首页 > 最新文献

2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)最新文献

英文 中文
Safety and Security Requirements in AAS Integration: Use Case Demonstration AAS集成中的安全和保障需求:用例演示
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144245
A. M. Hosseini, T. Sauter, W. Kastner
The Digital Twin (DT) paradigm has received attention for its potential in diverse industrial sectors like manufacturing, automotive, healthcare, electric grid, and transportation. The Asset Administration Shell (AAS) as an instantiation of the DT paradigm is proposed by Plattform Industrie 4.0, aiming to exchange asset-related data and services from when the asset is produced to its disposal in an interoperable way involving the key stakeholders. In Industrial Control Systems (ICS), AAS integration can bring about new safety and security concerns. Although there are standards covering safety and security separately, no finalised standard supports safety and security in a combined way. The increase in safety and security concerns because of AAS integration and recent cyber attacks that showed security and safety are interconnected, encourage us to explore one of the earliest activities in system development, requirement specification. Therefore, this paper investigates the impact of AAS integration into a use case on safety and security requirements specification according to IEC 62443 and 61511. The results highlight the interconnection of safety and security requirements in the proposed use case due to AAS integration and illustrate security requirements that potentially can affect safety.
数字孪生(DT)范式因其在制造业、汽车、医疗保健、电网和运输等不同工业部门的潜力而受到关注。资产管理外壳(AAS)作为DT范式的实例由platform Industrie 4.0提出,旨在以涉及关键利益相关者的可互操作方式交换与资产相关的数据和服务,从资产产生到处置。在工业控制系统(ICS)中,AAS集成会带来新的安全问题。虽然有单独涵盖安全和安保的标准,但没有最终的标准支持将安全和安保结合起来。由于AAS集成和最近的网络攻击,安全性和安全性问题的增加表明安全性和安全性是相互关联的,这鼓励我们探索系统开发中最早的活动之一,需求规范。因此,本文将根据IEC 62443和61511研究将AAS集成到用例中对安全和安保需求规范的影响。结果突出了由于AAS集成而在建议用例中安全性和安全性需求的互连,并说明了可能影响安全性的安全性需求。
{"title":"Safety and Security Requirements in AAS Integration: Use Case Demonstration","authors":"A. M. Hosseini, T. Sauter, W. Kastner","doi":"10.1109/WFCS57264.2023.10144245","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144245","url":null,"abstract":"The Digital Twin (DT) paradigm has received attention for its potential in diverse industrial sectors like manufacturing, automotive, healthcare, electric grid, and transportation. The Asset Administration Shell (AAS) as an instantiation of the DT paradigm is proposed by Plattform Industrie 4.0, aiming to exchange asset-related data and services from when the asset is produced to its disposal in an interoperable way involving the key stakeholders. In Industrial Control Systems (ICS), AAS integration can bring about new safety and security concerns. Although there are standards covering safety and security separately, no finalised standard supports safety and security in a combined way. The increase in safety and security concerns because of AAS integration and recent cyber attacks that showed security and safety are interconnected, encourage us to explore one of the earliest activities in system development, requirement specification. Therefore, this paper investigates the impact of AAS integration into a use case on safety and security requirements specification according to IEC 62443 and 61511. The results highlight the interconnection of safety and security requirements in the proposed use case due to AAS integration and illustrate security requirements that potentially can affect safety.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125443601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cooperation-Free Resource Allocation Algorithm Enhanced by Reinforcement Learning for Coexisting IIoTs 基于强化学习的共存物联网无合作资源分配算法
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144246
Jialin Zhang, W. Liang, Bo Yang, Huaguang Shi, Qi Wang, Zhibo Pang
The Industrial Internet of Things (IIoTs) plays an important role in various industrial applications, which require multiple time-critical networks to be deployed in the same region. The limited communication resources inevitably incur network coexistence problems. For scenarios where coexisting networks cannot coordinate effectively, the centralized or partial-information-based decentralized resource allocation methods cannot be implemented. To address this concern, we propose a Cooperation-Free Reinforcement Learning (CF-RL) algorithm for the fully distributed resource allocation problem in coexisting IIoT systems. Each network adopts the proposed algorithm to minimize collisions through a trial-and-error approach without any information interaction. To resist the influence of environmental dynamics, each coexisting network learns the state transition probability of the resource block instead of the resource block's position. Moreover, to potentially ensure the overall system performance, each network additionally considers the period offset in the initialization phase and action selection phase, so that the coexisting networks have different preferences for different state transitions. We conduct extensive simulations to verify the convergence performance. Evaluation results show that the CF-RL algorithm almost achieves (more than 99.88%) the effect of centralized resource allocation and has obvious superiorities over other cooperation-free algorithms in terms of the convergence rate, the number of collisions, and the resource utilization ratio.
