Secured SECS/GEM: A Security Mechanism for M2M Communication in Industry 4.0 Ecosystem

被引:0
|
作者
Jaisan, Ashish [1 ]
Manickam, Selvakumar [1 ]
Laghari, Shams A. [1 ]
Ul Rehman, Shafiq [1 ]
Karuppayah, Shankar [1 ]
机构
[1] Univ Sains Malaysia USM, Natl Adv IPv6 Ctr NAv6, George Town, Malaysia
关键词
SECS/GEM; HSMS; cybersecurity; industry-4.0; machine-to-machine communication; AES-GCM;
D O I
10.14569/IJACSA.2021.0120828
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The manufacturing industry has been revolutionized by Industry 4.0, vastly improving the manufacturing process, increasing production quality and capacity. Machine-to-Machine (M2M) communication protocols were developed to strengthen and bind this ecosystem by allowing machines to communicate with each other. The SECS/GEM protocol is at the heart of the manufacturing industry, thriving as a communication protocol and control system for years. It is a manufacturing equipment protocol used for equipment-host data communications. However, it is not without drawbacks, despite being a widely adopted communication protocol used by leading industries. SECS/GEM does not offer any type of security features as it was designed to work in a closed network. Such shortcomings in the protocol will allow attackers to steal secrets such as manufacturing processes by looking at recipes, perform reconnaissance prior to sabotage attempts, and can have severe implications on the entire industry. This paper proposes a mechanism to secure SECS/GEM data messages with AES-GCM encryption and evaluate the performance with the standard SECS/GEM protocol. The results from our evaluations showed that the proposed mechanism achieves data confidentiality and authenticity with a negligible overhead of 0.8 milliseconds and 0.37 milliseconds when sending and receiving a message, respectively, compared to the standard protocol.
引用
收藏
页码:241 / 250
页数:10
相关论文
共 50 条
  • [1] Cyberattacks and Vociferous Implications on SECS/GEM Communications in Industry 4.0 Ecosystem
    Laghari, Shams A.
    Manickam, Selvakumar
    Karuppayah, Shankar
    Al-Ani, Ayman
    Ul Rehman, Shafiq
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (07) : 329 - 336
  • [2] M2M Security Threat and Security Mechanism Research
    Nie, Xiao
    Zhai, Xiaobing
    [J]. 2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 906 - 909
  • [3] Application-Layer Security Mechanism for M2M communication over SMS
    Gligoric, Nenad
    Dimcic, Tomislav
    Drajic, Dejan
    Krco, Srdjan
    Chu, Nhon
    [J]. 2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 5 - 8
  • [4] M2M – Internet of Things – Web of Things – Industry 4.0
    Johann Sailer
    [J]. e & i Elektrotechnik und Informationstechnik, 2014, 131 (1) : 3 - 4
  • [5] M2M - Internet of Things - Web of Things Industry 4.0
    Sailer, J.
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2014, 131 (01): : 3 - 4
  • [6] M2M Communication
    Malleck, H.
    Mecklenbruker, C.
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2014, 131 (01): : 1 - 2
  • [7] M2M Communication
    Helmut Malleck
    Christoph Mecklenbräuker
    [J]. e & i Elektrotechnik und Informationstechnik, 2014, 131 (1) : 1 - 2
  • [8] SECS/GEMsec: A Mechanism for Detection and Prevention of Cyber-Attacks on SECS/GEM Communications in Industry 4.0 Landscape
    Laghari, Shams Ul Arfeen
    Manickam, Selvakumar
    Al-Ani, Ayman Khallel
    Ul Rehman, Shafiq
    Karuppayah, Shankar
    [J]. IEEE ACCESS, 2021, 9 : 154380 - 154394
  • [9] Low Delay and Secure M2M Communication Mechanism for eHealthcare
    Saleem, Kashif
    Derhab, Abdelouahid
    Al-Muhtadi, Jalal
    [J]. 2014 IEEE 16TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2014, : 105 - 110
  • [10] TRUST IN M2M COMMUNICATION
    Cha, Inhyok
    Shah, Yogendra
    Schmidt, Andreas U.
    Leicher, Andreas
    Meyerstein, Michael Victor
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2009, 4 (03): : 69 - 75