search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
ADVICE FOR INDUSTRY 4.0 AGE g


make sure it has not been tampered with. Security for a decentralised system


is much more complicated than for a single PC. Challenges include algorithmic complexity – the sheer number of units – audit trail and decentralised ownership. Te list of challenges gets longer for IoT, with difficulties in implementing access control while keeping the usability, systems being optimised for time-to-market or cost, and a lack of accepted standard between manufacturers. On top of this, topics such as human safety in process control, data storage locations and industrial sabotage are all relevant for industrial IoT. Te list of considerations is much longer and continues to grow. Tis is not meant to demotivate, but to


encourage you to see this as an ongoing design issue for a product portfolio, and not just an extra feature to shoehorn in somehow. I recommend building a cross- portfolio cybersecurity team for products. Getting this team to work with the experts in IT is also beneficial, although this can be tricky since, in most organisations, the IT department normally has nothing to do with the engineering department or those involved in building products.


Te future and where machine vision is special Most security measures rely on a unique ID. Tis ID is then used to generate a private/ public key pair, which is then the basis of all encryption and hashing functions. Tis


‘I recommend building a cross-portfolio cybersecurity team for the products’


ID has to be unique and, if possible, only reproducible by a certain hardware function, so that the device cannot be replicated. Tis stops the attacker making a fake device with the same ID, finding a way to intercept traffic or producing fake traffic on the network. One potential security measure in modern


chips is the physical unclonable function (PuF). Tis hardware-based approach comes from quantum effects in the silicon of the chip, created during the production process. Another possibility is the sensor fingerprint from a vision sensor in a machine vision camera. Tese are created the same way as PuF and could be used as the basis of encryption. Tis provides extremely strong encryption for any vision-based system. Tis ID can then be read out and


distributed. Most proprietary systems for fleet management currently use hidden databases controlled by one company, which do not encourage distributed systems made up from the products of different companies. Te concept of a globally decentralised identity brings blockchain technology to the rescue. With it, a globally accessible store of IDs and associated services can be produced, which is unchangeable thanks to high-end


mathematical cryptography used in securing the chain. Such systems are being tried out by Chainstep in the Gaia-X research projects funded by the European Commission. Te collaborative project involves large names such as Bosch, together with modern blockchain companies, including Iota and Ocean.


Conclusions Cybersecurity is a topic that has become more important in a politically unstable world, where the number of ransomware attacks increases every year. IoT devices are also susceptible to attacks, and may be used in these attacks. An IoT device in a smart factory that is subject to an attack could paralyse production and cost the company dear. In summary, cybersecurity is a race and


continues indefinitely – just building in security as a feature is not enough. It must be continuously improved and updated for all products. O


Chainstep, based in Hamburg, consults and builds trust, security and identity solutions with blockchain and self-sovereign identity technology in B2B. Mark Hebbel is head of consultancy at the firm.


Reference


1. Butun, I., Österberg, P., Song, H.: Security of the internet of things: vulnerabilities, attacks and countermeasures. IEEE Commun. Surv. Tutorials (2019). https://doi.org/10.1109/ COMST.2019.2953364


32 IMAGING AND MACHINE VISION EUROPE VISION YEARBOOK 2022/23


@imveurope | www.imveurope.com


vs148/Shutterstock.com


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44