Abstract

The concept of the fourth industrial revolution assumes the integration of people and digitally controlled machines with the Internet and information technologies. At the end of 2015, more than 20 billion machines and devices were connected to the Internet, with an expected growth to half a trillion by 2030. The most important raw material for this digital revolution is data, which when properly stored, analyzed and secured, constitute the basis for the development of any business. In times of rapid industrial development, automation of production processes and systems integration via networks, the effective protection of the cyber-physical systems of a plant is particularly important. To minimize the risks associated with Internet access, one must define all the possible threats and determine their sources in the plant and block or minimize the possibility of sabotage or data loss. This article analyzes the security measures used in industrial systems. In particular, risk management and the study of the risk sources in terms of human, hardware and software aspects in networked PLC and SCADA systems are discussed. Methods of improving the architecture of industrial networks and their management are proposed in order to increase the level of security. Additionally, the safety of the communication protocols with PLCs in industrial control systems is discussed.

Highlights

  • IntroductionPublisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations

  • Reliability and robustness issues of such technologies are reaching industry standards, the cybersecurity of the new solutions poses the greatest challenge of all. It may be the main obstacle in the transition to Industry 4.0 and usage of all its benefits

  • As described in this article, the key issue is the proper analysis of the system vulnerabilities, knowledge about the external and internal threats, responsible design of the system architecture and a dedicated risk management plan

Read more

Summary

Introduction

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. The road to reach such goal is, very difficult, following from the nature of the Industry 4.0 concept Such transformation imposes technological challenges and organizational [10,11]. CPS is defined settransformative of transformative technologies managing interconnected systems between its physical assets and computational capabilfor managing interconnected systems between its physical assets and computational capaities [18].[18] It creates an interoperable, optimized adaptive and scalable manufacturing probilities optimized adaptive and scalable manufacturing cess thatthat is usually service-oriented [19].

Risk Management
Key Assets and Services
Identification of Threats and Vulnerabilities
Assessment of Existing Security
Risk Analysis
Risk Minimization
Risk Monitoring and Reporting
Risk Sources in OT Systems
Human Component
PLC Controllers
Software in Network Systems
SCADA Systems
Cloud SCADA Systems
Other Software in Computers and Servers
Higher Security Standards in Communication Protocols
Improvements in the Industrial Network Architecture
Division of the Industrial Network into Subnetworks
Integrity
Monitoring of the Data Transmission Authorization
Control and Updating of the Software
Reduction of the Human Component
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.