ARCHIVES
Research Article
Enhancing Cybersecurity in Smart Manufacturing: A Comprehensive Approach
Anupriya Bharti1
Dr. Bramah Hazela2
1 PG student, Department of Engineering and Technology, Amity University, Lucknow, Uttar Pradesh, India. 2Assistant Professor G-III and Program Leader, Amity University, Lucknow Campus, Lucknow, Uttar Pradesh, India.
Published Online: May-August 2024
Pages: 192-201
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20240302030References
1. 1M. Grieves, Digital Twin: Manufacturing Excellence Through Virtual Factory Replication, White Paper, 2015, Online:
https://www.3ds.com/fileadmin/ PRODUCTS-SERVICES/DELMIA/PDF/Whitepaper/DELMIA-APRISO-DigitalTwin-Whitepaper.pdf -03-
01)
2. 2M. Attaran, S. Attaran, Collaborative supply chain management: The most promising practice for building efficient and sustainable supply
chains, Bus. Process Manag. J. (2007)
3. 3Y. Blomkvist, L.E.O Ullemar Loenbom, Improving Supply Chain Visibility Within Logistics by Implementing a Digital Twin: A Case Study
at Scania Logistics, KTH Institute of Technology, Stockholm, Sweden, 2020
4. 4Z. Kang, C. Catal, B. Tekinerdogan, “Remaining useful life (Rul) prediction of equipment in production lines using artificial neural
networks”, Sensors 21 (2021) 932
5. 5Dassault Systems, the living heart project, 2022, Online: https://www.3ds.com/ products-services/simulia/solutions/life-sciences-
healthcare/the-living-heartproject/
6. 6K. Subramanian, Digital twin for drug discovery and development—The virtual Liver J, J. Indian Inst. Sci. 100 (4) (2020) 653–662.
7. 7M. Xiong, H. Wang, Digital twin applications in aviation industry: A review, Int. J. Adv. Manuf. Technol. 121 (9–10) (2022) 1–16
8. 8 Y. Chen, “Integrated and Intelligent Manufacturing: Perspectives and Enablers,” Engineering, vol. 3, pp. 588–595, Oct. 2017
9. Z. Liu, N. Meyendorf, and N. Mrad, “The role of data fusion in predictive maintenance using digital twin,” in Annual Review of Progress in
Quantitative Nondestructive Evaluation, (Provo, Utah, USA), p. 020023, 2018
10. Y. Zheng, S. Yang, and H. Cheng, “An application framework of digital twin and its case study,” Journal of Ambient Intelligence and
Humanized Computing, vol. 10, pp. 1141–1153, June 2018
11. R. Vrabiˇ c, J. A. Erkoyuncu, P. Butala, and R. Roy, “Digital twins: Understanding the added value of integrated models for through-life
engineering services,” Procedia Manufacturing, vol. 16, pp. 139–146, 2018
12. A.Madni, C. Madni, and S. Lucero, “Leveraging Digital Twin Technology in Model-Based Systems Engineering,” Systems, vol. 7, p. 7, Jan.
2019
13. Tao, Fei, Meng Zhang, and Andrew Yeh Chris Nee. Digital twin driven smart manufacturing. Academic press, 2019
14. T. Bergs, S. Gierlings, T. Auerbach, A. Klink, D. Schraknepper, T. Augspurger, The concept of digital twin and digital shadow in
manufacturing, Procedia CIRP 101 (2021) 81–84
15. J. Davis, Nat. Sci. Foundation, Workshop Proceedings on Cybersecurity in Chemical and Biological Process Systems: Impact and Directions
2006
16. DIN VDE The German Standardization Roadmap for Industrie 4.0 Version 1.0. 2014
https://www.din.de/resource/blob/65354/1bed7e8d800cd4712d7d1786584a7a3a/roadmap-i4- 0-e-data.pdf
17. M. Hannah, M. James, S. Johnson, C. Leiva, A. Michel, D. Noller, F. Riddick, D. Riley, E. Wallace, B. Williams, Interna- tional. 2016
https://www.pathlms.com/mesa/courses/14866
18. Y. Lu, K. C. Morris, S. Frechette, NIST 2016 https://nvipubs.nist.gov/nistpubs/ir/2016/NIST.IR.8107.pdf
19. Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions, Computer Communications, Sri Harsha
Mekala, Zubair Baig, Adnan Anwar, Sherali Zeadally, https://doi.org/10.1016/j.comcom.2023.06.020
20. Wikipedia, “Purdue enterprise reference architecture,” https://en.wikipedia.org/wiki/Purdue Enterprise Reference Architecture, 2019.