工业物联网(iiot)在各种工业应用中发挥着重要作用,这些应用需要在同一区域部署多个时间关键型网络。有限的通信资源不可避免地产生网络共存问题。对于共存网络无法有效协调的场景,无法实现集中式或部分信息化的分散资源分配方式。为了解决这一问题,我们提出了一种无合作强化学习(CF-RL)算法来解决共存工业物联网系统中完全分布式的资源分配问题。每个网络都采用本文提出的算法,在没有任何信息交互的情况下,通过试错的方法将碰撞最小化。为了抵抗环境动态的影响,每个共存网络学习资源块的状态转移概率,而不是资源块的位置。此外,为了潜在地保证系统的整体性能,每个网络在初始化阶段和动作选择阶段额外考虑周期偏移,使得共存网络对不同的状态转换具有不同的偏好。我们进行了大量的仿真来验证收敛性能。评价结果表明,CF-RL算法几乎达到(99.88%以上)资源集中分配的效果,在收敛速度、碰撞次数、资源利用率等方面都比其他无协作算法有明显的优势。
{"title":"A Cooperation-Free Resource Allocation Algorithm Enhanced by Reinforcement Learning for Coexisting IIoTs","authors":"Jialin Zhang, W. Liang, Bo Yang, Huaguang Shi, Qi Wang, Zhibo Pang","doi":"10.1109/WFCS57264.2023.10144246","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144246","url":null,"abstract":"The Industrial Internet of Things (IIoTs) plays an important role in various industrial applications, which require multiple time-critical networks to be deployed in the same region. The limited communication resources inevitably incur network coexistence problems. For scenarios where coexisting networks cannot coordinate effectively, the centralized or partial-information-based decentralized resource allocation methods cannot be implemented. To address this concern, we propose a Cooperation-Free Reinforcement Learning (CF-RL) algorithm for the fully distributed resource allocation problem in coexisting IIoT systems. Each network adopts the proposed algorithm to minimize collisions through a trial-and-error approach without any information interaction. To resist the influence of environmental dynamics, each coexisting network learns the state transition probability of the resource block instead of the resource block's position. Moreover, to potentially ensure the overall system performance, each network additionally considers the period offset in the initialization phase and action selection phase, so that the coexisting networks have different preferences for different state transitions. We conduct extensive simulations to verify the convergence performance. Evaluation results show that the CF-RL algorithm almost achieves (more than 99.88%) the effect of centralized resource allocation and has obvious superiorities over other cooperation-free algorithms in terms of the convergence rate, the number of collisions, and the resource utilization ratio.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130344251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison and Analysis of Ricean $K$-Factor Estimators in Industrial Wireless Channels 工业无线信道中Ricean $K$因子估计器的比较与分析
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144125
Álvaro Medeiros, V. Cionca
The performance constraints imposed to the use of wireless communications on industrial applications collide with the severe propagation conditions of such adverse environment. The small-scale variations due to multipath and mobility of transceiver and/or scatterers must be characterized properly in order to select the most suitable fading mitigation technique. An important parameter related to the nature of the multipath components is the Rician $K$ -factor, which can be obtained from both channel impulse response and received power level time series, also known as wideband and narrowband methods. At runtime narrowband methods are straightforward due to the reduced capability of operational wireless transceivers. In this paper, we analyze wireless channel measurements of different industrial scenarios in order to compare $K$ -factor estimators. Results indicate similarities between narrowband and a wideband $K$ -factor estimator, which means accurate channel characterization at operational time is possible. Additionally, an application example evaluates the $K$ -factor estimation on the performance of wireless communication systems.
