Abstract
Preceded by three industrial evolutions with the virtue of innovation in basic technologies such as mechanics (first evolution, beginning in the 1780s), electricity (second evolution, beginning from the 1870s), and electronics and computation (third evolution, starting from the 1970s), the vision for the fourth industrial evolution (in German called Industrie 4.0) has been started by the German government in 2011 [1]
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zukunftsprojekt Industrie 4.0. https://www.bmbf.de/de/zukunftsprojekt-industrie-4-0-848.html. Online; Accessed 18 Nov 2016
Hermann M et al (2016) Design principles for industrie 4.0 scenarios. In: 2016 49th Hawaii international conference on system sciences, pp 3928–3937
Heilmann D et al (2016) Industrie 4.0 im Internationalen Vergleich. Eine Studie des Handelsblatt Research Institute, pp 1–144
Deutsche Bank Research, Taking point industry 4.0: huge potential for value creation waiting to be tapped. Created on 23 May 2014. http://www.dbresearch.com/servlet/reweb2.ReWEB?rwsite=DBR_INTERNET_EN-PROD&rwobj=ReDisplay.Start.class&document=PROD0000000000335628. Accessed 18 Nov 2016
IUNO, Nationales Referenzprojekt, IT-Sicherheit in Industrie 4.0. http://www.iuno-projekt.de/ (German national research project, available in German only). Online; Accessed 18 Nov 2016
McKeown M, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow: enabling innovation in campus networks. SIGCOMM Comput Commun Rev 38(2):69–74
ONF (2014) SDN architecture. ONF Technical Report TR-502, Open Networking Foundation, June 2014
Khondoker R, Zaalouk A, Marx R, Bayarou K (2014) Feature-based comparison of software defined networking (SDN) controllers. In: ICCSA, pp 1–7
Zaalouk A, Khondoker R, Marx R, Bayarou K (2014) OrchSec: an orchestrator-based architecture for enhancing network-security using network monitoring and SDN control functions. In: NOMS, pp 1–9
Zaalouk A, Khondoker R, Marx R, Bayarou K (2014) OrchSec demo: demonstrating the capability of an orchestrator-based architecture for network security, academic demo. In: ONS, pp 1–2
Khondoker R, Larbig P, Senf D, Bayarou K, Gruschka N (2016) AutoSecSDNSemo: demonstration of automated end-to-end security in software-defined networks, IEEE NetSoft 2016. In: IEEE NetSoft, pp 1–2
Batke B, Wiberg J, Dube D (2015) CIP security phase 1, secure transport for EtherNet/IP. In: 2015 ODVA industry conference
Davis R, The myth of network address translation as security. White paper, F5. https://f5.com/Portals/1/Cache/Pdfs/2421/the-myth-of-network-address-translation-as-security.pdf. Online; Accessed 02 Dec 2016
Higgins KJ (2014) Windows XP Alive & Well in ICS/SCADA networks. Information week darkReading, Oct 2014
Poimboeuf J, Jennings S (2014) Introducing kpatch: dynamic kernel patching. Technical report, Red Hat, Feb 2014
Pavlík V (2014) kGraft – live patching of the Linux kernel. Technical report, SUSE, Maxfeldstrasse 5 90409 Nuremberg Germany, Mar 2014
Sommer R, Vallentin M, De Carli L, Paxson V (2014) HILTI: an abstract execution environment for deep, stateful network traffic analysis. In: Proceedings of the 2014 conference on internet measurement conference. ACM, pp 461–474
Sommer R, Amann J, Hall S, Spicy: a unified deep packet inspection framework dissecting all your data. Technical Report TR-15-004, International Computer Science Institute Berkeley, 1947 Center Street, Suite 600, Berkeley, California, 94704, Nov 2015
Bosshart P, Daly D, Gibb G, Izzard M, McKeown N, Rexford J, Schlesinger C, Talayco D, Vahdat A, Varghese G et al (2014) P4: programming protocol-independent packet processors. ACM SIGCOMM Comput Commun Rev 44(3):87–95
Udd R, Asplund M, Nadjm-Tehrani S, Kazemtabrizi M, Ekstedt M (2016) Exploiting bro for intrusion detection in a SCADA system. In: Proceedings of the 2nd ACM international workshop on cyber-physical system security. ACM, pp 44–51
PROFIBUS User Organization, Haid-und-Neu-Str. 7 76131 Karlsruhe Germany. PROFINET design guideline, version 1.04 edition, Nov 2010
Debar H, Curry D, Feinstein B (2007) The intrusion detection message exchange format (IDMEF). RFC 4765 (Experimental), Mar 2007
