SlideShare a Scribd company logo
1 of 37
The Rise of Smart Factories:
Use Cases – Essentials – Security Tools
Oliver Winzenried
CEO WIBU-SYSTEMS AG
oliver.winzenried@wibu.com
OPC UA Security: Native
and Add-on Solutions
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 1
Smart Factory Projects featuring Wibu-Systems
 OpSIT: Smart Items Technologies in Healthcare
 SesaOPC: SmartFactoryKL
 Secure Plug & Work: Fraunhofer IOSB
 IUNO: German reference project for Cyber Security in Industrie 4.0
 Large consortium: 14 companies and 7 research institutes
 Four large Use Cases (Testbeds)
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 2
OpSIT: Smart Items Technologies in Healthcare
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 3
OpSIT: Smart Items Technologies in Healthcare
 OpSIT: Optimal use of smart items technologies
in healthcare
 Using an Intel Edison SBC as a Gateway
for wireless low-power sensors
 Wireless sensor data is sampled from Edison
  Unprotected data is sampled and processed locally
 Sampled data is provided via OPC UA in hospital network
  Secure access to sensitive data
 Whole system (application & cryptographic material) stored on a
CodeMeter microSD card
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 4
Technology Initiative SmartFactoryKL
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 5
Cyber Physical
Systems
2002 2005 2015
Smart Home
Internet
of Things
2011
10-year anniversary
Launching:
CONFIGURATION OF THE VISION INDUSTRIE 4.0
More than 10 years…
www.SmartFactory.de
Technology Initiative SmartFactoryKL
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 6
Technology Initiative SmartFactoryKL
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 7
Topics and content:
• Cyber-Physical Systems
• Vertical integration via OPC-UA
• Decentralised process control via RFID
• Semantical product and object memory model
• Resource protection through
context-enabled M2M communication
• Augmented-Reality based human-machine interaction
Wibu-Systems contribution
• Secure signed data in RFID
• Secure key storage and certificates for OPC-UA
• Security components from sensor to cloud
Project Secure Plug & Work
 Plug & Work of production
components using
open standards
 Secure authentication and
configuration of production
components and
trusted communication
 Wibu-Systems contribution
CodeMeter Protection, Licensing,
Security, OPC UA integration
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 8
Secure Plug and Work: Secure networking in Industry 4.0
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 9
Firewall
PC/Über-
geordnete IT
Ethernet
Control Room
MAG Specht Milling Cutter
Schunk Powerball
Component Overview
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 10
Firewall
Component nTool MagazineSpindle
IPC (PLC)
Machine Control
PC/MES IT
CAN
Ethernet
Schunk PLC
ProfiNet
OPC UA Communication Added
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 11
Firewall
Component nTool MagazineSpindle
IPC (PLC)
Machine Control
OPC-UA-
Server
OPC-UA-
Server
PC/MES IT
UA Server
CAN
Ethernet
Schunk PLC
OPC-UA-
Server
ProfiNet
Security in “Secure Plug & Work”
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 12
Gateway
(Switch for secure connection,
gateway for unsecured connection,
aggregating UA-Server)
Firewall
Component nTool MagazineSpindle
IPC (PLC)
Machine Control
OPC-UA-
Server
Security
OPC-UA-
Server
Security
OPC-UA-
Server
PC/MES IT
UA Server
CAN
Ethernet
Schunk PLC
OPC-UA-
Server
Security
ProfiNet
IUNO: Reference Project Security in Industrie 4.0
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 13
 Four large Use Cases
(Testbeds)
 Collect all requirements
and solutions in a tool box
 Implementation
Transfer to Industry!
Secure Connectivity
Visual security control
room for a production
scenario
Secure Processes
Customer individual
production
Secure Services
Remote access / trusted
partners
Secure Data
Technology market place
for process data
IUNO: Reference Project for Cyber Security in Industrie 4.0
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 14
IUNO WP 1 – Customized Production (HOMAG)
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 15
IUNO WP 1 – Customized Production
 Goal: Definite and secure identification throughout the production process
 Identification is complicated by
 Processing, production environment (e.g., dust, humidity,…), multi-domains
 Examples
 Painting or cutting of components
 Challenges
 Secure application of identification material to components
 Prevention of product piracy (counterfeits)
 Establishing cross-domain trust in identification process
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 16
IUNO WP 2 – Marketplace for technology data (TRUMPF)
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 17
IUNO WP 2 – Marketplace for technology data (TRUMPF)
 Goal: Easy and secure tradeable technology data (machine configurations)
 Status Quo
 Basic technology data is included in the machine
 Advanced technology data is bought on a one-time basis
 Technology data is not protectet against theft at all
 Challenges
 Machines are not a single, easily controllable entity
 Technology data need to be flexible
 Industrial requirements for availablity and reliability
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 18
IUNO WP 3 – Remote maintenance (Bosch)
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 19
IUNO WP 3 – Remote maintenance (Bosch)
 Goal
 Unified platform for remote maintenance of machines
 Status Quo
 Diverse landscape of remote maintenance solutions
 Challenges
 Secure and unified identification of all participating parties
 Platform, machines, maintainers, service providers, contracting bodies, …
 Secure routing of connections
 One configuration for network equipment suffices for all machines on the shop floor
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 20
How to Implement Security in
Connected Products
Working principles of CodeMeter
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories
OPC UA typical architectures
CodeMeter integration in OPC UA
21
Wibu-Systems Technologies and Solutions
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 22
Software Integration
Back Office Integration