无线通信在工业应用中的性能限制与这种恶劣环境的恶劣传播条件发生了冲突。为了选择最合适的衰落减缓技术,必须对收发器和/或散射体的多径和迁移性引起的小尺度变化进行适当的表征。与多径分量性质相关的一个重要参数是系数,它可以从信道脉冲响应和接收功率电平时间序列中获得,也称为宽带和窄带方法。在运行时,由于操作无线收发器的能力下降,窄带方法是直接的。在本文中,我们分析了不同工业场景的无线信道测量,以比较$K$因子估计器。结果表明窄带和宽带K因子估计器之间存在相似性,这意味着在运行时可以精确地表征信道。另外,通过一个应用实例评估了K因子估计对无线通信系统性能的影响。
{"title":"Comparison and Analysis of Ricean $K$-Factor Estimators in Industrial Wireless Channels","authors":"Álvaro Medeiros, V. Cionca","doi":"10.1109/WFCS57264.2023.10144125","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144125","url":null,"abstract":"The performance constraints imposed to the use of wireless communications on industrial applications collide with the severe propagation conditions of such adverse environment. The small-scale variations due to multipath and mobility of transceiver and/or scatterers must be characterized properly in order to select the most suitable fading mitigation technique. An important parameter related to the nature of the multipath components is the Rician $K$ -factor, which can be obtained from both channel impulse response and received power level time series, also known as wideband and narrowband methods. At runtime narrowband methods are straightforward due to the reduced capability of operational wireless transceivers. In this paper, we analyze wireless channel measurements of different industrial scenarios in order to compare $K$ -factor estimators. Results indicate similarities between narrowband and a wideband $K$ -factor estimator, which means accurate channel characterization at operational time is possible. Additionally, an application example evaluates the $K$ -factor estimation on the performance of wireless communication systems.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121275879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empirical Delay and Doppler Profiles for Industrial Wireless Channel Models 工业无线信道模型的经验延迟和多普勒分布
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144250
Dreyelian Morejón, E. Iradier, P. Angueira, J. Montalbán
Upgrading wired industrial field buses with wireless counterparts is a key driver for future industrial applications and systems. This migration faces significant challenges associated with security, reliability, and lack of generally accepted standards. Moreover, wireless PHY and MAC layer developments require accurate, reliable, and realistic propagation channel models. Reliable models for Delay Profile and Doppler Spectra are scarce in the literature. This work analyses channel models based on reliable empirical data. It includes a description of the source databases, the processing methods, and the first results of multipath distribution and Doppler metrics. The results indicate that previous assumptions on Laplacian Doppler should not be taken for granted in industrial environments.
