Safety and Security Beyond Industry 4.0

Safety and Security Beyond Industry 4.0

Roman Gumzej
Copyright: © 2022 |Pages: 10
DOI: 10.4018/IJAL.287556
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

As open standards like OPC UA were introduced to facilitate the interoperability of devices, safety and security standards were only gradually incorporated into Industry 4.0 designs. Hence, safety and security issues have eventually emerged with the growing complexity of such systems, and they need to expand outside of their premises to be integrated into larger set-ups. Typical examples thereof are power grids, whose dependability was guarded for long times by strict rules and restrictive communication protocols. Once they were exposed on the Internet, however, their vulnerability has increased to a point where their safety could be compromised. Hence, there is an urgent need to implement effective safety and security mechanisms into OPC UA to provide systems with appropriate levels of functional safety as well as data security. With increasing levels of integration, e.g. with Industry 5.0, these standards need to evolve to provide for sustainability in a globally interconnected world.
Article Preview
Top

Introduction

The OPC Foundation, formally known as Object Linking and Embedding for Process Control, is an industry consortium that creates and maintains standards for open connectivity of industrial automation devices and systems, such as industrial control systems and process control in general. OPC Unified Architecture (OPC UA) is a machine-to-machine communication protocol for industrial automation developed by the OPC Foundation. It is a vendor-independent communication protocol for industrial automation applications. OPC UA standards were incorporated into Industry 4.0 designs for easier interoperability among various Programmable Logic Controller (PLC) devices controlled from higher-level information systems, like Manufacturing Execution Systems (MES).

Former implementations were specific to manufacturers and network providers, bringing compatibility issues to the forefront of any Industrial Control System (ICS) implementation. Such integrations would eventually need to expose functional safety and security requirements, in addition to their basic functionality, which, due to their inherent and added system complexity, seemed an almost impossible task. In any case, it was a considerable effort and a major concern during their implementation and maintenance phases.

With the introduction of OPC UA, the integration efforts may be reduced, and one may also expect easier maintenance and standards compliance. While standards compliance can pertain to many things – from industry-specific to environmental requirements. This article focuses on system safety and security as they were identified as critical to ensure confidentiality, integrity, and availability (CIA) of systems. These are the expected properties from the future implementation of Intelligent Production Systems (IPS), particularly their control systems and services.

Moreover, in Society 5.0 one may expect an extra layer of distributed control over interconnected devices, where the devices talk to their control systems and other devices. Hence, ensuring the safety and security of their operation extends beyond the devices themselves to entire systems and systems of systems. Because of this, it is even more important to provide safety and security standards as references for the implementation of standards-compliant IoT devices and systems.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 13: 1 Issue (2023)
Volume 12: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 11: 2 Issues (2021)
Volume 10: 2 Issues (2020)
Volume 9: 2 Issues (2019)
Volume 8: 2 Issues (2018)
Volume 7: 2 Issues (2017)
Volume 6: 2 Issues (2016)
Volume 5: 2 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing