PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

Security tools for Industry 4.0

CeBIT 2014

Security tools for Industry 4.0
2014-03-05
(Press-News.org) You can hear the metallic buzz as the milling machine bores into the workpiece. Just a few last drill holes, and the camshaft is complete. The computer-guided machine performed the entire job – thanks to the digital manufacturing data that were uploaded onto its embedded computer beforehand. Everything runs without a hitch, only – the data are stolen.

Manufacturing data determine the production process for a product, and are just as valuable today as the design plans. They contain distinctive, inimitable information about the product and its manufacture. Whoever possesses this info merely needs the right equipment, et voilà: the pirated or counterfeit product is done. Whereas design data are well-protected from unauthorized outside access today, production data often lie exposed and unsecured in the computer-assisted machinery. An infected computer on the network, or just a USB stick, are all a thief would need to heist the data. Or hackers could directly attack the IT network – for instance, through unsecured network components, like routers or switches.

Encrypting manufacturing data upon creation

Researchers at the Fraunhofer Institute for Secure Information Technology SIT in Darmstadt are exhibiting how these security gaps can be closed up at this year's CeBIT from 10 to 14 March, 2014 (Hall 9, Booth E40). They will be presenting, for example, a software application that immediately encrypts manufacturing data as soon as they emerge. Integrated into computer and equipment, they ensure that both communicate with each other through a protected transportation channel and that only licensed actions are executed. "To the best of our knowledge, no comparable safeguard has previously existed for manufacturing data that reside directly in the machine tool," states Thomas Dexheimer from the SIT's Security Testlab. Digital Rights Management (DRM) controls all important parameters of the assignment, such as designated use, quantity, etc. This way, brand manufacturers are able to guarantee that even external producers can only produce an authorized quantity, as instructed in advance – and no additional pirated units.

His colleague at SIT, Dr. Carsten Rudolph, is more involved with secured networks. At CeBIT, Rudolph will exhibit his "Trusted Core Network". "Hackers can also gain access to sensitive production data via unsecured network components. These are small computers themselves, and can be easily manipulated," says the "Trust and Compliance" department head at SIT. In order to prevent this, he called upon one piece of technology that, for the most part, lies dormant (in deep slumber) and, for all intents and purposes, unused on our PCs: the Trusted Platform Module. This relates to a small computer chip that can encrypt, decrypt, and digitally sign the data. Installed into a network component, it indicates which software is running on the component, and assigns a distinct identity to it. "As soon as the software changes in a component, the adjacent component registers this occurrence and notifies the administrator. Hacker attacks can be exposed quickly and easily this way," says Rudolph.

"Both security technologies are important building blocks for the targeted Industry 4.0 scenario," says Dexheimer. The term "Industry 4.0" stands for the fourth industrial revolution. After water and steam power, followed by electrical energy, electronics and information technology, now, the cyber-physical systems (IT systems embedded in machinery that communicate with each other via wireless or cabled networks) and the Internet of Things are expected to move into the factory halls. "This revolution can only work if the intellectual property is sufficiently protected. And that's a tall order, because the targets of production IT will increase exponentially, due to ever growing digitization and networking," explains Dexheimer.

At this year's CeBIT, both researchers – Dexheimer and Rudolph – will present a computer-assisted machine tool using a CAD computer and a 3D printer. SIT's security software is installed both on the computer and the printer. The data are encrypted on the computer, and decrypted by the printer. The printer also validates the licensed authorization to conduct the print job. To ensure that the data are also securely embedded in the network, the scientists have built a Trusted Platform Module into multiple routers, and are displaying this as a demo. "An attacker cannot hack this there, because he or she will get nowhere near the built-in key," explains Rudolph.

