Abstract
The paper discusses the main classes of shop floor devices relative to distributed intelligence for product-driven automation in heterarchical control. The intelligent product (IP) concept is enhanced with two additional require-ments: standard alignment and SOA capability. The paper classifies IPs from SOA integration point of view and introduces a formalized data structure in the form of a XSD schema for XML representation. We propose a security solution for service oriented manufacturing architectures (SOMA) that uses a public-key infrastructure to generate certificates and propagate trust at runtime (during product execution) for embedded devices that establish IPs on board pallets and communicate with shop floor resources. Experimental results are provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wong, C. Y., McFarlane, D., Zaharudin, A., Agarwal, V.: The intelligent product driven supply chain. In: IEEE International Conference on IEEE Systems, Man and Cybernetics, vols. 4, 6 (2002)
McFarlane, D., Sarma, S., Chirn, J.L., Ashton, K.: The intelligent product in manufacturing control and management. In: 15th Triennial World Congress, Barcelona (2002
Morariu, C., Borangiu, T.: Manufacturing integration framework: a SOA perspective on manufacturing. In: Proceeding of Information Control Problems in Manufacturing (INCOM’12), IFAC Papers OnLine, vol. 14, no. 1, 31–38, (2012) (Elsevier)
Främling, K., Harrison, M., Brusey, J., Petrow, J.: Requirements on unique identifiers for managing product lifecycle information: comparison of alternative approaches. Int. J. Comput. Integr. Manuf. 20(7), 715–726 (2007)
Zhang, L.-J., Nianjun, Z., Chee, Y.-M., Jalaldeen, A., Ponnalagu, K., Arsanjani, A., Bernardini, F.: SOMA-ME: a platform for the model-driven design of SOA solutions. IBM Syst. J 47(3), 397–413 (2008)
Meyer, G.G., Främling, K., Holmström, J.: Intelligent products: a survey. Comput. Ind. 60(3), 137–148 (2009). Elsevier
Kiritsis, D., Bufardi, A., Xirouchakis, P.: Research issues on product lifecycle management and information tracking using smart embedded systems. Adv. Eng. Inform. 17(3), 189–202 (2003)
Jun, H.-B., Shin, J.-H., Kim, Y.-S., Kiritsis, D., Xirouchakis, P.: A framework for RFID applications in product lifecycle management. Int. J. Comput. Integr. Manuf. 22(7), 595–615 (2009)
Leitão, P.: Agent-based distributed manufacturing control: a state-of-the-art survey. Eng. Appl. Artif. Intell. 22(7), 979–991 (2009)
Ventä, O.: Intelligent products and systems: Technology theme-final report. VTT Technical Research Centre of Finland (2007)
Potter, B.: Wireless hotspots: Petri dish of wireless security. Commun. ACM 49(6), 50–56 (2006)
Berghel, H., Uecker, J.: Wireless infidelity II: air jacking. Commun. ACM 47(12), 15–20 (2004)
Boncella, R.J.: Wireless security: an overview. Commun. Assoc. Info. Syst. 9(15), 269–282 (2002)
Von Solms, B., Marais, E.: From secure wired networks to secure wireless networks–what are the extra risks? Computers and Security 23(8), 633–637 (2004)
Kankanhalli, A., Teo, H.-H., Tan, B., Wei, K.-K.: An integrative study of in-formation systems security effectiveness. Int. J. Info. Manage. 23(2), 139–154 (2003)
Whitman, M.E.: Enemy at the gate: threats to information security. Commun. ACM 46(8), 91–95 (2003)
Mercuri, R.: Analyzing security costs. Commun. ACM 46(6), 15–18 (2003)
Wang, Y., Chuang, L., Quan-Lin, L., Fang, Y.: A queuing analysis for the denial of service (DoS) attacks in computer networks. Comput. Netw. 51(12), 3564–3573 (2007)
Warren, M., Hutchinson, W.: Cyber-attacks against supply chain management systems. Int. J. Phys. Distrib. Logistics Manage. 30(7/8), 710–716 (2000)
Reaves, B. Morris, T.: Discovery, infiltration, and denial of service in a process control system wireless network. In: eCrime Res. Summit, IEEE 1–9 (2009)
Peine, H.: Security concepts and implementation in the Ara mobile agent system. In: 7th IEEE International Workshops on IEEE Enabling technologies: infrastructure for collaborative enterprises (WET ICE’98 Proceedings), pp. 236–242 (1998)
Nilsson, D., Larson, U., Jonsson, E.: Creating a secure infrastructure for wireless diagnostics and software updates in vehicles. In: Computer Safety, Reliability, and Security, pp. 207–220. Springer (2008)
Boland, H., Mousavi, H.: Security issues of the IEEE 802.11 b wireless LAN. In: Canadian Conference on IEEE, El. and Computer Engineering, 1, 333–336 (2004)
Reddy, S., Vinjosh, K., Sai R., Rijutha, K., Ali, S.M., Reddy, C.P.: Wireless hacking-a WiFi hack by cracking WEP. In: 2nd International Conference on IEEE, Education Technology and Computer (ICETC), 1, V1–189 (2010)
Berghel, H., Uecker, J.: WiFi attack vectors. Comm. ACM 48(8), 21–28 (2005)
Aime, M.D., Calandriello, G., Lioy, A.: Dependability in wireless networks: can we rely on WiFi?, Security & Privacy, IEEE 5(1), 23–29 (2007)
Wang, L., Orban, P., Cunningham, A., Lang, S.: Remote real-time CNC machining for web-based manufacturing. Robot. CIM 20(6), 563–571 (2004)
Wang, L., Shen, W.,Lang, S.: Wise-ShopFloor: a web-based and sensor-driven shop floor environment. In: The 7th International Conference on IEEE Computer Supported Cooperative Work in Design, pp. 413–418 (2002)
Sauter, T.: The continuing evolution of integration in manufacturing automation, Ind. Electron. Mag. IEEE 1(1), 10–19 (2007)
De Souza, L. et al.: Socrades: A web service based shop floor integration infrastructure. The Internet of Things, pp. 50–67 (2008)
Shen, W., Lang, S.Y.T., Wang, L.: iShopFloor: an Internet-enabled agent-based intelligent shop floor. Syst. Man Cybern. Part C: Appl. Rev. IEEE Trans. on 35(3), 371–381 (2005)
Shin, J., et al.: CORBA-based integration framework for distributed shop floor control. Comput. Ind. Eng. 45(3), 457–474 (2003)
OpenSSL.: http://openssl.org/. Accessed June 2015-04-23
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Morariu, C., Morariu, O., Borangiu, T. (2016). Security Issues in Service Oriented Manufacturing Architectures with Distributed Intelligence. In: Borangiu, T., Trentesaux, D., Thomas, A., McFarlane, D. (eds) Service Orientation in Holonic and Multi-Agent Manufacturing. Studies in Computational Intelligence, vol 640. Springer, Cham. https://doi.org/10.1007/978-3-319-30337-6_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-30337-6_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30335-2
Online ISBN: 978-3-319-30337-6
eBook Packages: EngineeringEngineering (R0)