Danyliw R, Meijer J, Demchenko Y (2007) The incident object description exchange format. RFC 5070 (Proposed Standard), Dec 2007. Updated by RFC 6685
GT/Coursera SDN Course Travelogue – Week 5, https://www.sdnskills.com/learn/gtcoursera-sdn-course-travelogue-week-5/. Online; Accessed 04 Apr 2017
Thompson HA (2004) Wireless and internet communications technologies for monitoring and control. Control Eng Pract 12:781–791
Distributed Aircraft Maintenance Environment from 2002, http://www.cs.york.ac.uk/dame. Online; Accessed 03 Mar 2016
SCADA.web, https://www.scada-web.net/default.aspx. Online; Accessed 03 Mar 2016
Wohlwend H, e-Diagnostics guidebook: revision 2.1. http://www.sematech.org/docubase/document/4153deng.pdf. Online; Accessed 03 Mar 2016
Richardson T, Levine JR (2011) The remote framebuffer protocol. RFC 6143, Mar 2011. https://rfc-editor.org/rfc/rfc6143.txt
Comparison of remote desktop software, https://en.wikipedia.org/wiki/Comparison_of_remote_desktop_software. Online; Accessed 03 Mar 2016
Teradici PCoIP (PC over IP) solution, http://www.teradici.com/products-and-solutions/pcoip-products/remote-workstation-card. Online; Accessed 03 Mar 2016
Netbiter remote management, http://www.netbiter.com/. Online; Accessed 03 Mar 2016
Genua genubox, https://www.genua.de/loesungen/fernwartungs-appliance-genubox.html. Online; Accessed 03 Mar 2016
Remote Services Security / Secure Remote Maintenance, http://www.phoenixcontact-cybersecurity.com/en/solutions/remote-services-security. Online; Accessed 03 Mar 2016
Siemens Industrial Network Security, http://www.industry.siemens.com/topics/global/en/industrial-security/network-security/Pages/Default.aspx. Online; Accessed 03 Mar 2016
Recommendation: IT in the Company. BSI publications on cyber security. Basic rules for protecting remote maintenance accesses. BSI Recommendation, June 2013. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_054E.pdf?__blob=publicationFile&v=4
Recommendation: IT in Production. Industrial Control System Security. Inside threat. BSI Recommendation, May 2013. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_061E.pdf?__blob=publicationFile&v=2. Online; Accessed 04 June 2016
BSI Empfehlung: in der Produktion, Fernwartung im industriellen Umfeld. BSI Recommendation, Jan 2015. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_108.pdf?__blob=publicationFile&v=3 [available in German only]. Online; Accessed 04 June 2016
BSI recommendation: IT in production, industrial control system security, top 10 threats and countermeasures 2014. BSI recommendation, May 2016. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_005E.pdf?__blob=publicationFile&v=2. Online; Accessed 04 June 2016
BSI Empfehlung: IT in der Produktion, Fallbeispiel Schwimmbad. BSI Recommendation, Feb 2014. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_095a.pdf?__blob=publicationFile&v=3 (available in German only). Online; Accessed 04 June 2016
BSI Empfehlung: IT in der Produktion, Fallbeispiel Servicetechniker. BSI Recommendation, Mar 2014. https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_/downloads/BSI-CS_095c.pdf?__blob=publicationFile&v=2 (available in German only). Online; Accessed 04 June 2016
Bruner J (2013) Industrial internet the machines are talking, 1st edn. O’Reilly Media, Sebastopol
Marx R, Kuntze N, Rudolph C, Bente I, Vieweg J (2012) Trusted service access with dynamic security infrastructure configuration. In: 18th Asia-Pacific conference on communications (APCC). IEEE, 2012
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Khondoker, R., Larbig, P., Scheuermann, D., Weber, F., Bayarou, K. (2017). Addressing Industry 4.0 Security by Software-Defined Networking. In: Zhu, S., Scott-Hayward, S., Jacquin, L., Hill, R. (eds) Guide to Security in SDN and NFV. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-64653-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-64653-4_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64652-7
Online ISBN: 978-3-319-64653-4
eBook Packages: Computer ScienceComputer Science (R0)