INFORMATION: END

[Attachments] See images for this press release:
Security tools for Industry 4.0

ELSE PRESS RELEASES FROM THIS DATE:

Smart grid for electric vehicle fleet

Smart grid for electric vehicle fleet
2014-03-05
The network of charging stations for electric vehicles is becoming more tightly meshed. In Germany, the ratio of electric cars to charging stations is currently two to one and utility companies are pushing forward expansion of charging opportunities, especially in cities and metropolitan areas. Over 2000 charging spots have already been installed nationwide and the country's largest charging infrastructure is at the Fraunhofer Institute Center Stuttgart IZS – where up to 30 electric vehicles (EVs) at a time can re- charge at AC charge spots in the Fraunhofer Campus parking ...

New fins evolve repeatedly in teleost fishes

New fins evolve repeatedly in teleost fishes
2014-03-05
Though present in more than 6,000 living species of fish, the adipose fin, a small appendage that lies between the dorsal fin and tail, has no clear function and is thought to be vestigial. However, a new study analyzing their origins finds that these fins arose repeatedly and independently in multiple species. In addition, adipose fins appear to have repeatedly and independently evolved a skeleton, offering a glimpse into how new tissue types and structural complexity evolve in vertebrate appendages. Adipose fins therefore represent a unique example of convergent evolution ...

First light for MUSE

First light for MUSE
2014-03-05
Following testing and preliminary acceptance in Europe in September 2013, MUSE was shipped to ESO's Paranal Observatory in Chile. It was reassembled at the base camp before being carefully transported to its new home at the VLT, where it is now installed on Unit Telescope 4. MUSE is the latest of the second generation instruments for the VLT (the first two were X-shooter and KMOS and the next, SPHERE, will follow shortly). The leader of the team and principal investigator for the instrument, Roland Bacon (Centre de Recherche Astrophysique de Lyon, France), expressed his ...

Multidisciplinary teams helped marathon bombing survivors rebuild their lives

Multidisciplinary teams helped marathon bombing survivors rebuild their lives
2014-03-05
Alexandria, VA and Needham, MA – Due to rigorous disaster preparedness and the heroic actions of first responders and emergency and trauma personnel, not a single one of the nearly 200 people hospitalized after the 2013 Boston Marathon bombings died, despite many grave injuries. And, thanks to the orthopaedic surgeons and physical therapists who have helped those affected, survivors are now well on the road to recovery. The Journal of Orthopaedic & Sports Physical Therapy (JOSPT) and The Journal of Bone & Joint Surgery (JBJS) co-published a Special Report today entitled ...

The financial advantages of a legal separation compared with divorce

2014-03-05
The financial advantages of a legal separation compared with divorce Article provided by Magner, Hueneke, Smith & Borda, LLP Visit us at http://www.mhslaw.net Deciding to get divorced is a big and permanent decision. For couples in Milwaukee County, many opt to try being separated before they make the final decision to get divorced. While there are many factors that may play into a couple's decision to legally separate or divorce, this decision can be influenced by the financial advantages that come with a legal separation. What does it mean to legally separate? Couples ...

Workplace injuries on the rise for temporary employees

2014-03-05
Workplace injuries on the rise for temporary employees Article provided by Mark A. Skibiel, Attorney at Law Visit us at http://www.skibiellaw.com Numerous advocacy and news organizations have reported increased numbers of reported on-the-job injuries suffered by temporary or seasonal workers, particularly those in blue-collar workplaces like factories, non-union construction projects and warehouses. Since the so-called "Great Recession" began in 2007-2008, the numbers of temporary workers has steadily risen, and there are now nearly three million temps ...

Obesity and disability

2014-03-05
Obesity and disability Article provided by The Law Office of Sheryl Gandel Mazur Visit us at http://www.mazurdisabilitylaw.com Obesity is a problem in this country--and a problem growing more serious. According to the results of a recent study, 29 percent of adults were identified as obese and almost 4 percent were found to be extremely obese. As a general rule, obesity has been defined as weighing more than 20 percent above the weight medical experts consider to be the ideal weight considering gender, age, and height. The same recent study, published in the ...