将有线工业现场总线升级为无线总线是未来工业应用和系统的关键驱动因素。这种迁移面临着与安全性、可靠性和缺乏普遍接受的标准相关的重大挑战。此外,无线PHY和MAC层的开发需要准确、可靠和真实的传播信道模型。文献中关于延迟谱和多普勒谱的可靠模型很少。本文基于可靠的经验数据分析渠道模型。它包括源数据库的描述、处理方法以及多径分布和多普勒度量的初步结果。结果表明,以前关于拉普拉斯多普勒的假设在工业环境中不应被视为理所当然。
{"title":"Empirical Delay and Doppler Profiles for Industrial Wireless Channel Models","authors":"Dreyelian Morejón, E. Iradier, P. Angueira, J. Montalbán","doi":"10.1109/WFCS57264.2023.10144250","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144250","url":null,"abstract":"Upgrading wired industrial field buses with wireless counterparts is a key driver for future industrial applications and systems. This migration faces significant challenges associated with security, reliability, and lack of generally accepted standards. Moreover, wireless PHY and MAC layer developments require accurate, reliable, and realistic propagation channel models. Reliable models for Delay Profile and Doppler Spectra are scarce in the literature. This work analyses channel models based on reliable empirical data. It includes a description of the source databases, the processing methods, and the first results of multipath distribution and Doppler metrics. The results indicate that previous assumptions on Laplacian Doppler should not be taken for granted in industrial environments.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115195622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Static Analysis of Packet Forwarding and Filtering Configurations in Industrial Networks 工业网络中包转发和过滤配置的静态分析
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144115
M. Cheminod, L. Seno
Securing industrial networked infrastructures has become increasingly important since the growth in their connectivity brought by production digitalization and the diffusion of paradigms such as Industrial Internet of Things (IIoT). Network segmentation is considered best practice to protect these networks from outside/inside cyber-attacks. To this purpose, network devices equipped with forwarding/filtering capabilities need to be suitably configured and deployed for the enforcement of segment-related security policies. Configuration of these devices in today industrial networked infrastructures is typically the result of a mix of manual and automated processes and, given the heterogeneity of devices and configuration languages, as well as of the supported applications and related requirements, it is often hard to make sure of its correctness and impact, e.g., on traffic latency. In this paper, a model is proposed to jointly describe network forwarding and filtering configuration. Techniques are then provided to perform static analyses such as verification of reachability intents and configuration equivalence, as well as the estimation of the latency introduced for handling specific traffic.
随着生产数字化和工业物联网(IIoT)等模式的扩散,工业网络基础设施的连通性不断提高,保护工业网络基础设施变得越来越重要。网络分段被认为是保护这些网络免受外部/内部网络攻击的最佳实践。为此,需要对具有转发/过滤功能的网络设备进行适当的配置和部署,以实施与网段相关的安全策略。在今天的工业网络基础设施中,这些设备的配置通常是手动和自动化过程混合的结果,并且考虑到设备和配置语言的异质性,以及所支持的应用程序和相关需求,通常很难确保其正确性和影响,例如,对流量延迟的影响。本文提出了一种联合描述网络转发和过滤配置的模型。然后提供了执行静态分析的技术,例如验证可达性意图和配置等价性,以及估计处理特定流量所引入的延迟。
{"title":"Static Analysis of Packet Forwarding and Filtering Configurations in Industrial Networks","authors":"M. Cheminod, L. Seno","doi":"10.1109/WFCS57264.2023.10144115","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144115","url":null,"abstract":"Securing industrial networked infrastructures has become increasingly important since the growth in their connectivity brought by production digitalization and the diffusion of paradigms such as Industrial Internet of Things (IIoT). Network segmentation is considered best practice to protect these networks from outside/inside cyber-attacks. To this purpose, network devices equipped with forwarding/filtering capabilities need to be suitably configured and deployed for the enforcement of segment-related security policies. Configuration of these devices in today industrial networked infrastructures is typically the result of a mix of manual and automated processes and, given the heterogeneity of devices and configuration languages, as well as of the supported applications and related requirements, it is often hard to make sure of its correctness and impact, e.g., on traffic latency. In this paper, a model is proposed to jointly describe network forwarding and filtering configuration. Techniques are then provided to perform static analyses such as verification of reachability intents and configuration equivalence, as well as the estimation of the latency introduced for handling specific traffic.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133866187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CopyNotice Preface Committee ToC 版权声明序言委员会
Pub Date : 2023-04-26 DOI: 10.1109/wfcs57264.2023.10144231
{"title":"CopyNotice Preface Committee ToC","authors":"","doi":"10.1109/wfcs57264.2023.10144231","DOIUrl":"https://doi.org/10.1109/wfcs57264.2023.10144231","url":null,"abstract":"","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131250121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Wireless Channel Quality by Means of Moving Averages and Regression Models 用移动平均和回归模型预测无线信道质量
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144122
Gabriele Formis, S. Scanzio, G. Cena, A. Valenzano
The ability to reliably predict the future quality of a wireless channel, as seen by the media access control layer, is a key enabler to improve performance of future industrial networks that do not rely on wires. Knowing in advance how much channel behavior may change can speed up procedures for adaptively selecting the best channel, making the network more deterministic, reliable, and less energy-hungry, possibly improving device roaming capabilities at the same time. To this aim, popular approaches based on moving averages and regression were compared, using multiple key performance indicators, on data captured from a real Wi-Fi setup. Moreover, a simple technique based on a linear combination of outcomes from different techniques was presented and analyzed, to further reduce the prediction error, and some considerations about lower bounds on achievable errors have been reported. We found that the best model is the exponential moving average, which managed to predict the frame delivery ratio with a 2.10% average error and, at the same time, has lower computational complexity and memory consumption than the other models we analyzed.
