Description |
1 online resource : illustrations |
Series |
Springer series in advanced manufacturing |
|
Springer series in advanced manufacturing.
|
Contents |
Preface; Contents; Contributors; 1 Industry 4.0: An Overview of Key Benefits, Technologies, and Challenges; 1 Introduction: Background and Motivation; 2 Industry 4.0 and Smart Manufacturing; 2.1 Industrial Internet and the Industrial Internet of Things; 2.2 New 21st Century Product Development Paradigms; 3 Cloud-Based Design and Manufacturing; 4 Defining Cloud-Based Design and Manufacturing (CBDM); 4.1 Cloud Based Design; 4.2 Cloud Based Manufacturing; 4.3 CBDM Services; 5 CBDM: A First Generation Implementation |
|
5.1 An Infrastructure for Distributed Collaborative Design and Manufacturing Inspired by the Cloud Computing Paradigm5.2 A CBDM Workflow Example; 6 Software Defined Cloud Manufacturing; 6.1 Software-Defined Systems; 6.2 A Software Defined Cloud Manufacturing Architecture; 6.3 SDCM Domain Specific Configuration Language; 6.4 SDCM Workflow Scenarios; 7 Closure; References; 2 Customized Encryption of CAD Models for Cloud-Enabled Collaborative Product Development; Abstract; 1 Introduction; 2 Related Research; 2.1 Watermark of CAD Models; 2.2 Access Control of CAD Models in a Network Environment |
|
2.3 Multi-level Design Data Sharing Based on the Multi-resolution Models2.4 Encryption of CAD Models; 2.5 Summary of the Related Works; 3 Customized Encryption of Feature-Based CAD Models; 3.1 Encryption of a CAD Model; 3.1.1 Encryption of Sketches; 3.1.2 Encryption Algorithm of CAD Models; 3.2 Encryption Based Secure Sharing of CAD Models; 3.2.1 Key-Based Authorization Algorithm; 3.2.2 Customized Geometric Transformation Algorithm; 4 Case Study for Approach Validation; 5 Conclusion and Future Works; Acknowledgements; References; 3 A New Approach to Cyberphysical Security in Industry 4.0 |
|
Abstract1 Introduction; 2 Background; 3 Secure Manufacturing Information Architecture; 3.1 Pilot of Direct-to-Machine Security; 4 Manufacturing Security Enforcement Device; 5 Pilot of the Manufacturing Security Enforcement Device; 6 Conclusion; Acknowledgements; References; 4 SCADA System Forensic Analysis Within IIoT; 1 Introduction; 1.1 SCADA Progression and the Development of IIoT; 2 Conceptual Architecture of a SCADA System; 2.1 SCADA Hardware; 2.2 SCADA Software; 2.3 Networking; 3 Examples of SCADA System Incidents Prior to IIoT; 3.1 Trans-Siberian Pipeline Explosion |
|
3.2 Maroochy Shire Water System3.3 Stuxnet; 3.4 Duqu; 3.5 Flame; 4 SCADA Forensics Within IIoT; 4.1 Forensic Challenges; 4.2 Current Data Acquisition Methods for SCADA Systems; 5 Forensic Acquisition of SCADA Artefacts; 5.1 Network Data Acquisition; 5.2 Device Data Acquisition; 5.3 Half-Life of Data Within a SCADA System; 6 SCADA Forensic Process; 6.1 Existing Incident Response Models; 6.2 Forensic Methodology for SCADA Within IIoT; 6.3 SCADA Forensic Workstation; 7 Conclusion; 8 List of Abbreviations; References; 5 Big Data Security Intelligence for Healthcare Industry 4.0; Abstract |
Summary |
This book introduces readers to cybersecurity and its impact on the realization of the Industry 4.0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4.0 landscape and details the existing cybersecurity threats faced by Industry 4.0, as well as state-of-the-art solutions with regard to both academic research and practical implementations. Industry 4.0 and its associated technologies, such as the Industrial Internet of Things and cloud-based design and manufacturing systems are examined, along with their disruptive innovations. Further, the book analyzes how these phenomena capitalize on the economies of scale provided by the Internet. The book offers a valuable resource for practicing engineers and decision makers in industry, as well as researchers in the design and manufacturing communities and all those interested in Industry 4.0 and cybersecurity |
Bibliography |
Includes bibliographical references |
Notes |
Vendor-supplied metadata |
Subject |
Computer security
|
|
Communications engineering -- telecommunications.
|
|
Production engineering.
|
|
Research & development management.
|
|
Crime & criminology.
|
|
Computer security.
|
|
SOCIAL SCIENCE -- Criminology.
|
|
computer crime.
|
|
Cyber crime.
|
|
Telecommunications.
|
|
economies of scale.
|
|
industrial manufacturing.
|
|
Computer security
|
Form |
Electronic book
|
Author |
Thames, Lane, editor
|
|
Schaefer, Dirk, 1961- editor.
|
ISBN |
9783319506609 |
|
3319506609 |
|