Protection Suite: Ax/Ex/Ix-Protector
CodeMeter License Central
 CodeMeter®
 Secure Key Storage (Hardware / Software)
 De-/Encryption (AES, ECC, RSA)
 Flexible License Models
 Software Integration
 Automatic Code Protection / API
 Secure Boot / OPC UA
 Back Office Integration
 Key and Certificate Deployment
 License Deployment
 License Administration
OPC UA offers excellent security at protocol level
 Secure Channel Authentication
 X.509 certificates
 RSA public/private keys
 Trust management via
Public Key Infrastructure
 Secure Channel Encryption
 Symmetric Encryption using Advanced Encryption Standard (AES) 128/256bit keys
  Using OPC UA provides high security in transit
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 23
Picture: OPC Foundation
OPC UA offers excellent security
 Widely supported:
 Plattform Industrie 4.0 in Germany
 BSI Study on OPC UA standard
https://opcfoundation.org/security/
 IIC support
 Chinese Alliance Industrial Internet
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 24
OPC UA offers endpoint security
 The IIoT Landscape: Where are Endpoints?
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories
25
EP
EP
EP
EP
EP
EP
EP
25
OPC UA offers endpoint security
 Access Control
 Monitoring & Analysis
 Secure Configuration & Management
 Integrity Protection
 Identity
 Root of Trust
 Physical Security (with CM)
 Data Protection
 Security Model and Policy
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 26
Pervasive security extends beyond the protocol layer
 Security of endpoints is equally important
 Vulnerabilities in operating systems
 Vulnerabilities in software libraries
 Vulnerabilities in applications
 Consequences of a compromised endpoint can be severe
 Theft of cryptographic material (authentication)
 Manipulation of configuration data (trust lists, certificate revocation lists)
 Manipulation of applications (producing incorrect information)
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 27
Pervasive security needs additional effort
 General setup for OPC UA servers and clients
 Private keys are stored on the hard disk
 Trust lists and certificate revocation lists are stored on the hard disk
 Applications are not protected against tampering
 Successful attack to endpoints leads to
 Further penetration of infrastructure
 Loss of functionality or reliability
 Loss of intellectual property
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 28
OPC UA SDK, CmEmbedded and CmDongle – a perfect match
 CmEmbedded
 Small, modular runtime for embedded systems
 Portable to a variety of operating systems
 Provides subset of CodeMeter API
 CmDongle
 Smart card chips from Infineon Technologies (EAL 5+)
 Secure storage of cryptographic material
 Secure execution of crypto primitives (encryption/signature)
 Variety of form factors
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 29
OPC UA SDK, CmEmbedded and CmDongle – a perfect match
 Integration of CodeMeter Embedded in OPC UA SDK
 Storage and processing of all security sensitive information in the smart card chip
 Effortless development of applications with hardware security
 Seamless migration between conventional software security and hardware security
 Access to protection, licensing, and security features of CodeMeter
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 30
CodeMeter
Embedded
Development
OPC-UA Application
CodeMeter
Embedded
Enhancing security in OPC UA
 Protection of private keys in CmDongle
 Implementation of asymmetric encryption and signature
algorithm according to OPC UA security profiles
 Currently RSA keys up to 2048bit (ECC 224 Bit)
 All processing done in CmDongle
 Extraction of private keys practically impossible
 Protection of security sensitive information (e.g. trust lists)
 Encryption of OPC UA application prevents tampering and reverse engineering
 Signatures for protected information verified in CmDongle
  Verified, tamperproof trust lists, certificate revocation lists, passwords, …
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 31
OPC-UA Application
CodeMeter
Embedded
Feature #1
Feature #2
Feature #3
Benefits of License Management in OPC UA
 Flexible licensing of functionality
 License access to features of OPC UA application
 Full access to extensive list of CodeMeter
license models (e.g. pay-per-use, rental, …)
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 32
Unified access
 Update CmDongle contents via OPC UA
 No physical access necessary
 No extra network protocols or open ports necessary
 Secure distribution through CodeMeter functions
 Secure, even without OPC UA Security (Security Profile: None)
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 33
OPC-UA Application
CodeMeter
Embedded
Feature #1
Feature #2
Feature #3
OPC UA Secure Channel
Availability
 Unified Automation SDKs
 ANSI C based OPC UA SDK
 High Performance OPC UA SDK
 Successful evaluation phase in several
research projects and demonstrators
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 34
Your major takeaways
 Thomas J. Burke:
 IIoT, IoT, Industrie 4.0 requirements for real interoperability require security and
information integration.
 OPC UA provides secure reliable interoperability and information integration
seamlessly.
 The OPC Foundation collaborates with 30+ standard organizations providing the
infrastructure for these standards organizations to have plug-and-play interoperability
and information integration.
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 35
Your major takeaways
 Oliver Winzenried:
 Security is the enabler for IoT and Industrial Internet projects
 Each device needs a tamperproof identity
 Know-how is in flexible production processes, software, technology data, and
production data – all needs to be protected against counterfeiting and tampering
 OPC UA is more than secure communication and an open standard
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 36
Deutschland: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
http://www.wibu.com
info@wibu.com
Germany: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790, 10-82961560
http://www.wibu.com
info@wibu.com
Questions?
Contact us!
December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 37