可靠地预测未来无线信道质量的能力,如媒体访问控制层所见,是提高未来不依赖有线的工业网络性能的关键因素。提前了解信道行为可能发生的变化,可以加快自适应地选择最佳信道的过程,使网络更加确定、可靠、更节能,同时可能提高设备漫游能力。为此,使用多个关键性能指标,对从真实Wi-Fi设置中捕获的数据,比较了基于移动平均线和回归的流行方法。此外,提出并分析了一种基于不同技术结果线性组合的简单技术,以进一步减小预测误差,并报道了一些关于可实现误差下界的考虑。我们发现最好的模型是指数移动平均模型,它能够以2.10%的平均误差预测帧传送率,同时,与我们分析的其他模型相比,它具有更低的计算复杂度和内存消耗。
{"title":"Predicting Wireless Channel Quality by Means of Moving Averages and Regression Models","authors":"Gabriele Formis, S. Scanzio, G. Cena, A. Valenzano","doi":"10.1109/WFCS57264.2023.10144122","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144122","url":null,"abstract":"The ability to reliably predict the future quality of a wireless channel, as seen by the media access control layer, is a key enabler to improve performance of future industrial networks that do not rely on wires. Knowing in advance how much channel behavior may change can speed up procedures for adaptively selecting the best channel, making the network more deterministic, reliable, and less energy-hungry, possibly improving device roaming capabilities at the same time. To this aim, popular approaches based on moving averages and regression were compared, using multiple key performance indicators, on data captured from a real Wi-Fi setup. Moreover, a simple technique based on a linear combination of outcomes from different techniques was presented and analyzed, to further reduce the prediction error, and some considerations about lower bounds on achievable errors have been reported. We found that the best model is the exponential moving average, which managed to predict the frame delivery ratio with a 2.10% average error and, at the same time, has lower computational complexity and memory consumption than the other models we analyzed.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123869419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
You Are What You Attack: Breaking the Cryptographically Protected S7 Protocol 你就是你所攻击的:打破加密保护的S7协议
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144251
Wael Alsabbagh, P. Langendörfer
S7 protocol defines an appropriate format for exchanging messages between SIMATIC S7 PLCs and their corresponding engineering software i.e., TIA Portal. Recently, Siemens has provided its newer PLC models and their proprietary S7 protocols with a very developed and sophisticated integrity check mechanism to protect them from various exploits e.g., replay attacks. This paper addresses exactly this point, and investigates the security of the most developed integrity check mechanism that the newest S7CommPlus protocol version implements. Our results showed that the latest S7 PLC models as well as their related protocols are still vulnerable. We found that adversaries can manipulate two hashes that play a significant role in generating keys and bytes for the encryption processes implemented in the S7CommPlus protocol. This allows to reproduce S7 packets and conduct several attacks that eventually impact the operation of the target PLC and the entire physical process it controls. To validate our findings, we test all the attack scenarios presented in this work on a cryptographically protected S7 PLC from the 1500 family which uses the S7CommPlusV3 protocol.
