Security Framework for Network-Based Manufacturing Systems with Personalized Customization: An Industry 4.0 Approach

被引:11
作者
Hammad, Muhammad [1 ]
Jillani, Rashad Maqbool [2 ]
Ullah, Sami [3 ]
Namoun, Abdallah [4 ]
Tufail, Ali [5 ]
Kim, Ki-Hyung [6 ]
Shah, Habib [7 ]
机构
[1] GIK Inst Engn Sci & Technol, Fac Mech Engn, Topi 23640, Pakistan
[2] GIK Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23640, Pakistan
[3] Shaheed Benazir Bhutto Univ, Dept Comp Sci, Sheringal 18050, Pakistan
[4] Islamic Univ Madinah, Fac Comp & Informat Syst, Madinah 42351, Saudi Arabia
[5] Univ Brunei Darussalam, Sch Digital Sci, Tungku Link BE1410, Gadong, Brunei
[6] Ajou Univ, Dept Cyber Secur, Suwon 16499, South Korea
[7] King Khalid Univ, Dept & Coll Comp Sci, Abha 62529, Saudi Arabia
基金
新加坡国家研究基金会;
关键词
Industry; 4.0; smart manufacturing; newly personalized customization factory; network-based manufacturing system; mobile industrial robots; security; NTRUEncrypt cryptography; INTERNET; ATTACK;
D O I
10.3390/s23177555
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Smart manufacturing is pivotal in the context of Industry 4.0, as it integrates advanced technologies like the Internet of Things (IoT) and automation to streamline production processes and improve product quality, paving the way for a competitive industrial landscape. Machines have become network-based through the IoT, where integrated and collaborated manufacturing system responds in real time to meet demand fluctuations for personalized customization. Within the network-based manufacturing system (NBMS), mobile industrial robots (MiRs) are vital in increasing operational efficiency, adaptability, and productivity. However, with the advent of IoT-enabled manufacturing systems, security has become a serious challenge because of the communication of various devices acting as mobile nodes. This paper proposes the framework for a newly personalized customization factory, considering all the advanced technologies and tools used throughout the production process. To encounter the security concern, an IoT-enabled NBMS is selected as the system model to tackle a black hole attack (BHA) using the NTRUEncrypt cryptography and the ad hoc on-demand distance-vector (AODV) routing protocol. NTRUEncrypt performs encryption and decryption while sending and receiving messages. The proposed technique is simulated by network simulator NS-2.35, and its performance is evaluated for different network environments, such as a healthy network, a malicious network, and an NTRUEncrypt-secured network based on different evaluation metrics, including throughput, goodput, end-to-end delay, and packet delivery ratio. The results show that the proposed scheme performs safely in the presence of a malicious node. The implications of this study are beneficial for manufacturing industries looking to embrace IoT-enabled subtractive and additive manufacturing facilitated by mobile industrial robots. Implementation of the proposed scheme ensures operational efficiency, enables personalized customization, and protects confidential data and communication in the manufacturing ecosystem.
引用
收藏
页数:36
相关论文
共 58 条
[1]  
Alkenani J., 2022, IRAQI J ELECT ELECT, V18, P33, DOI [10.37917/ijeee.18.2.5, DOI 10.37917/IJEEE.18.2.5]
[2]   Enhancement of opacity for distributed state estimation in cyber-physical systems [J].
An, Liwei ;
Yang, Guang-Hong .
AUTOMATICA, 2022, 136
[3]   Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking [J].
Babaeer, Huda A. ;
Al-Ahmadi, Saad A. .
IEEE ACCESS, 2020, 8 :92098-92109
[4]   A genetic load balancing algorithm to improve the QoS metrics for software defined networking for multimedia applications [J].
Babbar, Himanshi ;
Parthiban, S. ;
Radhakrishnan, G. ;
Rani, Shalli .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (07) :9111-9129
[5]   A Review on Wireless Sensor Networks: Routing [J].
Basha, Adam Raja .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 125 (01) :897-937
[6]   Effective modelling of sinkhole detection algorithm for edge-based Internet of Things (IoT) sensing devices [J].
Bilal, Ahmad ;
Hasany, Syed Muhammad Noman ;
Pitafi, Abdul Hameed .
IET COMMUNICATIONS, 2022, 16 (08) :845-855
[7]   Towards industrial robots as a service (IRaaS): Flexibility, usability, safety and business models [J].
Buerkle, Achim ;
Eaton, William ;
Al-Yacoub, Ali ;
Zimmer, Melanie ;
Kinnell, Peter ;
Henshaw, Michael ;
Coombes, Matthew ;
Chen, Wen-Hua ;
Lohse, Niels .
ROBOTICS AND COMPUTER-INTEGRATED MANUFACTURING, 2023, 81
[8]   A conceptual framework for smart production planning and control in Industry 4.0 [J].
Canas, Hector ;
Mula, Josefa ;
Campuzano-Bolarin, Francisco ;
Poler, Raul .
COMPUTERS & INDUSTRIAL ENGINEERING, 2022, 173
[9]   Internet of Things: Development Intelligent Programmable IoT Controller for Emerging Industry Applications [J].
Chen, Ti-An ;
Chen, Shu-Chuan ;
Tang, William ;
Chen, Bo-Tsang .
SENSORS, 2022, 22 (14)
[10]  
Cordeiro Raphaella F., 2023, RAM, Rev. Adm. Mackenzie, V24, peRAMR230061, DOI 10.1590/1678-6971/eramr230061.en