Skip to main content

Addressing Industry 4.0 Security by Software-Defined Networking

  • Chapter
  • First Online:
Guide to Security in SDN and NFV

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Preceded by three industrial evolutions with the virtue of innovation in basic technologies such as mechanics (first evolution, beginning in the 1780s), electricity (second evolution, beginning from the 1870s), and electronics and computation (third evolution, starting from the 1970s), the vision for the fourth industrial evolution (in German called Industrie 4.0) has been started by the German government in 2011 [1]

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 69.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zukunftsprojekt Industrie 4.0. https://www.bmbf.de/de/zukunftsprojekt-industrie-4-0-848.html. Online; Accessed 18 Nov 2016

  2. Hermann M et al (2016) Design principles for industrie 4.0 scenarios. In: 2016 49th Hawaii international conference on system sciences, pp 3928–3937

    Google Scholar 

  3. Heilmann D et al (2016) Industrie 4.0 im Internationalen Vergleich. Eine Studie des Handelsblatt Research Institute, pp 1–144

    Google Scholar 

  4. Deutsche Bank Research, Taking point industry 4.0: huge potential for value creation waiting to be tapped. Created on 23 May 2014. http://www.dbresearch.com/servlet/reweb2.ReWEB?rwsite=DBR_INTERNET_EN-PROD&rwobj=ReDisplay.Start.class&document=PROD0000000000335628. Accessed 18 Nov 2016

    Google Scholar 

  5. IUNO, Nationales Referenzprojekt, IT-Sicherheit in Industrie 4.0. http://www.iuno-projekt.de/ (German national research project, available in German only). Online; Accessed 18 Nov 2016

  6. McKeown M, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow: enabling innovation in campus networks. SIGCOMM Comput Commun Rev 38(2):69–74

    Google Scholar 

  7. ONF (2014) SDN architecture. ONF Technical Report TR-502, Open Networking Foundation, June 2014

    Google Scholar 

  8. Khondoker R, Zaalouk A, Marx R, Bayarou K (2014) Feature-based comparison of software defined networking (SDN) controllers. In: ICCSA, pp 1–7

    Google Scholar 

  9. Zaalouk A, Khondoker R, Marx R, Bayarou K (2014) OrchSec: an orchestrator-based architecture for enhancing network-security using network monitoring and SDN control functions. In: NOMS, pp 1–9

    Google Scholar 

  10. Zaalouk A, Khondoker R, Marx R, Bayarou K (2014) OrchSec demo: demonstrating the capability of an orchestrator-based architecture for network security, academic demo. In: ONS, pp 1–2

    Google Scholar 

  11. Khondoker R, Larbig P, Senf D, Bayarou K, Gruschka N (2016) AutoSecSDNSemo: demonstration of automated end-to-end security in software-defined networks, IEEE NetSoft 2016. In: IEEE NetSoft, pp 1–2

    Google Scholar 

  12. Batke B, Wiberg J, Dube D (2015) CIP security phase 1, secure transport for EtherNet/IP. In: 2015 ODVA industry conference

    Google Scholar 

  13. Davis R, The myth of network address translation as security. White paper, F5. https://f5.com/Portals/1/Cache/Pdfs/2421/the-myth-of-network-address-translation-as-security.pdf. Online; Accessed 02 Dec 2016

  14. Higgins KJ (2014) Windows XP Alive & Well in ICS/SCADA networks. Information week darkReading, Oct 2014

    Google Scholar 

  15. Poimboeuf J, Jennings S (2014) Introducing kpatch: dynamic kernel patching. Technical report, Red Hat, Feb 2014

    Google Scholar 

  16. Pavlík V (2014) kGraft – live patching of the Linux kernel. Technical report, SUSE, Maxfeldstrasse 5 90409 Nuremberg Germany, Mar 2014

    Google Scholar 

  17. Sommer R, Vallentin M, De Carli L, Paxson V (2014) HILTI: an abstract execution environment for deep, stateful network traffic analysis. In: Proceedings of the 2014 conference on internet measurement conference. ACM, pp 461–474

    Google Scholar 

  18. Sommer R, Amann J, Hall S, Spicy: a unified deep packet inspection framework dissecting all your data. Technical Report TR-15-004, International Computer Science Institute Berkeley, 1947 Center Street, Suite 600, Berkeley, California, 94704, Nov 2015

    Google Scholar 

  19. Bosshart P, Daly D, Gibb G, Izzard M, McKeown N, Rexford J, Schlesinger C, Talayco D, Vahdat A, Varghese G et al (2014) P4: programming protocol-independent packet processors. ACM SIGCOMM Comput Commun Rev 44(3):87–95

    Google Scholar 

  20. Udd R, Asplund M, Nadjm-Tehrani S, Kazemtabrizi M, Ekstedt M (2016) Exploiting bro for intrusion detection in a SCADA system. In: Proceedings of the 2nd ACM international workshop on cyber-physical system security. ACM, pp 44–51

