2021
DOI: 10.1155/2021/6670625
|View full text |Cite
|
Sign up to set email alerts
|

Cyber‐Security Assessment of Industry 4.0 Enabled Mechatronic System

Abstract: This paper reports on development of a laboratory set-up, for testing the concept and the components of Industry 4.0 enabled mechatronic system. A simple mock manufacturing lane is connected to a collaborating robot. There are three different programmable logic controllers (PLC) and various other elements which need to talk to each other using a variety of communication protocols. The controllers, and consequently the schedule of operations, can be programmed remotely. Moreover, the information is exchanged th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…This study employed a multifaceted methodology to explicate the proposed architectures of Converged Manufacturing, Extreme Manufacturing Framework, and Cybersecurity Infrastructure [3,5,12,14].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This study employed a multifaceted methodology to explicate the proposed architectures of Converged Manufacturing, Extreme Manufacturing Framework, and Cybersecurity Infrastructure [3,5,12,14].…”
Section: Methodsmentioning
confidence: 99%
“…The robust Cybersecurity Infrastructure safeguards the digital environment, employing secure communication protocols and a responsive Intrusion Detection System (IDS) that swiftly addresses potential threats [8][9][10]. A central hub for data analytics contributes to continuous improvement by analyzing substantial volumes of 3D printing data daily, generating actionable insights that refine designs and optimize production workflows [11][12][13]. The framework is designed with a user-centric approach, ensuring accessibility and empowerment through intuitive interfaces and responsive help desks [14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…Following this, the key issues currently addressed in the literature include: Cyber risk analysis and assessment (cyber risk evaluation) (e.g., [ 314 , 315 , 316 , 317 ]); Cyber vulnerability assessment (e.g., [ 318 , 319 , 320 , 321 ]); Resilience to cyber-attacks (e.g., [ 322 ]); Safety aspects of digitalized CPS (e.g., [ 323 , 324 , 325 ]). …”
Section: Systematic Literature Review Of the Selected Papers Within T...mentioning
confidence: 99%
“…The authors focus on the main security vulnerabilities, threats, risks with their impacts, and the main security attacks within the robotics domain. The robotic/mechatronic systems cybersecurity is also reviewed in work [ 322 ]. The authors focus on the problem regarding the possibility of cyber-attack detection.…”
Section: Systematic Literature Review Of the Selected Papers Within T...mentioning
confidence: 99%
“…The usage of service robots involves the use of numerous sensors to collect a lot of data, some of which could be sensitive. Through the cloud service, the data is sent to a communication protocol [47]. In order to lower the danger of cyberattacks, data transfer encryption must be robust.…”
Section: ) Authenticationmentioning
confidence: 99%