Security of controlled manufacturing systems in the connected factory: the case of industrial robots View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2019-02-13

AUTHORS

Marcello Pogliani, Davide Quarta, Mario Polino, Martino Vittone, Federico Maggi, Stefano Zanero

ABSTRACT

In modern factories, “controlled” manufacturing systems, such as industrial robots, CNC machines, or 3D printers, are often connected in a control network, together with a plethora of heterogeneous control devices. Despite the obvious advantages in terms of production and ease of maintenance, this trend raises non-trivial cybersecurity concerns. Often, the devices employed are not designed for an interconnected world, but cannot be promptly replaced: In fact, they have essentially become legacy systems, embodying design patterns where components and networks are accounted as trusted elements. In this paper, we take a holistic view of the security issues (and challenges) that arise in designing and securely deploying controlled manufacturing systems, using industrial robots as a case study—indeed, robots are the most representative instance of a complex automatically controlled industrial device. Following up to our previous experimental analysis, we take a broad look at the deployment of industrial robots in a typical factory network and at the security challenges that arise from the interaction between operators and machines; then, we propose actionable points to secure industrial cyber-physical systems, and we discuss the limitations of the current standards in industrial robotics to account for active attackers. More... »

PAGES

161-175

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s11416-019-00329-8

DOI

http://dx.doi.org/10.1007/s11416-019-00329-8

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1112113213


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Politecnico di Milano, Milan, Italy", 
          "id": "http://www.grid.ac/institutes/grid.4643.5", 
          "name": [
            "Politecnico di Milano, Milan, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Pogliani", 
        "givenName": "Marcello", 
        "id": "sg:person.012176601437.44", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012176601437.44"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "EURECOM, Biot, France", 
          "id": "http://www.grid.ac/institutes/grid.28848.3e", 
          "name": [
            "Politecnico di Milano, Milan, Italy", 
            "EURECOM, Biot, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Quarta", 
        "givenName": "Davide", 
        "id": "sg:person.016616761173.75", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016616761173.75"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Politecnico di Milano, Milan, Italy", 
          "id": "http://www.grid.ac/institutes/grid.4643.5", 
          "name": [
            "Politecnico di Milano, Milan, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Polino", 
        "givenName": "Mario", 
        "id": "sg:person.010065621302.13", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010065621302.13"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Politecnico di Milano, Milan, Italy", 
          "id": "http://www.grid.ac/institutes/grid.4643.5", 
          "name": [
            "Politecnico di Milano, Milan, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Vittone", 
        "givenName": "Martino", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Trend Micro Inc., Milan, Italy", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Trend Micro Inc., Milan, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Maggi", 
        "givenName": "Federico", 
        "id": "sg:person.012136314320.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012136314320.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Politecnico di Milano, Milan, Italy", 
          "id": "http://www.grid.ac/institutes/grid.4643.5", 
          "name": [
            "Politecnico di Milano, Milan, Italy"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zanero", 
        "givenName": "Stefano", 
        "id": "sg:person.015215560141.46", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015215560141.46"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2019-02-13", 
    "datePublishedReg": "2019-02-13", 
    "description": "In modern factories, \u201ccontrolled\u201d manufacturing systems, such as industrial robots, CNC machines, or 3D printers, are often connected in a control network, together with a plethora of heterogeneous control devices. Despite the obvious advantages in terms of production and ease of maintenance, this trend raises non-trivial cybersecurity concerns. Often, the devices employed are not designed for an interconnected world, but cannot be promptly replaced: In fact, they have essentially become legacy systems, embodying design patterns where components and networks are accounted as trusted elements. In this paper, we take a holistic view of the security issues (and challenges) that arise in designing and securely deploying controlled manufacturing systems, using industrial robots as a case study\u2014indeed, robots are the most representative instance of a complex automatically controlled industrial device. Following up to our previous experimental analysis, we take a broad look at the deployment of industrial robots in a typical factory network and at the security challenges that arise from the interaction between operators and machines; then, we propose actionable points to secure industrial cyber-physical systems, and we discuss the limitations of the current standards in industrial robotics to account for active attackers.", 
    "genre": "article", 
    "id": "sg:pub.10.1007/s11416-019-00329-8", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isFundedItemOf": [
      {
        "id": "sg:grant.5495102", 
        "type": "MonetaryGrant"
      }
    ], 
    "isPartOf": [
      {
        "id": "sg:journal.1381581", 
        "issn": [
          "1772-9890", 
          "1772-9904"
        ], 
        "name": "Journal of Computer Virology and Hacking Techniques", 
        "publisher": "Springer Nature", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "3", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "15"
      }
    ], 
    "keywords": [
      "industrial robots", 
      "manufacturing systems", 
      "Industrial Cyber-Physical Systems", 
      "cyber-physical systems", 
      "heterogeneous control devices", 
      "legacy systems", 
      "active attacker", 
      "industrial robotics", 
      "design patterns", 
      "security issues", 
      "connected factories", 
      "security challenges", 
      "cybersecurity concerns", 
      "factory network", 
      "representative instances", 
      "robot", 
      "ease of maintenance", 
      "modern factories", 
      "industrial devices", 
      "CNC machine", 
      "network", 
      "control devices", 
      "control network", 
      "interconnected world", 
      "machine", 
      "previous experimental analyses", 
      "holistic view", 
      "experimental analysis", 
      "obvious advantages", 
      "attacker", 
      "robotics", 
      "devices", 
      "case study", 
      "system", 
      "security", 
      "deployment", 
      "actionable points", 
      "factory", 
      "designing", 
      "instances", 
      "operators", 
      "printer", 
      "challenges", 
      "broad look", 
      "ease", 
      "issues", 
      "advantages", 
      "plethora", 
      "terms of production", 
      "standards", 
      "limitations", 
      "world", 
      "view", 
      "current standard", 
      "look", 
      "terms", 
      "elements", 
      "point", 
      "maintenance", 
      "components", 
      "concern", 
      "fact", 
      "production", 
      "analysis", 
      "trends", 
      "patterns", 
      "interaction", 
      "cases", 
      "study", 
      "complexes", 
      "paper", 
      "non-trivial cybersecurity concerns", 
      "typical factory network"
    ], 
    "name": "Security of controlled manufacturing systems in the connected factory: the case of industrial robots", 
    "pagination": "161-175", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1112113213"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s11416-019-00329-8"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s11416-019-00329-8", 
      "https://app.dimensions.ai/details/publication/pub.1112113213"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2021-12-01T19:43", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20211201/entities/gbq_results/article/article_804.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://doi.org/10.1007/s11416-019-00329-8"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11416-019-00329-8'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11416-019-00329-8'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11416-019-00329-8'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11416-019-00329-8'