21. N. Jiang, H. Lin, Z. Yin and L. Zheng, "Performance Research on Industrial Demilitarized Zone in Defence-in-Depth Architecture," 2018
IEEE International Conference on Information and Automation (ICIA), Wuyishan, China, 2018, pp. 534-537, Doi:
10.1109/ICInfA.2018.8812486.
22. MITRE CVE records (Online) Case ID: CVE-2007-3108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108
23. Alotaibi, A.; Rassam, M.A. Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defence.
Future Internet 2023, 15, 62. https://doi.org/10.3390/fi15020062
24. Tan, Jinbiao, Jianhua Shi, Jiafu Wan, Hong-Ning Dai, Jiong Jin, and Rui Zhang. "Blockchain-Based Data Security and Sharing for Resource-
Constrained Devices in Manufacturing IoT." IEEE Internet of Things Journal (2024).
25. Ciampi, Mario, Diego Romano, and Giovanni Schmid. "Process Authentication through Blockchain: Three Case Studies." Cryptography 6,
no. 4 (2022): 58.
26. EternalBlue - Wikipedia
27. Dragos “EKANS Ransomware and ICS operations” https://www.dragos.com/blog/industry-news/ekans-ransomware-and-ics-
operations/#_ftn1
28. WannaCry ransomware attack - Wikipedia
29. “Honda Shuts Down Factories After Cyberattack” https://www.popularmechanics.com/technology/security/a32825656/honda-
cybersecurity-attack/
30. Lee, Robert M., Michael J. Assante, and Tim Conway. "German steel mill cyberattack." Industrial Control Systems 30, no. 62 (2014): 1-15.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltc79a41dbf7d1441e/607f235775873e466bcc539c/ICS-CPPE-case-Study-2-
German-Steelworks_Facility.pdf
31. Ellen Nakashima, Greg Miller & Julie Tate, U.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say,
WASH. POST (June 19, 2012), https://www.washingtonpost.com/world/national-security/us-israel developed-computer-virus-to-slow-
iranian-nuclear-efforts-officials say/2012/06/19/gJQA6xBPoV_story.html.
32. Lawrence J. Trautman and Peter C. Ormerod, Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things, 72 U.
Miami L. Rev. 761 (2018): https://repository.law.miami.edu/umlr/vol72/iss3/5
https://www.3ds.com/fileadmin/ PRODUCTS-SERVICES/DELMIA/PDF/Whitepaper/DELMIA-APRISO-DigitalTwin-Whitepaper.pdf -03-
01)
2. 2M. Attaran, S. Attaran, Collaborative supply chain management: The most promising practice for building efficient and sustainable supply
chains, Bus. Process Manag. J. (2007)
3. 3Y. Blomkvist, L.E.O Ullemar Loenbom, Improving Supply Chain Visibility Within Logistics by Implementing a Digital Twin: A Case Study
at Scania Logistics, KTH Institute of Technology, Stockholm, Sweden, 2020
4. 4Z. Kang, C. Catal, B. Tekinerdogan, “Remaining useful life (Rul) prediction of equipment in production lines using artificial neural
networks”, Sensors 21 (2021) 932
5. 5Dassault Systems, the living heart project, 2022, Online: https://www.3ds.com/ products-services/simulia/solutions/life-sciences-
healthcare/the-living-heartproject/
6. 6K. Subramanian, Digital twin for drug discovery and development—The virtual Liver J, J. Indian Inst. Sci. 100 (4) (2020) 653–662.
7. 7M. Xiong, H. Wang, Digital twin applications in aviation industry: A review, Int. J. Adv. Manuf. Technol. 121 (9–10) (2022) 1–16
8. 8 Y. Chen, “Integrated and Intelligent Manufacturing: Perspectives and Enablers,” Engineering, vol. 3, pp. 588–595, Oct. 2017
9. Z. Liu, N. Meyendorf, and N. Mrad, “The role of data fusion in predictive maintenance using digital twin,” in Annual Review of Progress in
Quantitative Nondestructive Evaluation, (Provo, Utah, USA), p. 020023, 2018
10. Y. Zheng, S. Yang, and H. Cheng, “An application framework of digital twin and its case study,” Journal of Ambient Intelligence and
Humanized Computing, vol. 10, pp. 1141–1153, June 2018
11. R. Vrabiˇ c, J. A. Erkoyuncu, P. Butala, and R. Roy, “Digital twins: Understanding the added value of integrated models for through-life
engineering services,” Procedia Manufacturing, vol. 16, pp. 139–146, 2018
12. A.Madni, C. Madni, and S. Lucero, “Leveraging Digital Twin Technology in Model-Based Systems Engineering,” Systems, vol. 7, p. 7, Jan.