More Related Content

What's hot

OPC Unified Architecture
OPC Unified ArchitectureOPC Unified Architecture
OPC Unified ArchitectureVishwa Mohan
 
OPC UA Inside Out Part 3 - Edge Devices
OPC UA Inside Out Part 3 - Edge DevicesOPC UA Inside Out Part 3 - Edge Devices
OPC UA Inside Out Part 3 - Edge DevicesSadatulla Zishan
 
Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Hannes Tschofenig
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsReal-Time Innovations (RTI)
 
OPC UA Inside Out, Part 1 - Introduction and Playing Field
OPC UA Inside Out, Part 1 - Introduction and Playing FieldOPC UA Inside Out, Part 1 - Introduction and Playing Field
OPC UA Inside Out, Part 1 - Introduction and Playing FieldSadatulla Zishan
 
OPC UA Inside Out Part 5 - Cloud Connectivity
OPC UA Inside Out Part 5 - Cloud ConnectivityOPC UA Inside Out Part 5 - Cloud Connectivity
OPC UA Inside Out Part 5 - Cloud ConnectivitySadatulla Zishan
 
OPC UA Inside Out Part 4 - OPC Tunneller
OPC UA Inside Out Part 4 - OPC TunnellerOPC UA Inside Out Part 4 - OPC Tunneller
OPC UA Inside Out Part 4 - OPC TunnellerSadatulla Zishan
 
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPT
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPTManaging Your ROI & TCO In Automation Testing | V&V Webinar PPT
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPTSadatulla Zishan
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsHannes Tschofenig
 
FDT/DTM Introduction Webinar
FDT/DTM Introduction WebinarFDT/DTM Introduction Webinar
FDT/DTM Introduction WebinarSadatulla Zishan
 
Digital Transformation with FDT 3.0 Webinar
Digital Transformation with FDT 3.0 WebinarDigital Transformation with FDT 3.0 Webinar
Digital Transformation with FDT 3.0 WebinarSadatulla Zishan
 
Crypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsCrypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsHannes Tschofenig
 
OPC UA Inside Out Part 6 - Brownfield and Greenfield Webinar
OPC UA Inside Out Part 6 - Brownfield and Greenfield WebinarOPC UA Inside Out Part 6 - Brownfield and Greenfield Webinar
OPC UA Inside Out Part 6 - Brownfield and Greenfield WebinarSadatulla Zishan
 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper diveCisco Canada
 
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsComparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsReal-Time Innovations (RTI)
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the NetworkCisco Canada
 
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...Cisco Canada
 

What's hot (20)

OPC Unified Architecture
OPC Unified ArchitectureOPC Unified Architecture
OPC Unified Architecture
 
OPC UA Inside Out Part 3 - Edge Devices
OPC UA Inside Out Part 3 - Edge DevicesOPC UA Inside Out Part 3 - Edge Devices
OPC UA Inside Out Part 3 - Edge Devices
 
Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
OPC PPT
OPC PPTOPC PPT
OPC PPT
 
OPC UA Inside Out, Part 1 - Introduction and Playing Field
OPC UA Inside Out, Part 1 - Introduction and Playing FieldOPC UA Inside Out, Part 1 - Introduction and Playing Field
OPC UA Inside Out, Part 1 - Introduction and Playing Field
 
OPC UA Inside Out Part 5 - Cloud Connectivity
OPC UA Inside Out Part 5 - Cloud ConnectivityOPC UA Inside Out Part 5 - Cloud Connectivity
OPC UA Inside Out Part 5 - Cloud Connectivity
 
OPC UA Inside Out Part 4 - OPC Tunneller
OPC UA Inside Out Part 4 - OPC TunnellerOPC UA Inside Out Part 4 - OPC Tunneller
OPC UA Inside Out Part 4 - OPC Tunneller
 
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPT
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPTManaging Your ROI & TCO In Automation Testing | V&V Webinar PPT
Managing Your ROI & TCO In Automation Testing | V&V Webinar PPT
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
 
FDT/DTM Introduction Webinar
FDT/DTM Introduction WebinarFDT/DTM Introduction Webinar
FDT/DTM Introduction Webinar
 
Digital Transformation with FDT 3.0 Webinar
Digital Transformation with FDT 3.0 WebinarDigital Transformation with FDT 3.0 Webinar
Digital Transformation with FDT 3.0 Webinar
 
Crypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsCrypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M Processors
 
Create New Value for You - Huawei Agile Network
Create New Value for You - Huawei Agile NetworkCreate New Value for You - Huawei Agile Network
Create New Value for You - Huawei Agile Network
 
OPC UA Inside Out Part 6 - Brownfield and Greenfield Webinar
OPC UA Inside Out Part 6 - Brownfield and Greenfield WebinarOPC UA Inside Out Part 6 - Brownfield and Greenfield Webinar
OPC UA Inside Out Part 6 - Brownfield and Greenfield Webinar
 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper dive
 
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of ThingsComparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the Network
 
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
 

Viewers also liked

Zertifikate für Authetizität, Authentifizierung oder beides?
Zertifikate für Authetizität, Authentifizierung oder beides?Zertifikate für Authetizität, Authentifizierung oder beides?
Zertifikate für Authetizität, Authentifizierung oder beides?team-WIBU
 
To Bundle or To Nest? That is the Question
To Bundle or To Nest? That is the QuestionTo Bundle or To Nest? That is the Question
To Bundle or To Nest? That is the Questionteam-WIBU
 
Bündeln oder Schachteln? Das ist hier die Frage
Bündeln oder Schachteln? Das ist hier die FrageBündeln oder Schachteln? Das ist hier die Frage
Bündeln oder Schachteln? Das ist hier die Frageteam-WIBU
 
Extending OPC-UA through Architecture Flexibility, Performance, and Scalability
Extending OPC-UA through Architecture Flexibility, Performance, and ScalabilityExtending OPC-UA through Architecture Flexibility, Performance, and Scalability
Extending OPC-UA through Architecture Flexibility, Performance, and ScalabilityReal-Time Innovations (RTI)
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...team-WIBU
 
Industry 4.0 - Advantech Solutions
Industry 4.0 - Advantech SolutionsIndustry 4.0 - Advantech Solutions
Industry 4.0 - Advantech SolutionsAdvantech
 

Viewers also liked (7)

Zertifikate für Authetizität, Authentifizierung oder beides?
Zertifikate für Authetizität, Authentifizierung oder beides?Zertifikate für Authetizität, Authentifizierung oder beides?
Zertifikate für Authetizität, Authentifizierung oder beides?
 
To Bundle or To Nest? That is the Question
To Bundle or To Nest? That is the QuestionTo Bundle or To Nest? That is the Question
To Bundle or To Nest? That is the Question
 
Bündeln oder Schachteln? Das ist hier die Frage
Bündeln oder Schachteln? Das ist hier die FrageBündeln oder Schachteln? Das ist hier die Frage
Bündeln oder Schachteln? Das ist hier die Frage
 
Extending OPC-UA through Architecture Flexibility, Performance, and Scalability
Extending OPC-UA through Architecture Flexibility, Performance, and ScalabilityExtending OPC-UA through Architecture Flexibility, Performance, and Scalability
Extending OPC-UA through Architecture Flexibility, Performance, and Scalability
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
 
IIC's Top 10 Accomplishments 2016
IIC's Top 10 Accomplishments 2016IIC's Top 10 Accomplishments 2016
IIC's Top 10 Accomplishments 2016
 
Industry 4.0 - Advantech Solutions
Industry 4.0 - Advantech SolutionsIndustry 4.0 - Advantech Solutions
Industry 4.0 - Advantech Solutions
 

Similar to Smart Factory Security Solutions

Platform independent secure data exchange not only for RFID
Platform independent secure data exchange not only for RFIDPlatform independent secure data exchange not only for RFID
Platform independent secure data exchange not only for RFIDPeter Seeberg
 
CWIN17 Toulouse / Opc ua, the de facto interoperability standard for industry...
CWIN17 Toulouse / Opc ua, the de facto interoperability standard for industry...CWIN17 Toulouse / Opc ua, the de facto interoperability standard for industry...
CWIN17 Toulouse / Opc ua, the de facto interoperability standard for industry...Capgemini
 
Perfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the HackersPerfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the Hackersteam-WIBU
 
Risks of Industry 4.0 - An Information Technology Perspective, Thomas USLÄNDER
Risks of Industry 4.0 - An Information Technology Perspective, Thomas USLÄNDERRisks of Industry 4.0 - An Information Technology Perspective, Thomas USLÄNDER
Risks of Industry 4.0 - An Information Technology Perspective, Thomas USLÄNDERGlobal Risk Forum GRFDavos
 
Demystifying Industrial Security
Demystifying Industrial SecurityDemystifying Industrial Security
Demystifying Industrial Securityteam-WIBU
 
Bosch smart city_demo_260117_complete
Bosch smart city_demo_260117_completeBosch smart city_demo_260117_complete
Bosch smart city_demo_260117_completeAgoria
 
Businessday okt 2016 - Awingu
Businessday okt 2016 - AwinguBusinessday okt 2016 - Awingu
Businessday okt 2016 - AwinguMarketing Team
 
Real World IoT Architecture Use Cases
Real World IoT Architecture Use CasesReal World IoT Architecture Use Cases
Real World IoT Architecture Use CasesEurotech
 