S7协议定义了SIMATIC S7 plc与其相应的工程软件(即TIA Portal)之间交换消息的适当格式。最近,西门子为其较新的PLC型号及其专有的S7协议提供了一个非常发达和复杂的完整性检查机制,以保护它们免受各种漏洞的攻击,例如重播攻击。本文正是针对这一点,研究了最新版本的S7CommPlus协议所实现的最先进的完整性校验机制的安全性。我们的研究结果表明,最新的S7 PLC型号及其相关协议仍然存在漏洞。我们发现攻击者可以操纵两个哈希值,这两个哈希值在为S7CommPlus协议中实现的加密过程生成密钥和字节方面发挥重要作用。这允许复制S7数据包并进行几次攻击,最终影响目标PLC的操作和它控制的整个物理过程。为了验证我们的发现,我们在使用S7CommPlusV3协议的1500系列加密保护的S7 PLC上测试了本工作中提出的所有攻击场景。
{"title":"You Are What You Attack: Breaking the Cryptographically Protected S7 Protocol","authors":"Wael Alsabbagh, P. Langendörfer","doi":"10.1109/WFCS57264.2023.10144251","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144251","url":null,"abstract":"S7 protocol defines an appropriate format for exchanging messages between SIMATIC S7 PLCs and their corresponding engineering software i.e., TIA Portal. Recently, Siemens has provided its newer PLC models and their proprietary S7 protocols with a very developed and sophisticated integrity check mechanism to protect them from various exploits e.g., replay attacks. This paper addresses exactly this point, and investigates the security of the most developed integrity check mechanism that the newest S7CommPlus protocol version implements. Our results showed that the latest S7 PLC models as well as their related protocols are still vulnerable. We found that adversaries can manipulate two hashes that play a significant role in generating keys and bytes for the encryption processes implemented in the S7CommPlus protocol. This allows to reproduce S7 packets and conduct several attacks that eventually impact the operation of the target PLC and the entire physical process it controls. To validate our findings, we test all the attack scenarios presented in this work on a cryptographically protected S7 PLC from the 1500 family which uses the S7CommPlusV3 protocol.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122399769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Safety and Security Requirements Management Methodology in Reconfigurable Collaborative Human-Robot Application 可重构人机协作应用中的安全与保障需求管理方法
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144233
A. M. Hosseini, Clara Fischer, Mukund Bhole, W. Kastner, T. Sauter, S. Schlund
The current industry has to adapt to rapidly changing customers' needs. Reconfigurable manufacturing, therefore, provides capacity and functionality on demand which is essential for competitiveness in fast-changing markets. Furthermore, Industry 4.0 or even more so, Industry 5.0 emphasizes human-centred production with collaborative robots, Cobots, to create human-robot interactions. In such scenarios, safety and security are difficult to address due to the intrinsic features of reconfigurable manufacturing, like exposure to numerous requirements changes in a short period. As safety and security can conflict in different phases of the system life-cycle, one of the earliest activities to avoid conflicts is requirements engineering which can significantly diminish the cost and time of fixing issues compared to later phases like operation. This paper proposes a methodology for safety and security requirements interaction management, including conflict detection and resolution, and shows its applicability through a reconfigurable collaborative human-robot use case. Based on the proposed methodology, we detected and resolved two safety and security requirement conflicts.
当前的行业必须适应快速变化的客户需求。因此,可重构制造可以按需提供产能和功能,这对于在快速变化的市场中保持竞争力至关重要。此外,工业4.0甚至更多,工业5.0强调以人为中心的生产与协作机器人,协作机器人,创造人机交互。在这种情况下,由于可重构制造的固有特征(如在短时间内暴露于大量需求变化),安全性和安全性很难解决。由于安全和保障可能在系统生命周期的不同阶段发生冲突,因此避免冲突的最早活动之一是需求工程,与操作等后期阶段相比,需求工程可以显著减少修复问题的成本和时间。本文提出了一种安全需求交互管理方法,包括冲突检测和解决,并通过一个可重构的人机协作用例展示了该方法的适用性。基于提出的方法,我们发现并解决了两个安全和安保需求冲突。
{"title":"A Safety and Security Requirements Management Methodology in Reconfigurable Collaborative Human-Robot Application","authors":"A. M. Hosseini, Clara Fischer, Mukund Bhole, W. Kastner, T. Sauter, S. Schlund","doi":"10.1109/WFCS57264.2023.10144233","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144233","url":null,"abstract":"The current industry has to adapt to rapidly changing customers' needs. Reconfigurable manufacturing, therefore, provides capacity and functionality on demand which is essential for competitiveness in fast-changing markets. Furthermore, Industry 4.0 or even more so, Industry 5.0 emphasizes human-centred production with collaborative robots, Cobots, to create human-robot interactions. In such scenarios, safety and security are difficult to address due to the intrinsic features of reconfigurable manufacturing, like exposure to numerous requirements changes in a short period. As safety and security can conflict in different phases of the system life-cycle, one of the earliest activities to avoid conflicts is requirements engineering which can significantly diminish the cost and time of fixing issues compared to later phases like operation. This paper proposes a methodology for safety and security requirements interaction management, including conflict detection and resolution, and shows its applicability through a reconfigurable collaborative human-robot use case. Based on the proposed methodology, we detected and resolved two safety and security requirement conflicts.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132319096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Control-to-Control Communication in Industrial 5G Network 工业5G网络中控制对控制通信的评估
Pub Date : 2023-04-26 DOI: 10.1109/WFCS57264.2023.10144117
David Ginthoer, D. Harutyunyan
Ethernet-based industrial communication standards are dominating the communication landscape in factories. With the transition towards more flexible and wireless solutions, there is a strong interest to enable existing wired applications, such as control-to-control (C2C) use cases, over a wireless network. In this work, we investigate an example C2C application and validate its performance when operated over 5G. For this purpose, we present measurement results taken from a 5G standalone (SA) deployment in an operational factory. Our results show that 5G can replace existing wired solution, but at the cost of a lowered C2C application efficiency due to longer network latency. We furthermore investigate the impact of cross-traffic to the C2C application and effects of traffic prioritization.
基于以太网的工业通信标准在工厂通信领域占据主导地位。随着向更灵活和无线解决方案的过渡,人们对通过无线网络实现现有有线应用(如控制对控制(C2C)用例)产生了浓厚的兴趣。在这项工作中,我们研究了一个示例C2C应用程序,并验证了其在5G上运行时的性能。为此,我们提供了从运营工厂中的5G独立(SA)部署中获取的测量结果。我们的研究结果表明,5G可以取代现有的有线解决方案,但代价是由于更长的网络延迟而降低了C2C应用效率。我们进一步研究了交叉流量对C2C应用的影响以及流量优先级的影响。
{"title":"Evaluation of Control-to-Control Communication in Industrial 5G Network","authors":"David Ginthoer, D. Harutyunyan","doi":"10.1109/WFCS57264.2023.10144117","DOIUrl":"https://doi.org/10.1109/WFCS57264.2023.10144117","url":null,"abstract":"Ethernet-based industrial communication standards are dominating the communication landscape in factories. With the transition towards more flexible and wireless solutions, there is a strong interest to enable existing wired applications, such as control-to-control (C2C) use cases, over a wireless network. In this work, we investigate an example C2C application and validate its performance when operated over 5G. For this purpose, we present measurement results taken from a 5G standalone (SA) deployment in an operational factory. Our results show that 5G can replace existing wired solution, but at the cost of a lowered C2C application efficiency due to longer network latency. We furthermore investigate the impact of cross-traffic to the C2C application and effects of traffic prioritization.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123905042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1