INFORMATION SECURITY FOR RECONFIGURABLE MANUFACTURING SYSTEMS USING NETWORKED EMBEDDED CONTROLLERS

Abstract Networked embedded controllers are gaining ground in industry as a technology facilitator for rapidly reconfigurable manufacturing systems. These information-intensive manufacturing systems are adopting open standards in order to foster interoperability and facilitate integration of complex, multi-vendor systems. However, the dependence of the system on data exchange and the openness of interfaces raise information security concerns. This paper analyses security vulnerabilities and threats in distributed control systems, and proposes security protocols to mitigate the threats. The feasibility of employing the proposed protocols was validated through experimental implementations and measurements, showing that the overhead introduced by cryptographic algorithms is comparable to other typical functions of embedded controllers.

[1]  Yoram Koren,et al.  Reconfigurable Manufacturing Systems , 2003 .

[2]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[3]  Dieter Gollmann,et al.  Evidence and non-repudiation , 1997 .

[4]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[5]  François Jammes,et al.  Service-oriented paradigms in industrial automation , 2005, IEEE Transactions on Industrial Informatics.

[6]  Robert W. Brennan,et al.  Creation of a Knowledge Economy for Intelligent Industrial Automation: OOONEIDA Community in IMS , 2004 .

[7]  Reijo Tuokko,et al.  Challenges and Potential Solutions for Communications in the Electronics Production Industry , 2004 .

[8]  William M. Daley,et al.  Digital Signature Standard (DSS) , 2000 .

[9]  T. Nguyen,et al.  The National Electronics Manufacturing Initiative (NEMI) plug and play factory project , 2000, Int. J. Comput. Integr. Manuf..

[10]  Eric Rescorla,et al.  Diffie-Hellman Key Agreement Method , 1999, RFC.

[11]  Satoshi Hada,et al.  Towards the integration of Web services security on enterprise environments , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT) Workshops.

[12]  Vincent Rijmen,et al.  The Block Cipher Rijndael , 1998, CARDIS.

[13]  Valeriy Vyatkin,et al.  OOONEIDA: an open, object-oriented knowledge economy for intelligent industrial automation , 2005, IEEE Transactions on Industrial Informatics.

[14]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[15]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[16]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.