After killing four in an accident, Texas teen gets 10 years probation

2014-03-05
After killing four in an accident, Texas teen gets 10 years probation Article provided by The Bates Law Firm Visit us at http://www.harrybateslaw.com According to the Centers for Disease Control and Prevention, car accidents are the leading cause of death for teenagers in the U.S. Not only are teens less likely to drive safely overall, but they are more likely to crash when there is alcohol in their bloodstream than older drivers. The CDC states that in a national survey conducted in 2011, eight percent of the teen participants admitted that they had consumed alcohol ...

Truck accident fatalities increase for third year in a row

2014-03-05
Truck accident fatalities increase for third year in a row Article provided by Keith E. Abbott, Attorney at Law Visit us at http://www.abbottaccidentlawyer.com If you have ever been involved in a car accident, you know that it can result in minor or serious injuries and property damage. However, when a large vehicle like a truck is involved, the stakes are much higher, as the likelihood of serious injury increases significantly. Additionally, it is much more probable that the accident results in a fatality. Unfortunately, truck accidents are now killing more ...

The jury is still out on whether HOS changes have been effective

2014-03-05
The jury is still out on whether HOS changes have been effective Article provided by The Law Office of Gordon Ring Visit us at http://www.gordonring.com One of the many recurring safety issues facing truck drivers is driver fatigue. Due to the demands of the job, where transporting goods thousands of miles on tight deadlines is business as usual, drivers put in long hours to ensure that their cargo is delivered timely. Since fatigued truck drivers are a major cause of serious and fatal car accidents, the amount of sleep that truck drivers must get before performing ...

LAST 30 PRESS RELEASES:

Hormone therapy reshapes the skeleton in transgender individuals who previously blocked puberty

Evaluating performance and agreement of coronary heart disease polygenic risk scores

Heart failure in zero gravity— external constraint and cardiac hemodynamics

Amid record year for dengue infections, new study finds climate change responsible for 19% of today’s rising dengue burden

New study finds air pollution increases inflammation primarily in patients with heart disease

AI finds undiagnosed liver disease in early stages

The American Society of Tropical Medicine and Hygiene and the Bill & Melinda Gates Foundation announce new research fellowship in malaria genomics in honor of professor Dominic Kwiatkowski

Excessive screen time linked to early puberty and accelerated bone growth

First nationwide study discovers link between delayed puberty in boys and increased hospital visits

Traditional Mayan practices have long promoted unique levels of family harmony. But what effect is globalization having?

New microfluidic device reveals how the shape of a tumour can predict a cancer’s aggressiveness

Speech Accessibility Project partners with The Matthew Foundation, Massachusetts Down Syndrome Congress

Mass General Brigham researchers find too much sitting hurts the heart

New study shows how salmonella tricks gut defenses to cause infection

Study challenges assumptions about how tuberculosis bacteria grow

NASA Goddard Lidar team receives Center Innovation Award for Advancements

Can AI improve plant-based meats?

How microbes create the most toxic form of mercury

‘Walk this Way’: FSU researchers’ model explains how ants create trails to multiple food sources

A new CNIC study describes a mechanism whereby cells respond to mechanical signals from their surroundings

Study uncovers earliest evidence of humans using fire to shape the landscape of Tasmania

Researchers uncover Achilles heel of antibiotic-resistant bacteria

Scientists uncover earliest evidence of fire use to manage Tasmanian landscape

Interpreting population mean treatment effects in the Kansas City Cardiomyopathy Questionnaire

Targeting carbohydrate metabolism in colorectal cancer: Synergy of therapies

Stress makes mice’s memories less specific

Research finds no significant negative impact of repealing a Depression-era law allowing companies to pay workers with disabilities below minimum wage

Resilience index needed to keep us within planet’s ‘safe operating space’

How stress is fundamentally changing our memories

Time in nature benefits children with mental health difficulties: study

[Press-News.org] Security tools for Industry 4.0
CeBIT 2014