Hostname: page-component-cd9895bd7-p9bg8 Total loading time: 0 Render date: 2024-12-26T20:56:36.839Z Has data issue: false hasContentIssue false

Cyber-Security Aware Design of Automated Systems

Published online by Cambridge University Press:  26 May 2022

R. Stetter*
Affiliation:
University of Applied Sciences Ravensburg-Weingarten, Germany
M. Witczak
Affiliation:
University of Zielona Góra, Poland
M. Till
Affiliation:
University of Applied Sciences Ravensburg-Weingarten, Germany

Abstract

Core share and HTML view are not available for this content. However, as you have access to this content, a full PDF is available via the ‘Save PDF’ action button.

One of the main current threats for producing companies is the possibility of cyber-space attacks. Due to several reasons, industrial companies need to connect their plants over some kind of networks. Obviously, today many approaches from information technology (IT) exist which will greatly reduce the danger of attacks. Still, no producing company can completely rely on these IT solutions. This paper proposes a systemic approach to design processes and products for increased cyber security. This approach is based on an attack model and is explained based on an automated storage system.

Type
Article
Creative Commons
Creative Common License - CCCreative Common License - BYCreative Common License - NCCreative Common License - ND
This is an Open Access article, distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives licence (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is unaltered and is properly cited. The written permission of Cambridge University Press must be obtained for commercial re-use or in order to create a derivative work.
Copyright
The Author(s), 2022.

References

Bayuk, J.L.; Horowitz, B.N.: An Architectural Systems Engineering Methodology for Addressing Cyber Security. Systems Engineering Vol 14, No. 3, 2011, pp. 294 - 304, 10.1002/sys.20182.CrossRefGoogle Scholar
Gero, J.; Kannengiesser, U.: The Function-Behaviour-Structure Ontology of Design. In An Anthology of Theories and Models of Design; Chakrabarti, A., Blessing, L.T.M., Eds.; Springer: Berlin, Germany, 2014.Google Scholar
Gillijns, S.: De Moor, B.: Unbiased minimum-variance input and state estimation for linear discrete-time systems. Automatica. 43 (2007), pp. 111116, 10.1016/j.automatica.2006.08.002.CrossRefGoogle Scholar
Goorden, M.; van den Mortel-Fronczak, J.; Etman, P.; Rooda, J.: DSM-based Analysis for the Recognition of Modeling Errors in Supervisory Controller Design. In: 21st International Dependency and Structure Modeling Conference, 2019, pp. 121 - 129, 10.35199/dsm2019.7.Google Scholar
Holder, K.; Zech, A.; Ramsaier, M.; Stetter, R.; Niedermeier, H.-P.; Rudolph, S.; and Till, M. (2017) “Model-Based Requirements Management in Gear Systems Design based on Graph-Based Design Languages”. Appl. Sci. 2017, 7, 1112, 10.3390/app7111112.Google Scholar
Johansson, K.H.: Cyber Security and Privacy in Networked Control Systems. Keynote at the IEEE International Conference on Control and Fault-Tolerant Systems, Systol, 2021.Google Scholar
Kadir, B. A.; Broberg, O.; Souza da Conceição, C.; Jensen, N. G.: A Framework for Designing Work Systems in Industry 4.0. In: Proceedings of the Design Society; Cambridge, Part 1, pp. 2031-2040. Cambridge: Cambridge University Press. (2019) https://dx.doi.org/10.1017/dsi.2019.209.Google Scholar
Kushner, D.: The Real Story of Stuxnet. IEEE Spectrum. Accessed 12 October 2021.Google Scholar
Martin, H.: Transport- und Lagerlogistik. Systematik, Planung, Einsatz und Wirtschaftlichkeit. 10th Edition. Springer Vieweg 2016.Google Scholar
Stetter, R.: Fault-Tolerant Design and Control of Automated Vehicles and Processes. Insights for the Synthesis of Intelligent Systems. Springer: (2020a), ISBN 978-3-030-12845-6.Google Scholar
Stetter, R.: A Fuzzy Virtual Actuator for Automated Guided Vehicles. Sensors (2020b), Vol. 20, No. 15, 4154, 10.3390/s20154154.CrossRefGoogle Scholar
Teixeira, A.; Shames, I.; Sandberg, H.; Johansson, K. H.: A secure control framework for resource-limited adversaries, Automatica, Volume 51, 2015, pp. 135148, 10.1016/j.automatica.2014.10.067.Google Scholar
Ustundag, A. and Cevikcan, E.: Industry 4.0: Managing the digital transformation. Springer, 2019.Google Scholar
Vogel, S.; Martin, G.; Schirra, T. and Kirchner, E.: Robust Design for Mechatronic Machine Elements - how Robust Design Enables the Application of Mechatronic Shaft-hub Connection. In: Proceedings of the international design conference Design 2018, pp. 3033 - 3040, 10.21278/idc.2018.0203.Google Scholar
Whitman, M. E.; Mattord, H. J.: Principles of Information Security, 7th Edition. Cengage Learning, 2022.Google Scholar
Wichmann, R. L.; Eisenbart, B. and Gericke, K.: The direction of industry: a literature review on industry 4.0. In: Proceedings of the Design Society; Cambridge, Part 1, pp. 2129-2138. Cambridge: Cambridge University Press. (2019) https://dx.doi.org/10.1017/dsi.2019.219.Google Scholar
Witczak, M.; Majdzik, P.; Stetter, R. and Lipiec, B.: A fault-tolerant control strategy for multiple automated guided vehicles. Journal of Manufacturing Systems (2020), Vol. 55, pp. 5668, 10.1016/j.jmsy.2020.02.009.Google Scholar
ZVEI: German Electrical and Electronic Manufacturers’ Association. Industrie 4.0: The reference architectural model Industrie 4.0 (RAMI 4.0). 1, 2015.Google Scholar