- -

Software Defined Networking Firewall for Industry 4.0 Manufacturing Systems

RiuNet: Repositorio Institucional de la Universidad Politécnica de Valencia

Compartir/Enviar a

Citas

Estadísticas

  • Estadisticas de Uso

Software Defined Networking Firewall for Industry 4.0 Manufacturing Systems

Mostrar el registro sencillo del ítem

Ficheros en el ítem

dc.contributor.author Tsuchiya, Akihiro es_ES
dc.contributor.author Fraile Gil, Francisco es_ES
dc.contributor.author Koshijima, Ichiro es_ES
dc.contributor.author Ortiz Bas, Ángel es_ES
dc.contributor.author Poler, R. es_ES
dc.date.accessioned 2019-07-31T20:01:50Z
dc.date.available 2019-07-31T20:01:50Z
dc.date.issued 2018 es_ES
dc.identifier.issn 2013-0953 es_ES
dc.identifier.uri http://hdl.handle.net/10251/124592
dc.description.abstract [EN] Purpose: In order to leverage automation control data, Industry 4.0 manufacturing systems require industrial devices to be connected to the network. Potentially, this can increase the risk of cyberattacks, which can compromise connected industrial devices to acquire production data or gain control over the production process. Search engines such as Sentient Hyper-Optimized Data Access Network (SHODAN) can be perverted by attackers to acquire network information that can be later used for intrusion. To prevent this, cybersecurity standards propose network architectures divided into several networks segments based on system functionalities. In this architecture, Firewalls limit the exposure of industrial control devices in order to minimize security risks. This paper presents a novel Software Defined Networking (SDN) Firewall that automatically applies this standard architecture without compromising network flexibility. Design/methodology/approach: The proposed SDN Firewall changes filtering rules in order to implement the different network segments according to application level access control policies. The Firewall applies two filtering techniques described in this paper: temporal filtering and spatial filtering, so that only applications in a white list can connect to industrial control devices. Network administrators need only to configure this application-oriented white lists to comply with security standards for ICS. This simplifies to a great extent network management tasks. Authors have developed a prototype implementation based on the OPC UA Standard and conducted security tests in order to test the viability of the proposal. Findings: Network segmentation and segregation are effective counter-measures against network scanning attacks. The proposed SDN Firewall effectively configures a flat network into virtual LAN segments according to security standard guidelines. Research limitations/implications: The prototype implementation still needs to implement several features to exploit the full potential of the proposal. Next steps for development are discussed in a separate section. Practical implications: The proposed SDN Firewall has similar security features to commercially available application Firewalls, but SDN Firewalls offer additional security features. First, SDN technology provides improved performance, since SDN low-level processing functions are much more efficient. Second, with SDN, security functions are rooted in the network instead of being centralized in particular network elements. Finally, SDN provides a more flexible and dynamic, zero configuration framework for secure manufacturing systems by automating the rollout of security standard-based network architectures. Social implications: SDN Firewalls can facilitate the deployment of secure Industry 4.0 manufacturing systems, since they provide ICS networks with many of the needed security capabilities without compromising flexibility. Originality/value: The paper proposes a novel SDN Firewall specifically designed to secure ICS networks. A prototype implementation of the proposed SDN Firewall has been tested in laboratory conditions. The prototype implementation complements the security features of the OPC UA communication standard to provide a holistic security framework for ICS networks. es_ES
dc.description.sponsorship This research has been partially funded by the European Commission, under Grant Agreement 723710. es_ES
dc.language Inglés es_ES
dc.publisher Omnia Publisher SL es_ES
dc.relation.ispartof Journal of Industrial Engineering and Management es_ES
dc.rights Reconocimiento (by) es_ES
dc.subject Cyber security es_ES
dc.subject CPS es_ES
dc.subject MES es_ES
dc.subject SDN es_ES
dc.subject OPC UA es_ES
dc.subject.classification ORGANIZACION DE EMPRESAS es_ES
dc.title Software Defined Networking Firewall for Industry 4.0 Manufacturing Systems es_ES
dc.type Artículo es_ES
dc.identifier.doi 10.3926/jiem.2534 es_ES
dc.relation.projectID info:eu-repo/grantAgreement/EC/H2020/723710/EU/Virtual Factory Open Operating System/ es_ES
dc.rights.accessRights Abierto es_ES
dc.contributor.affiliation Universitat Politècnica de València. Departamento de Organización de Empresas - Departament d'Organització d'Empreses es_ES
dc.description.bibliographicCitation Tsuchiya, A.; Fraile Gil, F.; Koshijima, I.; Ortiz Bas, Á.; Poler, R. (2018). Software Defined Networking Firewall for Industry 4.0 Manufacturing Systems. Journal of Industrial Engineering and Management. 11(2):318-332. https://doi.org/10.3926/jiem.2534 es_ES
dc.description.accrualMethod S es_ES
dc.relation.publisherversion https://doi.org/10.3926/jiem.2534 es_ES
dc.description.upvformatpinicio 318 es_ES
dc.description.upvformatpfin 332 es_ES
dc.type.version info:eu-repo/semantics/publishedVersion es_ES
dc.description.volume 11 es_ES
dc.description.issue 2 es_ES
dc.relation.pasarela S\383668 es_ES
dc.contributor.funder European Commission es_ES
dc.contributor.funder Information Catalyst for Enterprise


Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem