IoT Security Hardware Framework for Remote Maintenance of Legacy Machine Tools

被引:0
作者
Tedeschi, Stefano [1 ]
Mehnen, Jorn [1 ]
Roy, Rajkumar [1 ]
机构
[1] Cranfield Univ, Through Life Engn Serv Ctr, Cranfield, Beds, England
来源
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017) | 2017年
基金
英国工程与自然科学研究理事会;
关键词
Remote maintenance; IoT; M2M; Tamper resistant design; Cyber-Secure Manufacturing; Machine Tools;
D O I
10.1145/3018896.3018938
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is continuously growing and is now reaching into the industrial environment through new services such as remote maintenance for machine tools. Industrial applications of IoT require an increased awareness of security at all times. It is not only necessary that the data is exchanged securely; also the design of the hardware of the devices themselves needs to be considered. Security has to be designed right from the start into the IoT devices rather than added on later. This paper lays the foundation for the creation of a modular safe remote monitoring and maintenance system for machine tools through IoT devices at the hardware level. This article introduces a fully modular secure data acquisition system design approach with greater versatility, ready to be used in modern IoT manufacturing environments or for safe upgrading of existing legacy machinery.
引用
收藏
页数:4
相关论文
共 9 条
  • [1] Albrecht K, 2013, IEEE TECHNOL SOC MAG, V32, P31, DOI 10.1109/MTS.2013.2291170
  • [2] Cheema R., 2012, INT J COMPUTER SCI E, V2, P79
  • [3] Del Giudice M, 2016, BUS PROCESS MANAG J, V22
  • [4] HyunHo Kim, 2015, Information Science and Applications, P509, DOI 10.1007/978-3-662-46578-3_60
  • [5] Iung B, 2006, ANN CIRP, V54, P5, DOI [10.1016/S0007-8506(07)60037-7, DOI 10.1016/S0007-8506(07)60037-7]
  • [6] Wireless sensor networks as part of a web-based building environmental monitoring system
    Jang, Won-Suk
    Healy, William M.
    Skibniewski, Miroslaw J.
    [J]. AUTOMATION IN CONSTRUCTION, 2008, 17 (06) : 729 - 736
  • [7] Security Threats to the Platform Identification
    Lee, Kyungroul
    Yeuk, Hyeungjun
    Lim, Habin
    Yim, Kangbin
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 547 - 550
  • [8] Li W, 2013, SPRINGER SERIES ADV, DOI [10.1007/978-1-4471-4935-4, DOI 10.1007/978-1-4471-4935-4]
  • [9] Security aspects in Cloud based condition monitoring of machine tools
    Tedeschi, Stefano
    Mehnen, Jorn
    Tapoglou, Nikolaos
    Rajkumar, Roy
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON THROUGH-LIFE ENGINEERING SERVICES, 2015, 38 : 47 - 52