarlyArticle
99 N159a5aa445e2437b8b7239757cc1a9d9 rdf:first sg:person.012136314320.26
100 rdf:rest N4d8c45a13a9e4a31b2d8449191ca00b7
101 N4d8c45a13a9e4a31b2d8449191ca00b7 rdf:first sg:person.015215560141.46
102 rdf:rest rdf:nil
103 N7e8e1c734ac540e1a0c0e1cb1ef76bd0 schema:issueNumber 3
104 rdf:type schema:PublicationIssue
105 N989142536c434e81919de33671bbd758 schema:affiliation grid-institutes:grid.4643.5
106 schema:familyName Vittone
107 schema:givenName Martino
108 rdf:type schema:Person
109 Na3088728e5cb40daaa10e553375640e6 schema:name dimensions_id
110 schema:value pub.1112113213
111 rdf:type schema:PropertyValue
112 Nac4b534b79564493994dd4d8309b0fd4 rdf:first sg:person.010065621302.13
113 rdf:rest Ncb3355e1afce48f99484a8237f45921b
114 Ncb3355e1afce48f99484a8237f45921b rdf:first N989142536c434e81919de33671bbd758
115 rdf:rest N159a5aa445e2437b8b7239757cc1a9d9
116 Nd4a202fa987b441b9d20ef13df69a7d1 schema:name Springer Nature - SN SciGraph project
117 rdf:type schema:Organization
118 Ndb84c0c7b75b4fff969b2fd77227fc83 rdf:first sg:person.016616761173.75
119 rdf:rest Nac4b534b79564493994dd4d8309b0fd4
120 Nee9a99d92b5e40e19d1a7fdc7362ad54 rdf:first sg:person.012176601437.44
121 rdf:rest Ndb84c0c7b75b4fff969b2fd77227fc83
122 Nf3ea871ef9cc4cf79fd83b433aa4011a schema:name doi
123 schema:value 10.1007/s11416-019-00329-8
124 rdf:type schema:PropertyValue
125 Nffc82a9fee52403e9adb85d71d42ff46 schema:volumeNumber 15
126 rdf:type schema:PublicationVolume
127 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
128 schema:name Information and Computing Sciences
129 rdf:type schema:DefinedTerm
130 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
131 schema:name Artificial Intelligence and Image Processing
132 rdf:type schema:DefinedTerm
133 sg:grant.5495102 http://pending.schema.org/fundedItem sg:pub.10.1007/s11416-019-00329-8
134 rdf:type schema:MonetaryGrant
135 sg:journal.1381581 schema:issn 1772-9890
136 1772-9904
137 schema:name Journal of Computer Virology and Hacking Techniques
138 schema:publisher Springer Nature
139 rdf:type schema:Periodical
140 sg:person.010065621302.13 schema:affiliation grid-institutes:grid.4643.5
141 schema:familyName Polino
142 schema:givenName Mario
143 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010065621302.13
144 rdf:type schema:Person
145 sg:person.012136314320.26 schema:affiliation grid-institutes:None
146 schema:familyName Maggi
147 schema:givenName Federico
148 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012136314320.26
149 rdf:type schema:Person
150 sg:person.012176601437.44 schema:affiliation grid-institutes:grid.4643.5
151 schema:familyName Pogliani
152 schema:givenName Marcello
153 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012176601437.44
154 rdf:type schema:Person
155 sg:person.015215560141.46 schema:affiliation grid-institutes:grid.4643.5
156 schema:familyName Zanero
157 schema:givenName Stefano
158 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015215560141.46
159 rdf:type schema:Person
160 sg:person.016616761173.75 schema:affiliation grid-institutes:grid.28848.3e
161 schema:familyName Quarta
162 schema:givenName Davide
163 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016616761173.75
164 rdf:type schema:Person
165 grid-institutes:None schema:alternateName Trend Micro Inc., Milan, Italy
166 schema:name Trend Micro Inc., Milan, Italy
167 rdf:type schema:Organization
168 grid-institutes:grid.28848.3e schema:alternateName EURECOM, Biot, France
169 schema:name EURECOM, Biot, France
170 Politecnico di Milano, Milan, Italy
171 rdf:type schema:Organization
172 grid-institutes:grid.4643.5 schema:alternateName Politecnico di Milano, Milan, Italy
173 schema:name Politecnico di Milano, Milan, Italy
174 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...