Smart Factories Redefine Security Paradigms
Smart Factories Redefine Security ParadigmsSmart Factories Redefine Security Paradigms
Smart Factories Redefine Security Paradigmsteam-WIBU
 
Oracle IoT Cloud Service - First practical experience
Oracle IoT Cloud Service - First practical experience Oracle IoT Cloud Service - First practical experience
Oracle IoT Cloud Service - First practical experience OPITZ CONSULTING Deutschland
 
How the Bosch Group is making use of OSGi for IoT - Kai Hackbarth
How the Bosch Group is making use of OSGi for IoT - Kai HackbarthHow the Bosch Group is making use of OSGi for IoT - Kai Hackbarth
How the Bosch Group is making use of OSGi for IoT - Kai Hackbarthmfrancis
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizonteam-WIBU
 
Opc e book_2021_3rd_edition_lay06
Opc e book_2021_3rd_edition_lay06Opc e book_2021_3rd_edition_lay06
Opc e book_2021_3rd_edition_lay06Tiago Oliveira
 
FIWARE Global Summit - Implementing OPC‐UA with FIWARE Orion Context Broker
FIWARE Global Summit - Implementing OPC‐UA with FIWARE Orion Context BrokerFIWARE Global Summit - Implementing OPC‐UA with FIWARE Orion Context Broker
FIWARE Global Summit - Implementing OPC‐UA with FIWARE Orion Context BrokerFIWARE
 
FIWARE for OPC UA Robots (The i4Q Use Case) - Gabriele De Luca.pptx
FIWARE for OPC UA Robots (The i4Q Use Case) - Gabriele De Luca.pptxFIWARE for OPC UA Robots (The i4Q Use Case) - Gabriele De Luca.pptx
FIWARE for OPC UA Robots (The i4Q Use Case) - Gabriele De Luca.pptxFIWARE
 
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersCyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersGerd Meier zu Koecker
 
Secure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserSecure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserM2M Alliance e.V.
 

Similar to Smart Factory Security Solutions (20)

Platform independent secure data exchange not only for RFID
Platform independent secure data exchange not only for RFIDPlatform independent secure data exchange not only for RFID
Platform independent secure data exchange not only for RFID
 
CWIN17 Toulouse / Opc ua, the de facto interoperability standard for industry...
CWIN17 Toulouse / Opc ua, the de facto interoperability standard for industry...CWIN17 Toulouse / Opc ua, the de facto interoperability standard for industry...
CWIN17 Toulouse / Opc ua, the de facto interoperability standard for industry...
 
Perfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the HackersPerfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the Hackers
 
Risks of Industry 4.0 - An Information Technology Perspective, Thomas USLÄNDER
Risks of Industry 4.0 - An Information Technology Perspective, Thomas USLÄNDERRisks of Industry 4.0 - An Information Technology Perspective, Thomas USLÄNDER
Risks of Industry 4.0 - An Information Technology Perspective, Thomas USLÄNDER
 
IIoT, Security and Ethernet Design - Peter Brown
IIoT, Security and Ethernet Design - Peter BrownIIoT, Security and Ethernet Design - Peter Brown
IIoT, Security and Ethernet Design - Peter Brown
 
Demystifying Industrial Security
Demystifying Industrial SecurityDemystifying Industrial Security
Demystifying Industrial Security
 
Bosch smart city_demo_260117_complete
Bosch smart city_demo_260117_completeBosch smart city_demo_260117_complete
Bosch smart city_demo_260117_complete
 
Businessday okt 2016 - Awingu
Businessday okt 2016 - AwinguBusinessday okt 2016 - Awingu
Businessday okt 2016 - Awingu
 
Real World IoT Architecture Use Cases
Real World IoT Architecture Use CasesReal World IoT Architecture Use Cases
Real World IoT Architecture Use Cases
 
Smart Factories Redefine Security Paradigms
Smart Factories Redefine Security ParadigmsSmart Factories Redefine Security Paradigms
Smart Factories Redefine Security Paradigms
 
Oracle IoT Cloud Service - First practical experience
Oracle IoT Cloud Service - First practical experience Oracle IoT Cloud Service - First practical experience
Oracle IoT Cloud Service - First practical experience
 
How the Bosch Group is making use of OSGi for IoT - Kai Hackbarth
How the Bosch Group is making use of OSGi for IoT - Kai HackbarthHow the Bosch Group is making use of OSGi for IoT - Kai Hackbarth
How the Bosch Group is making use of OSGi for IoT - Kai Hackbarth
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizon
 
Opc e book_2021_3rd_edition_lay06
Opc e book_2021_3rd_edition_lay06Opc e book_2021_3rd_edition_lay06
Opc e book_2021_3rd_edition_lay06
 
FIWARE Global Summit - Implementing OPC‐UA with FIWARE Orion Context Broker
FIWARE Global Summit - Implementing OPC‐UA with FIWARE Orion Context BrokerFIWARE Global Summit - Implementing OPC‐UA with FIWARE Orion Context Broker
FIWARE Global Summit - Implementing OPC‐UA with FIWARE Orion Context Broker
 
