Design World

  • Home
  • Technologies
    • ELECTRONICS • ELECTRICAL
    • Fastening • joining
    • FLUID POWER
    • LINEAR MOTION
    • MOTION CONTROL
    • SENSORS
    • TEST & MEASUREMENT
    • Factory automation
    • Warehouse automation
    • DIGITAL TRANSFORMATION
  • Learn
    • Tech Toolboxes
    • Learning center
    • eBooks • Tech Tips
    • Podcasts
    • Videos
    • Webinars • general engineering
    • Webinars • Automated warehousing
    • Voices
  • LEAP Awards
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
    • 2021 Winners
  • Design Guides
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Educational Assets
    • Engineering diversity
    • Reports
    • Trends
  • Supplier Listings
  • Advertise
  • SUBSCRIBE
    • MAGAZINE
    • NEWSLETTER

New Security Procedures Secure the Intelligent Factory

By Phys.org | April 3, 2017

At the Hannover Messe from April 24 to 28, 2017, Fraunhofer researchers will present two new procedures for the protection of Industrie 4.0 production facilities (Hall 2, Booth C16/C22): here, a self-learning system recognizes security incidents in manufacturing facilities without knowledge of the underlying system architecture. Hardware-based security modules report manipulation tests on machines and components.

Manufacturing processes in the context of Industrie 4.0 are highly automated: the realization of the customer’s request is triggered as an assignment by the merchandise management system, the components required for the product are provided by the supply chain and the construction plans as well as the exact production procedure are retrieved from the supplier. Manufacturing occurs worldwide in order to be able to deliver as quickly as possible and without long distances.

However, these very flexible, individual and IT-dependent production processes increase the risk of manipulation in the production process, inferior or falsified components, or loss of know-how through product piracy. To protect against this, all data and communication channels used in the production process have to be secured and IT security has to be enhanced.

Identifying irregularities, ensuring quality

At the Hannover Messe 2017, the Fraunhofer Institute for Secure Information Technology SIT in Darmstadt demonstrates two procedures that use new approaches in the protection of industrial facilities. The first is to detect irregularities in the communication networks of manufacturing facilities, and the second is to ensure the integrity of the components involved in the manufacturing process and, as a result, the quality of the data and products they produce.

To detect anomalies during the operation of a plant, a self-learning system is used which analyzes data flows from all entities involved in the manufacturing process, such as sensor, design and order data, as well as personal data (if applicable). After a learning phase, it detects whether certain processes in the network belong to normal operation or represent a deviation from it – initially regardless of whether or not an attack is involved. The monitoring system oversees the architecture of the network and the allowed access paths via software defined networking (SDN). By analyzing communication and data, the system is able to recognize, for example, whether certain components behave unusally or whether larger amounts of data flow in a particular direction.

A second method monitors the software condition of components and machines. If these are manipulated in an unauthorized manner, integrity monitoring will sound an alarm. It combines software and hardware elements in order to determine the current state of a component even from far away. By assuring that components are in an expected and safe condition, the system also ensures the quality of the data that is used in the process. In case of detected attacks, plant operators can return infected components via the network to a trustworthy state without a technician having to interact directly with the component. This reduces costs and improves risk management considerably.

Industrie 4.0 needs new security procedures

“The methods known from classical IT, such as virus scanners or intrusion detection systems, are usually not suitable for production facilities,” says Dr.-Ing. Thorsten Henkel, who is responsible for Industrial Security Solutions at the Fraunhofer Institute for Secure Information Technology (SIT) in Darmstadt. On the one hand, they are not fast enough to meet the requirements of industrial facilities in terms of availability; on the other, they assume that the environment they monitor and their normal operating conditions are as well known as the methods of their potential attackers.

But exactly this is not the case with the production facilities of the future. “Production in the context of Industrie 4.0 is agile and constantly changes its architecture; it is decentrally organized and largely autonomous,” says Henkel. For this reason, security mechanisms and network concepts are necessary which work independently of architecture and allow for the degrees of freedom intended by Industrie 4.0 facilities.

You might also like


Filed Under: Industrial automation

 

LEARNING CENTER

Design World Learning Center
“dw
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for Design Engineering Professionals.
Motor University

Design World Digital Edition

cover

Browse the most current issue of Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • Robot Integration with Rotary Index Tables and Auxiliary Axes
  • How to Choose the Right Rotary Index Table for Your Application
  • Designing a Robust Rotary Index Table: Engineering Best Practices for Long-Term Performance
  • Custom Integration Options for your New and Existing Rotary Table Applications
  • Tech Tips: Crossed Roller Bearing Update
  • Five Uses for the Parvalux Modular Range
View More >>
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Design World
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Control Engineering
  • Consulting-Specifying Engineer
  • Plant Engineering
  • Engineering White Papers
  • Leap Awards

Copyright © 2026 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search Design World

  • Home
  • Technologies
    • ELECTRONICS • ELECTRICAL
    • Fastening • joining
    • FLUID POWER
    • LINEAR MOTION
    • MOTION CONTROL
    • SENSORS
    • TEST & MEASUREMENT
    • Factory automation
    • Warehouse automation
    • DIGITAL TRANSFORMATION
  • Learn
    • Tech Toolboxes
    • Learning center
    • eBooks • Tech Tips
    • Podcasts
    • Videos
    • Webinars • general engineering
    • Webinars • Automated warehousing
    • Voices
  • LEAP Awards
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
    • 2021 Winners
  • Design Guides
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Educational Assets
    • Engineering diversity
    • Reports
    • Trends
  • Supplier Listings
  • Advertise
  • SUBSCRIBE
    • MAGAZINE
    • NEWSLETTER
We use cookies to personalize content and ads, to provide social media features, and to analyze our traffic. We share information about your use of our site with our social media, advertising, and analytics partners who may combine it with other information you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use this website.