Abstract

With the advent of the fourth industrial revolution manufacturing systems are transformed into digital ecosystems via internet communication technologies to form the smart factories of the future. Industry 4.0 is characterized by increased amount, variety and complexity of the exchanged data. Industries utilize a plethora of machines, robots, computers and servers, all connected to each other through different networks. Between those machines, a massive exchange of data and sensitive information is taking place. Whenever there is a new interface between networks and devices, it poses a weak link and is marked as potential attack point. As more devices enter the realm of Internet of Things, attacks aimed at the variety of Internet-endpoints will grow. However, existing internet technologies are plagued by data privacy issues and malicious breaches that will act as a setback for adopters of Industry 4.0 technologies. Thus, the need for identifying the required cybersecurity protocols, at specific endpoints where data leaks may occur, has been vastly increased to tackle malicious behaviors. The true potential of Industry 4.0 cannot be achieved, if those challenges are not addressed properly. This work aims to identify and map the potential vulnerable endpoints in a common industrial paradigm, where data will cross during aggregation and propose a robust way of securing a wireless sensor network (WSN) by ensuring the integrity and authenticity of the parcels and the identity of the users comprising the WSN. The vulnerabilities of a data acquisition system applied in the laser machine industry are mapped and presented.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.