 

This table displays all metadata directly associated to this object as RDF triples.

174 TRIPLES      21 PREDICATES      98 URIs      90 LITERALS      6 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s11416-019-00329-8 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author N5d7c0b215fa24fe4bdd8eea9caf1f277
4 schema:datePublished 2019-02-13
5 schema:datePublishedReg 2019-02-13
6 schema:description In modern factories, “controlled” manufacturing systems, such as industrial robots, CNC machines, or 3D printers, are often connected in a control network, together with a plethora of heterogeneous control devices. Despite the obvious advantages in terms of production and ease of maintenance, this trend raises non-trivial cybersecurity concerns. Often, the devices employed are not designed for an interconnected world, but cannot be promptly replaced: In fact, they have essentially become legacy systems, embodying design patterns where components and networks are accounted as trusted elements. In this paper, we take a holistic view of the security issues (and challenges) that arise in designing and securely deploying controlled manufacturing systems, using industrial robots as a case study—indeed, robots are the most representative instance of a complex automatically controlled industrial device. Following up to our previous experimental analysis, we take a broad look at the deployment of industrial robots in a typical factory network and at the security challenges that arise from the interaction between operators and machines; then, we propose actionable points to secure industrial cyber-physical systems, and we discuss the limitations of the current standards in industrial robotics to account for active attackers.
7 schema:genre article
8 schema:inLanguage en
9 schema:isAccessibleForFree true
10 schema:isPartOf N4c3f89f15b8147aea2c4d260dfcb662f
11 N7f3e256fb5ee48078803ca0291492f86
12 sg:journal.1381581
13 schema:keywords CNC machine
14 Industrial Cyber-Physical Systems
15 actionable points
16 active attacker
17 advantages
18 analysis
19 attacker
20 broad look
21 case study
22 cases
23 challenges
24 complexes
25 components
26 concern
27 connected factories
28 control devices
29 control network
30 current standard
31 cyber-physical systems
32 cybersecurity concerns
33 deployment
34 design patterns
35 designing
36 devices
37 ease
38 ease of maintenance
39 elements
40 experimental analysis
41 fact
42 factory
43 factory network
44 heterogeneous control devices
45 holistic view
46 industrial devices
47 industrial robotics
48 industrial robots
49 instances
50 interaction
51 interconnected world
52 issues
53 legacy systems
54 limitations
55 look
56 machine
57 maintenance
58 manufacturing systems
59 modern factories
60 network
61 non-trivial cybersecurity concerns
62 obvious advantages
63 operators
64 paper
65 patterns
66 plethora
67 point
68 previous experimental analyses
69 printer
70 production
71 representative instances
72 robot
73 robotics
74 security
75 security challenges
76 security issues
77 standards
78 study
79 system
80 terms
81 terms of production
82 trends
83 typical factory network
84 view
85 world
86 schema:name Security of controlled manufacturing systems in the connected factory: the case of industrial robots
87 schema:pagination 161-175
88 schema:productId N941f52eeb6544e31bab3aafbf6224695
89 Nf5271b0a1619418da64f5cc80ddb48c9
90 schema:sameAs https://app.dimensions.ai/details/publication/pub.1112113213
91 https://doi.org/10.1007/s11416-019-00329-8
92 schema:sdDatePublished 2021-12-01T19:43
93 schema:sdLicense https://scigraph.springernature.com/explorer/license/
94 schema:sdPublisher N387a37e1202945b680ca8de80d43eb96
95 schema:url https://doi.org/10.1007/s11416-019-00329-8
96 sgo:license sg:explorer/license/
97 sgo:sdDataset articles
