2017 IEEE 15th International Conference on Industrial Informatics (INDIN) 2017
DOI: 10.1109/indin.2017.8104888
|View full text |Cite
|
Sign up to set email alerts
|

Towards flexible and secure end-to-end communication in industry 4.0

Abstract: The digital transformation of industrial production is driven by the advance of Cyber-Physical Production Systems (CPPS) within which raw materials, machines and operations are interconnected to form a sophisticated network. Making such systems self-adaptable is a priority concern for the future implementation of Industry 4.0 application scenarios. In this position paper, we design a meta-model and use it as a tool to describe an end-to-end communication use case from an ongoing research project. Based on this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…It is thus clear that security should be considered at every step of the development lifecycle of a system, and in [234], Eckhart et al propose 14 security activities spread across multiple phases in the development process that have shown to be effective for cyber-physical systems. Maksuti et al [42] take a more flexible stance than Shaabany, observing that security and business process performance will always come at the cost of each other. They state that one possible solution is to create a self-adapting system that can flexibly provide end-to-end security.…”
Section: Models and Methodologiesmentioning
confidence: 99%
“…It is thus clear that security should be considered at every step of the development lifecycle of a system, and in [234], Eckhart et al propose 14 security activities spread across multiple phases in the development process that have shown to be effective for cyber-physical systems. Maksuti et al [42] take a more flexible stance than Shaabany, observing that security and business process performance will always come at the cost of each other. They state that one possible solution is to create a self-adapting system that can flexibly provide end-to-end security.…”
Section: Models and Methodologiesmentioning
confidence: 99%
“…Meta-models were developed as Eclipse plugins. A metamodel for a systematic analysis of CPS threat modeling was developed in [91] using MetaGME, while [89] developed a metamodel using ADOxx and UML and they used it for the description of an end-to-end communication use case. A meta-model for the development of a smart cyber-physical environment was presented in [37].…”
Section: System Designmentioning
confidence: 99%
“…To show the functionality of the MSCV framework, we consider an IIoT use case, shown in Figure 7. 50 The MSCV framework will be used to (i) check the compliance of each component based on the use case requirements and a set of metrics extracted from international standards and (ii) to provide the overall compliance of the system based on equation (2).…”
Section: Iiot Use Casementioning
confidence: 99%