skip to main content
10.1145/3018896.3018938acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

IoT security hardware framework for remote maintenance of legacy machine tools

Published: 22 March 2017 Publication History

Abstract

The Internet of Things (IoT) is continuously growing and is now reaching into the industrial environment through new services such as remote maintenance for machine tools. Industrial applications of IoT require an increased awareness of security at all times. It is not only necessary that the data is exchanged securely; also the design of the hardware of the devices themselves needs to be considered. Security has to be designed right from the start into the IoT devices rather than added on later. This paper lays the foundation for the creation of a modular safe remote monitoring and maintenance system for machine tools through IoT devices at the hardware level. This article introduces a fully modular secure data acquisition system design approach with greater versatility, ready to be used in modern IoT manufacturing environments or for safe upgrading of existing legacy machinery.

References

[1]
Del Giudice, M., 2016 "Discovering the Internet of Things (IoT): technology and business process management, inside and outside the innovative firms" Business Process Management Journal, 22 (2).
[2]
Albrecht, K., Michael, K., 2013, "Connected: To Everyone and Everything" IEEE TECHNOLOGY AND SOCIETY MAGAZINE.
[3]
Iung, B., Veron, M., Suhner, M.C., Muller, A., 2006, "Integration of Maintenance Strategies into Prognosis Process to Decision-Making Aid on System Operation" Annals of the CIRP, 54(1):5--8.
[4]
Jang, W., Healy, W. M., Skibniewski, M., 2008, "Wireless sensor networks as part of a web-based building environmental monitoring system", Automation in Construction, 17 (6):729--736.
[5]
Lee, K., Yeuk, H., Lim, H., Yim, K., 2015, "Security Threats to the Platform Identification", 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), 4--6 Nov. 2015, Krakow, IEEE, 547--550.
[6]
Tedeschi, S., Mehnen, J., Tapoglou, N., Rajkumar, R., 2015, "Security Aspects in Cloud Based Condition Monitoring of Machine Tools", 4th International Conference on Through-life Engineering Services, Cranfield, UK 2015, Procedia CIRP, 38: 47--52.
[7]
Kim, H., Bruce, N., Lee, H.-J., Choi, Y., Choi, D., 2015, "Side Channel Attacks on Cryptographic Module: EM and PA Attacks Accuracy Analysis", Lecture Notes in Electrical Engineering, 339:509--516.
[8]
Parshotam, C., Rupinder, C., Aayush, G., 2012, "Improving the Secure Socket Layer by Modifying the RSA Algorithm" International Journal of Computer Science, Engineering and Applications (IJCSEA), 2(3): 79--86.
[9]
Li, W. and Mehnen, J., 2013, Cloud Manufacturing, Distributed Computing Technologies for Global and Sustainable Manufacturing, Springer Series in Advanced Manufacturing.

Cited By

View all
  • (2020)Establishing Trustworthy Relationships in Multiparty Industrial Internet of Things ApplicationsDigital Forensic Investigation of Internet of Things (IoT) Devices10.1007/978-3-030-60425-7_9(205-221)Online publication date: 10-Dec-2020
  • (2017)New Threats for Old Manufacturing Problems: Secure IoT-Enabled Monitoring of Legacy Production MachineryAdvances in Production Management Systems. The Path to Intelligent, Collaborative and Sustainable Manufacturing10.1007/978-3-319-66923-6_46(391-398)Online publication date: 31-Aug-2017
  • (2017)Practical Security Aspects of the Internet of ThingsCybersecurity for Industry 4.010.1007/978-3-319-50660-9_9(225-242)Online publication date: 5-Apr-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing
March 2017
1349 pages
ISBN:9781450347747
DOI:10.1145/3018896
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IoT
  2. M2M
  3. cyber-secure manufacturing
  4. machine tools
  5. remote maintenance
  6. tamper resistant design

Qualifiers

  • Research-article

Funding Sources

  • EPSRC

Conference

ICC '17

Acceptance Rates

ICC '17 Paper Acceptance Rate 213 of 590 submissions, 36%;
Overall Acceptance Rate 213 of 590 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Establishing Trustworthy Relationships in Multiparty Industrial Internet of Things ApplicationsDigital Forensic Investigation of Internet of Things (IoT) Devices10.1007/978-3-030-60425-7_9(205-221)Online publication date: 10-Dec-2020
  • (2017)New Threats for Old Manufacturing Problems: Secure IoT-Enabled Monitoring of Legacy Production MachineryAdvances in Production Management Systems. The Path to Intelligent, Collaborative and Sustainable Manufacturing10.1007/978-3-319-66923-6_46(391-398)Online publication date: 31-Aug-2017
  • (2017)Practical Security Aspects of the Internet of ThingsCybersecurity for Industry 4.010.1007/978-3-319-50660-9_9(225-242)Online publication date: 5-Apr-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media