98 rdf:type schema:ScholarlyArticle
99 N060c286179674a85b0c61accce07c5b3 rdf:first sg:person.016616761173.75
100 rdf:rest Ne6d0b22f68e143e09c76387602360e69
101 N387a37e1202945b680ca8de80d43eb96 schema:name Springer Nature - SN SciGraph project
102 rdf:type schema:Organization
103 N3dda7ac6242e4f17ad1574dc50ec149f schema:affiliation grid-institutes:grid.4643.5
104 schema:familyName Vittone
105 schema:givenName Martino
106 rdf:type schema:Person
107 N4c3f89f15b8147aea2c4d260dfcb662f schema:issueNumber 3
108 rdf:type schema:PublicationIssue
109 N5d7c0b215fa24fe4bdd8eea9caf1f277 rdf:first sg:person.012176601437.44
110 rdf:rest N060c286179674a85b0c61accce07c5b3
111 N7f3e256fb5ee48078803ca0291492f86 schema:volumeNumber 15
112 rdf:type schema:PublicationVolume
113 N941f52eeb6544e31bab3aafbf6224695 schema:name dimensions_id
114 schema:value pub.1112113213
115 rdf:type schema:PropertyValue
116 Nd3d1c4cee1f349cd91116b950cf1c123 rdf:first sg:person.012136314320.26
117 rdf:rest Nde03fada728a45e587c4f44902e4c723
118 Ndb519e2e692f4b5dbc9040eef399d2c7 rdf:first N3dda7ac6242e4f17ad1574dc50ec149f
119 rdf:rest Nd3d1c4cee1f349cd91116b950cf1c123
120 Nde03fada728a45e587c4f44902e4c723 rdf:first sg:person.015215560141.46
121 rdf:rest rdf:nil
122 Ne6d0b22f68e143e09c76387602360e69 rdf:first sg:person.010065621302.13
123 rdf:rest Ndb519e2e692f4b5dbc9040eef399d2c7
124 Nf5271b0a1619418da64f5cc80ddb48c9 schema:name doi
125 schema:value 10.1007/s11416-019-00329-8
126 rdf:type schema:PropertyValue
127 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
128 schema:name Information and Computing Sciences
129 rdf:type schema:DefinedTerm
130 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
131 schema:name Artificial Intelligence and Image Processing
132 rdf:type schema:DefinedTerm
133 sg:grant.5495102 http://pending.schema.org/fundedItem sg:pub.10.1007/s11416-019-00329-8
134 rdf:type schema:MonetaryGrant
135 sg:journal.1381581 schema:issn 1772-9890
136 1772-9904
137 schema:name Journal of Computer Virology and Hacking Techniques
138 schema:publisher Springer Nature
139 rdf:type schema:Periodical
140 sg:person.010065621302.13 schema:affiliation grid-institutes:grid.4643.5
141 schema:familyName Polino
142 schema:givenName Mario
143 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010065621302.13
144 rdf:type schema:Person
145 sg:person.012136314320.26 schema:affiliation grid-institutes:None
146 schema:familyName Maggi
147 schema:givenName Federico
148 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012136314320.26
149 rdf:type schema:Person
150 sg:person.012176601437.44 schema:affiliation grid-institutes:grid.4643.5
151 schema:familyName Pogliani
152 schema:givenName Marcello
153 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012176601437.44
154 rdf:type schema:Person
155 sg:person.015215560141.46 schema:affiliation grid-institutes:grid.4643.5
156 schema:familyName Zanero
157 schema:givenName Stefano
158 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015215560141.46
159 rdf:type schema:Person
160 sg:person.016616761173.75 schema:affiliation grid-institutes:grid.28848.3e
161 schema:familyName Quarta
162 schema:givenName Davide
163 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016616761173.75
164 rdf:type schema:Person
165 grid-institutes:None schema:alternateName Trend Micro Inc., Milan, Italy
166 schema:name Trend Micro Inc., Milan, Italy
167 rdf:type schema:Organization
168 grid-institutes:grid.28848.3e schema:alternateName EURECOM, Biot, France
169 schema:name EURECOM, Biot, France
170 Politecnico di Milano, Milan, Italy
171 rdf:type schema:Organization
172 grid-institutes:grid.4643.5 schema:alternateName Politecnico di Milano, Milan, Italy
173 schema:name Politecnico di Milano, Milan, Italy
174 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...