Profibus system engineering and monitoring - Andy Verwer
Profibus system engineering and monitoring - Andy VerwerProfibus system engineering and monitoring - Andy Verwer
Profibus system engineering and monitoring - Andy Verwer
 
FIWARE for OPC UA Robots (The i4Q Use Case) - Gabriele De Luca.pptx
FIWARE for OPC UA Robots (The i4Q Use Case) - Gabriele De Luca.pptxFIWARE for OPC UA Robots (The i4Q Use Case) - Gabriele De Luca.pptx
FIWARE for OPC UA Robots (The i4Q Use Case) - Gabriele De Luca.pptx
 
Industry 4 network design and security - Peter Brown
Industry 4 network design and security - Peter BrownIndustry 4 network design and security - Peter Brown
Industry 4 network design and security - Peter Brown
 
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersCyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
 
Secure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserSecure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA Teaser
 

More from team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Securityteam-WIBU
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Togetherteam-WIBU
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basicsteam-WIBU
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuitätteam-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityteam-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenariosteam-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practicesteam-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses Moreteam-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edgeteam-WIBU
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applicationsteam-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magicteam-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisiveteam-WIBU
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesteam-WIBU
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licensesteam-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetiteteam-WIBU
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxteam-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solutionteam-WIBU
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsteam-WIBU
 

More from team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
 

Recently uploaded

Gaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service GayaGaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service Gayasrsj9000
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...nagunakhan
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...anilsa9823
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
Thane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsThane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsPooja Nehwal
 
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...Pooja Nehwal
 
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...Suhani Kapoor
 
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...ur8mqw8e
 
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...nagunakhan
 
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查awo24iot
 
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaDubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaUnited Arab Emirates
 
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...Pooja Nehwal
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...Pooja Nehwal
 
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | DelhiFULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhisoniya singh
 
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Pooja Nehwal
 
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311  Call Girls in Thane , Independent Escort Service ThanePallawi 9167673311  Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service ThanePooja Nehwal
 

Recently uploaded (20)

Gaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service GayaGaya Call Girls #9907093804 Contact Number Escorts Service Gaya
Gaya Call Girls #9907093804 Contact Number Escorts Service Gaya
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
 
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
Russian Escorts in lucknow 💗 9719455033 💥 Lovely Lasses: Radiant Beauties Shi...
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
Thane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsThane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call Girls
 
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
 
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
VIP Call Girls Hitech City ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With R...
 
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
 
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
Russian Call Girls In South Delhi Delhi 9711199012 💋✔💕😘 Independent Escorts D...
 
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
 
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaDubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
 
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
 
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | DelhiFULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
 
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
 
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311  Call Girls in Thane , Independent Escort Service ThanePallawi 9167673311  Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
 

Smart Factory Security Solutions

  • 1. The Rise of Smart Factories: Use Cases – Essentials – Security Tools Oliver Winzenried CEO WIBU-SYSTEMS AG oliver.winzenried@wibu.com OPC UA Security: Native and Add-on Solutions December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 1
  • 2. Smart Factory Projects featuring Wibu-Systems  OpSIT: Smart Items Technologies in Healthcare  SesaOPC: SmartFactoryKL  Secure Plug & Work: Fraunhofer IOSB  IUNO: German reference project for Cyber Security in Industrie 4.0  Large consortium: 14 companies and 7 research institutes  Four large Use Cases (Testbeds) December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 2
  • 3. OpSIT: Smart Items Technologies in Healthcare December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 3
  • 4. OpSIT: Smart Items Technologies in Healthcare  OpSIT: Optimal use of smart items technologies in healthcare  Using an Intel Edison SBC as a Gateway for wireless low-power sensors  Wireless sensor data is sampled from Edison   Unprotected data is sampled and processed locally  Sampled data is provided via OPC UA in hospital network   Secure access to sensitive data  Whole system (application & cryptographic material) stored on a CodeMeter microSD card December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 4
  • 5. Technology Initiative SmartFactoryKL December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 5 Cyber Physical Systems 2002 2005 2015 Smart Home Internet of Things 2011 10-year anniversary Launching: CONFIGURATION OF THE VISION INDUSTRIE 4.0 More than 10 years… www.SmartFactory.de
  • 6. Technology Initiative SmartFactoryKL December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 6
  • 7. Technology Initiative SmartFactoryKL December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 7 Topics and content: • Cyber-Physical Systems • Vertical integration via OPC-UA • Decentralised process control via RFID • Semantical product and object memory model • Resource protection through context-enabled M2M communication • Augmented-Reality based human-machine interaction Wibu-Systems contribution • Secure signed data in RFID • Secure key storage and certificates for OPC-UA • Security components from sensor to cloud
  • 8. Project Secure Plug & Work  Plug & Work of production components using open standards  Secure authentication and configuration of production components and trusted communication  Wibu-Systems contribution CodeMeter Protection, Licensing, Security, OPC UA integration December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 8
  • 9. Secure Plug and Work: Secure networking in Industry 4.0 December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 9 Firewall PC/Über- geordnete IT Ethernet Control Room MAG Specht Milling Cutter Schunk Powerball
  • 10. Component Overview December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 10 Firewall Component nTool MagazineSpindle IPC (PLC) Machine Control PC/MES IT CAN Ethernet Schunk PLC ProfiNet
  • 11. OPC UA Communication Added December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 11 Firewall Component nTool MagazineSpindle IPC (PLC) Machine Control OPC-UA- Server OPC-UA- Server PC/MES IT UA Server CAN Ethernet Schunk PLC OPC-UA- Server ProfiNet
  • 12. Security in “Secure Plug & Work” December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 12 Gateway (Switch for secure connection, gateway for unsecured connection, aggregating UA-Server) Firewall Component nTool MagazineSpindle IPC (PLC) Machine Control OPC-UA- Server Security OPC-UA- Server Security OPC-UA- Server PC/MES IT UA Server CAN Ethernet Schunk PLC OPC-UA- Server Security ProfiNet
  • 13. IUNO: Reference Project Security in Industrie 4.0 December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 13  Four large Use Cases (Testbeds)  Collect all requirements and solutions in a tool box  Implementation Transfer to Industry! Secure Connectivity Visual security control room for a production scenario Secure Processes Customer individual production Secure Services Remote access / trusted partners Secure Data Technology market place for process data
  • 14. IUNO: Reference Project for Cyber Security in Industrie 4.0 December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 14
  • 15. IUNO WP 1 – Customized Production (HOMAG) December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 15
  • 16. IUNO WP 1 – Customized Production  Goal: Definite and secure identification throughout the production process  Identification is complicated by  Processing, production environment (e.g., dust, humidity,…), multi-domains  Examples  Painting or cutting of components  Challenges  Secure application of identification material to components  Prevention of product piracy (counterfeits)  Establishing cross-domain trust in identification process December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 16
  • 17. IUNO WP 2 – Marketplace for technology data (TRUMPF) December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 17
  • 18. IUNO WP 2 – Marketplace for technology data (TRUMPF)  Goal: Easy and secure tradeable technology data (machine configurations)  Status Quo  Basic technology data is included in the machine  Advanced technology data is bought on a one-time basis  Technology data is not protectet against theft at all  Challenges  Machines are not a single, easily controllable entity  Technology data need to be flexible  Industrial requirements for availablity and reliability December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 18
  • 19. IUNO WP 3 – Remote maintenance (Bosch) December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 19
  • 20. IUNO WP 3 – Remote maintenance (Bosch)  Goal  Unified platform for remote maintenance of machines  Status Quo  Diverse landscape of remote maintenance solutions  Challenges  Secure and unified identification of all participating parties  Platform, machines, maintainers, service providers, contracting bodies, …  Secure routing of connections  One configuration for network equipment suffices for all machines on the shop floor December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 20
  • 21. How to Implement Security in Connected Products Working principles of CodeMeter December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories OPC UA typical architectures CodeMeter integration in OPC UA 21
  • 22. Wibu-Systems Technologies and Solutions December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 22 Software Integration Back Office Integration Protection Suite: Ax/Ex/Ix-Protector CodeMeter License Central  CodeMeter®  Secure Key Storage (Hardware / Software)  De-/Encryption (AES, ECC, RSA)  Flexible License Models  Software Integration  Automatic Code Protection / API  Secure Boot / OPC UA  Back Office Integration  Key and Certificate Deployment  License Deployment  License Administration
  • 23. OPC UA offers excellent security at protocol level  Secure Channel Authentication  X.509 certificates  RSA public/private keys  Trust management via Public Key Infrastructure  Secure Channel Encryption  Symmetric Encryption using Advanced Encryption Standard (AES) 128/256bit keys   Using OPC UA provides high security in transit December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 23 Picture: OPC Foundation
  • 24. OPC UA offers excellent security  Widely supported:  Plattform Industrie 4.0 in Germany  BSI Study on OPC UA standard https://opcfoundation.org/security/  IIC support  Chinese Alliance Industrial Internet December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 24
  • 25. OPC UA offers endpoint security  The IIoT Landscape: Where are Endpoints? December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 25 EP EP EP EP EP EP EP 25
  • 26. OPC UA offers endpoint security  Access Control  Monitoring & Analysis  Secure Configuration & Management  Integrity Protection  Identity  Root of Trust  Physical Security (with CM)  Data Protection  Security Model and Policy December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 26
  • 27. Pervasive security extends beyond the protocol layer  Security of endpoints is equally important  Vulnerabilities in operating systems  Vulnerabilities in software libraries  Vulnerabilities in applications  Consequences of a compromised endpoint can be severe  Theft of cryptographic material (authentication)  Manipulation of configuration data (trust lists, certificate revocation lists)  Manipulation of applications (producing incorrect information) December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 27
  • 28. Pervasive security needs additional effort  General setup for OPC UA servers and clients  Private keys are stored on the hard disk  Trust lists and certificate revocation lists are stored on the hard disk  Applications are not protected against tampering  Successful attack to endpoints leads to  Further penetration of infrastructure  Loss of functionality or reliability  Loss of intellectual property December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 28
  • 29. OPC UA SDK, CmEmbedded and CmDongle – a perfect match  CmEmbedded  Small, modular runtime for embedded systems  Portable to a variety of operating systems  Provides subset of CodeMeter API  CmDongle  Smart card chips from Infineon Technologies (EAL 5+)  Secure storage of cryptographic material  Secure execution of crypto primitives (encryption/signature)  Variety of form factors December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 29
  • 30. OPC UA SDK, CmEmbedded and CmDongle – a perfect match  Integration of CodeMeter Embedded in OPC UA SDK  Storage and processing of all security sensitive information in the smart card chip  Effortless development of applications with hardware security  Seamless migration between conventional software security and hardware security  Access to protection, licensing, and security features of CodeMeter December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 30 CodeMeter Embedded Development OPC-UA Application CodeMeter Embedded
  • 31. Enhancing security in OPC UA  Protection of private keys in CmDongle  Implementation of asymmetric encryption and signature algorithm according to OPC UA security profiles  Currently RSA keys up to 2048bit (ECC 224 Bit)  All processing done in CmDongle  Extraction of private keys practically impossible  Protection of security sensitive information (e.g. trust lists)  Encryption of OPC UA application prevents tampering and reverse engineering  Signatures for protected information verified in CmDongle   Verified, tamperproof trust lists, certificate revocation lists, passwords, … December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 31
  • 32. OPC-UA Application CodeMeter Embedded Feature #1 Feature #2 Feature #3 Benefits of License Management in OPC UA  Flexible licensing of functionality  License access to features of OPC UA application  Full access to extensive list of CodeMeter license models (e.g. pay-per-use, rental, …) December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 32
  • 33. Unified access  Update CmDongle contents via OPC UA  No physical access necessary  No extra network protocols or open ports necessary  Secure distribution through CodeMeter functions  Secure, even without OPC UA Security (Security Profile: None) December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 33 OPC-UA Application CodeMeter Embedded Feature #1 Feature #2 Feature #3 OPC UA Secure Channel
  • 34. Availability  Unified Automation SDKs  ANSI C based OPC UA SDK  High Performance OPC UA SDK  Successful evaluation phase in several research projects and demonstrators December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 34
  • 35. Your major takeaways  Thomas J. Burke:  IIoT, IoT, Industrie 4.0 requirements for real interoperability require security and information integration.  OPC UA provides secure reliable interoperability and information integration seamlessly.  The OPC Foundation collaborates with 30+ standard organizations providing the infrastructure for these standards organizations to have plug-and-play interoperability and information integration. December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 35
  • 36. Your major takeaways  Oliver Winzenried:  Security is the enabler for IoT and Industrial Internet projects  Each device needs a tamperproof identity  Know-how is in flexible production processes, software, technology data, and production data – all needs to be protected against counterfeiting and tampering  OPC UA is more than secure communication and an open standard December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 36
  • 37. Deutschland: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 http://www.wibu.com info@wibu.com Germany: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790, 10-82961560 http://www.wibu.com info@wibu.com Questions? Contact us! December 13, 2016 © WIBU-SYSTEMS AG 2016 - OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories 37

Editor's Notes

  1. Verschiedene Maschinen kommunizieren untereinander und mit übergeordneten Leitsystemen
  2. Der Roboterarm besteht aus einer SPS und mehreren intelligenten Gelenkservos Die Fräsmaschine besteht aus einem Steuerrechner und kann mit verschiedenen Anbauteilen ausgerüstet werden Alle Einzelkomponenten müssen bei Inbetriebnahme und im Servicefall am System softwareseitig konfiguriert werden. Beispiel: Kalibrierungsdaten des Arms, Qualitätsdaten des Kugelgewindetriebes, Motorparameter der Spindel, …
  3. Einbringen einer herstellerübergreifenden Kommunikationsschicht basierend auf OPC UA und Automation ML Anlagenmodellen. Das System konfiguriert sich jetzt softwareseitig selbst. Komponenten melden ihre eigene Konfiguration und Messdaten an ihre Steuerung. Betriebsdaten wie Betriebsstunden, Temperaturverläufe, Drehzahlen werden erfasst und über OPC UA zur Verfügung gestellt
  4. Herausforderung: Der Maschinenhersteller und der Anlagenbetreiber müssen sicherstellen, das die gemeldeten Daten aus vertrauenswürdiger Quelle kommen. Aufgezeichnete Betriebsdaten dürfen nur in befugte Hände gelangen. Wibu hat seine CodeMeter Technologie in den OPC UA Stack integriert. Dieser läuft hier auf unterschiedlichen Komponenten, stellt jedoch zusammen mit OPC UA ein durchgängiges Konzept für die Datensicherheit und gegenseitige Vertrauensstellungen zur Verfügung.
  5. Diverse landscape of remote maintenance solutions Different requirements for software, hardware and infrastructure Keeps IT busy with configuration of network equipment Conflicts with security requirements on shop floor (e.g., open ports, internet connection)