2019
13. Tao, Fei, Meng Zhang, and Andrew Yeh Chris Nee. Digital twin driven smart manufacturing. Academic press, 2019
14. T. Bergs, S. Gierlings, T. Auerbach, A. Klink, D. Schraknepper, T. Augspurger, The concept of digital twin and digital shadow in
manufacturing, Procedia CIRP 101 (2021) 81–84
15. J. Davis, Nat. Sci. Foundation, Workshop Proceedings on Cybersecurity in Chemical and Biological Process Systems: Impact and Directions
2006
16. DIN VDE The German Standardization Roadmap for Industrie 4.0 Version 1.0. 2014
https://www.din.de/resource/blob/65354/1bed7e8d800cd4712d7d1786584a7a3a/roadmap-i4- 0-e-data.pdf
17. M. Hannah, M. James, S. Johnson, C. Leiva, A. Michel, D. Noller, F. Riddick, D. Riley, E. Wallace, B. Williams, Interna- tional. 2016
https://www.pathlms.com/mesa/courses/14866
18. Y. Lu, K. C. Morris, S. Frechette, NIST 2016 https://nvipubs.nist.gov/nistpubs/ir/2016/NIST.IR.8107.pdf
19. Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions, Computer Communications, Sri Harsha
Mekala, Zubair Baig, Adnan Anwar, Sherali Zeadally, https://doi.org/10.1016/j.comcom.2023.06.020
20. Wikipedia, “Purdue enterprise reference architecture,” https://en.wikipedia.org/wiki/Purdue Enterprise Reference Architecture, 2019.
21. N. Jiang, H. Lin, Z. Yin and L. Zheng, "Performance Research on Industrial Demilitarized Zone in Defence-in-Depth Architecture," 2018
IEEE International Conference on Information and Automation (ICIA), Wuyishan, China, 2018, pp. 534-537, Doi:
10.1109/ICInfA.2018.8812486.
22. MITRE CVE records (Online) Case ID: CVE-2007-3108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108
23. Alotaibi, A.; Rassam, M.A. Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defence.
Future Internet 2023, 15, 62. https://doi.org/10.3390/fi15020062
24. Tan, Jinbiao, Jianhua Shi, Jiafu Wan, Hong-Ning Dai, Jiong Jin, and Rui Zhang. "Blockchain-Based Data Security and Sharing for Resource-
Constrained Devices in Manufacturing IoT." IEEE Internet of Things Journal (2024).
25. Ciampi, Mario, Diego Romano, and Giovanni Schmid. "Process Authentication through Blockchain: Three Case Studies." Cryptography 6,
no. 4 (2022): 58.
26. EternalBlue - Wikipedia
27. Dragos “EKANS Ransomware and ICS operations” https://www.dragos.com/blog/industry-news/ekans-ransomware-and-ics-
operations/#_ftn1
28. WannaCry ransomware attack - Wikipedia
29. “Honda Shuts Down Factories After Cyberattack” https://www.popularmechanics.com/technology/security/a32825656/honda-
cybersecurity-attack/
30. Lee, Robert M., Michael J. Assante, and Tim Conway. "German steel mill cyberattack." Industrial Control Systems 30, no. 62 (2014): 1-15.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltc79a41dbf7d1441e/607f235775873e466bcc539c/ICS-CPPE-case-Study-2-
German-Steelworks_Facility.pdf
31. Ellen Nakashima, Greg Miller & Julie Tate, U.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say,
WASH. POST (June 19, 2012), https://www.washingtonpost.com/world/national-security/us-israel developed-computer-virus-to-slow-
iranian-nuclear-efforts-officials say/2012/06/19/gJQA6xBPoV_story.html.
32. Lawrence J. Trautman and Peter C. Ormerod, Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things, 72 U.
Miami L. Rev. 761 (2018): https://repository.law.miami.edu/umlr/vol72/iss3/5
Related Articles
2024
Revolutionizing User Interfaces: Exploring the Latest Trends in Front-End Development
2024
Website Development in Computer Science: Unveiling the Digital World
2024
Review on RSA Cryptography, Steganography and Compression Techniques for Data Security
2024
Stock Price Prediction Using LSTM
2024
Comparative Analysis of Program Execution Time Required by Python, R and Julia Compiler
2024