Challenges in Anti-Counterfeiting of Cyber-Physical Systems

Autor: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier
Jazyk: angličtina
Rok vydání: 2015
Předmět:
DOI: 10.5281/zenodo.1338311
Popis: This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in this paper.
{"references":["Mittelstaedt, A.; Strategisches IP-Management - mehr als nur Patente.\nGabler Verlag, Wiesbaden, 2009","World Intellectual Property Organization (WIPO); Understanding\nindustrial property. WIPO publication no. 895(E), Geneva, 2008","Herzog, O.; Schildhauer, T. (Hrsg.): acatech DISKUTIERT. Intelligente\nObjekte: Technische Gestaltung – Wirtschaftliche Verwertung –\nGesellschaftliche Wirkung. Springer Verlag, Berlin, 2009","Damm, W.; Achatz, R.; Beetz, K.; Broy, M.; Grimm, K.; Liggesmeyer,\nP.: Nationale Roadmap Embedded Systems. In: Broy, M. (Hrsg.):\nCyber-Physical Systems – Innovation durch softwareintensive\neingebettete Systeme. acatech DISKUTIERT, Springer Verlag, Berlin,\n2010","Schäfer, W.; Wehrheim, H.: The Challenges of Building Advanced\nMechatronic Systems. In FOSE ´07: 2007 Future of Software\nEngineering, pp. 72-84, IEEE Computer Society, 2007","Broy, M. (Hrsg.): Cyber-Physical Systems – Innovation durch\nsoftwareintensive eingebettete Systeme. acatech DISKUTIERT,\nSpringer Verlag, Berlin, 2010","Gausemeier, J.; Tschirner, C.; Dumitrescu, R.: Der Weg zu Intelligenten\nTechnischen Systemen. Industrie Management, GITO Verlag, 1/2013.","Verband Deutscher Maschinen- und Anlagenbau e.V. (VDMA): Studie\nProduktpiraterie 2014","World Economic Forum; McKinsey & Company: Risk and\nResponsibility in a Hyperconnected World – Insight Report, 2014\n[10] Gausemeier, J.; Glatz, R.; Lindemann, U. (Hrsg): Präventiver\nProduktschutz – Leitfaden und Anwendungsbeispiele. Carl Hanser\nVerlag, München, 2012\n[11] Kokoschka, M.: Verfahren zur Konzipierung imitationsgeschützter\nProdukte und Produktionssysteme. Dissertation, Universität Paderborn,\nPaderborn, 2013\n[12] Fuchs, H.J. (HRSG.): Piraten, Fälscher und Kopierer – Strategien und\nInstrumente zum Schutz geistigen Eigentums in der Volksrepublik\nChina, Betriebswirtschaftlicher Verlag Dr. Th. Gabler, Wiesbaden, 2006\n[13] Neemann, C. W.: Methodik zum Schutz gegen Produktimitationen,\nDissertation Fraun-hofer Institut für Produktionstechnologie IPT,\nAachen, Shaker Verlag, Band 13/2007, Aachen, 2007\n[14] Jacobs, L.; Samli, A. C.; Jedlik, T.: The Nightmare of International\nProduct Piracy – Exploring Defensive Strategies. In: Industrial\nMarketing Management 30, S. 499-509, North-Holland Publishing, 2001\n[15] Fraunhofer Institute for Applied and Integrated Security;\nhttp://www.aisec.fraunhofer.de/de/fields-of-expertise/productprotection/\npep-protecting-electronic-products.html, March 2015"]}
Databáze: OpenAIRE