    Google Scholar 

  21. PROFIBUS User Organization, Haid-und-Neu-Str. 7 76131 Karlsruhe Germany. PROFINET design guideline, version 1.04 edition, Nov 2010

    Google Scholar 

  22. Debar H, Curry D, Feinstein B (2007) The intrusion detection message exchange format (IDMEF). RFC 4765 (Experimental), Mar 2007

    Google Scholar 

  23. Danyliw R, Meijer J, Demchenko Y (2007) The incident object description exchange format. RFC 5070 (Proposed Standard), Dec 2007. Updated by RFC 6685

    Google Scholar 

  24. GT/Coursera SDN Course Travelogue – Week 5, https://www.sdnskills.com/learn/gtcoursera-sdn-course-travelogue-week-5/. Online; Accessed 04 Apr 2017

  25. Thompson HA (2004) Wireless and internet communications technologies for monitoring and control. Control Eng Pract 12:781–791

    Google Scholar 

  26. Distributed Aircraft Maintenance Environment from 2002, http://www.cs.york.ac.uk/dame. Online; Accessed 03 Mar 2016

  27. SCADA.web, https://www.scada-web.net/default.aspx. Online; Accessed 03 Mar 2016

  28. Wohlwend H, e-Diagnostics guidebook: revision 2.1. http://www.sematech.org/docubase/document/4153deng.pdf. Online; Accessed 03 Mar 2016

  29. Richardson T, Levine JR (2011) The remote framebuffer protocol. RFC 6143, Mar 2011. https://rfc-editor.org/rfc/rfc6143.txt

  30. Comparison of remote desktop software, https://en.wikipedia.org/wiki/Comparison_of_remote_desktop_software. Online; Accessed 03 Mar 2016

  31. Teradici PCoIP (PC over IP) solution, http://www.teradici.com/products-and-solutions/pcoip-products/remote-workstation-card. Online; Accessed 03 Mar 2016

  32. Netbiter remote management, http://www.netbiter.com/. Online; Accessed 03 Mar 2016

  33. Genua genubox, https://www.genua.de/loesungen/fernwartungs-appliance-genubox.html. Online; Accessed 03 Mar 2016

  34. Remote Services Security / Secure Remote Maintenance, http://www.phoenixcontact-cybersecurity.com/en/solutions/remote-services-security. Online; Accessed 03 Mar 2016

  35. Siemens Industrial Network Security, http://www.industry.siemens.com/topics/global/en/industrial-security/network-security/Pages/Default.aspx. Online; Accessed 03 Mar 2016

  36. Recommendation: IT in the Company. BSI publications on cyber security. Basic rules for protecting remote maintenance accesses. BSI Recommendation, June 2013. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_054E.pdf?__blob=publicationFile&v=4

  37. Recommendation: IT in Production. Industrial Control System Security. Inside threat. BSI Recommendation, May 2013. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_061E.pdf?__blob=publicationFile&v=2. Online; Accessed 04 June 2016

  38. BSI Empfehlung: in der Produktion, Fernwartung im industriellen Umfeld. BSI Recommendation, Jan 2015. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_108.pdf?__blob=publicationFile&v=3 [available in German only]. Online; Accessed 04 June 2016

  39. BSI recommendation: IT in production, industrial control system security, top 10 threats and countermeasures 2014. BSI recommendation, May 2016. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_005E.pdf?__blob=publicationFile&v=2. Online; Accessed 04 June 2016

  40. BSI Empfehlung: IT in der Produktion, Fallbeispiel Schwimmbad. BSI Recommendation, Feb 2014. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_095a.pdf?__blob=publicationFile&v=3 (available in German only). Online; Accessed 04 June 2016

  41. BSI Empfehlung: IT in der Produktion, Fallbeispiel Servicetechniker. BSI Recommendation, Mar 2014. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_095c.pdf?__blob=publicationFile&v=2 (available in German only). Online; Accessed 04 June 2016

  42. Bruner J (2013) Industrial internet the machines are talking, 1st edn. O’Reilly Media, Sebastopol

    Google Scholar 

  43. Marx R, Kuntze N, Rudolph C, Bente I, Vieweg J (2012) Trusted service access with dynamic security infrastructure configuration. In: 18th Asia-Pacific conference on communications (APCC). IEEE, 2012

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rahamatullah Khondoker .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Khondoker, R., Larbig, P., Scheuermann, D., Weber, F., Bayarou, K. (2017). Addressing Industry 4.0 Security by Software-Defined Networking. In: Zhu, S., Scott-Hayward, S., Jacquin, L., Hill, R. (eds) Guide to Security in SDN and NFV. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-64653-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64653-4_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64652-7

  • Online ISBN: 978-3-319-64653-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics