Browsing by Author "Tedeschi, Stefano"
Now showing 1 - 9 of 9
Results Per Page
Sort Options
Item Open Access A Design Approach to IoT Endpoint Security for Production Machinery Monitoring(Cranfield University, 2019-05-22 16:09) Tedeschi, Stefano; Emmanouilidis, Christos; Mehnen, Jörn; Roy, RajkumarThe Internet of Things (IoT) has significant potential in upgrading legacy production machinery with monitoring capabilities to unlock new capabilities and bring economic benefits. However, the introduction of IoT at the shop floor layer exposes it to additional security risks with potentially significant adverse operational impact. This project addresses such fundamental new risks at their root by introducing a novel endpoint security by design approach. The approach is implemented on a widely applicable production machinery monitoring application by introducing real time adaptation features for IoT device security through subsystem isolation and a dedicated lightweight authentication protocol.Item Open Access A cost estimation approach for IoT modular architectures implementation in legacy systems(Elsevier, 2018-02-08) Tedeschi, Stefano; Emmanouilidis, Christos; Erkoyuncu, John Ahmet; Rodrigues, Duarte Polonia; Roy, Rajkumar; Starr, AndrewIndustry 4.0 has encouraged manufacturing organisations to update their systems and processes by implementing Internet of Things (IoT) technology in legacy systems to provide new services such as autonomous condition monitoring and remote maintenance. However, there is still no literature that guides in realizing the advantages and disadvantages of the fourth industry revolution in terms of complexity, data security, and cost. This paper lays the foundation for the creation of an innovative conceptual model to estimate the cost for implementation of new architectures for legacy systems. The proposed approach considers aspects that impact the cost of different IoT architectures such as: complexity, data gathering and sharing protocols, and cyber security. The authors suggest a further implementation of the cost model, in order to guide the organisations in the most cost-effective architecture for modernisation of their legacy systems.Item Open Access A design approach to IoT endpoint security for production machinery monitoring(MDPI, 2019-05-16) Tedeschi, Stefano; Emmanouilidis, Christos; Mehnen, Jorn; Roy, RajkumarThe Internet of Things (IoT) has significant potential in upgrading legacy production machinery with monitoring capabilities to unlock new capabilities and bring economic benefits. However, the introduction of IoT at the shop floor layer exposes it to additional security risks with potentially significant adverse operational impact. This article addresses such fundamental new risks at their root by introducing a novel endpoint security-by-design approach. The approach is implemented on a widely applicable production-machinery-monitoring application by introducing real-time adaptation features for IoT device security through subsystem isolation and a dedicated lightweight authentication protocol. This paper establishes a novel viewpoint for the understanding of IoT endpoint security risks and relevant mitigation strategies and opens a new space of risk-averse designs that enable IoT benefits, while shielding operational integrity in industrial environments.Item Open Access Exploiting Extended Reality under the Manufacturing as a Service paradigm(Elsevier, 2024-03-20) Nicoletti, Letizia; Solina, Vittorio; Amin, Kandarp; Lessi, Christina; McHard, Paul; Qiu, Renxi; Tedeschi, StefanoThe advent of new technologies and concepts such as Extended Reality (XR), Cloud Manufacturing, Digital Twin, Industrial Internet of Things is completely changing the manufacturing landscape. Innovative digital tools are available to increase the competitiveness and efficiency of companies. The XR can support the Smart Operator in production, maintenance and training activities. Similarly, Manufacturing as a Service, which is a variation of Cloud Manufacturing, can make corporate architectural systems more flexible and scalable. In this paper, some preliminary results relating to the European 5G-ERA project and the synergistic work that the companies CAL-TEK, TWI and HAL Robotics are conducting is shown. An XR-oriented architecture is proposed, whose usefulness is emphasized by the use of the MaaS concept, and the implementation of a Mixed Reality application is shown, to support an on-site operator. Future developments concern the implementation of a Virtual Reality application for the off-site operator, and the use of the 5G-ERA middleware to exploit the potential of the MaaS paradigm.Item Open Access Internet of Things - Enabled visual analytics for linked maintenance and product lifecycle management(Elsevier, 2018-09-06) Emmanouilidis, Christos; Bertoncelj, L.; Bevilacqua, M.; Tedeschi, Stefano; Ruiz Carcel, CristobalWhen closed loop product lifecycle management was first introduced, much effort focused on establishing ways to communicate data between different lifecycle phase activities. The concept of a smart product, able to communicate its own identity and status, had a key role to play to this end. Such a concept has further matured, benefiting from internet things-enabled product lifecycle management advancements. Product data exchanges can now be brought closer to the point of end use consumption, enabling users to become more proactive actors within the product lifecycle management process. This paper presents a conceptual approach and a pilot implementation of how this can be achieved by superimposing middle of life relevant product information to beginning of life product views, such as a 3D product CAD model. In this way, linked maintenance data and knowledge become visual features of a product design representation, facilitating a user’s understanding of middle-of life concepts, such as occurrence of failure modes. The proposed approach can be particularly useful when dealing with product data streams as a natural visual analytics add-in to closed loop product lifecycle management.Item Open Access New threats for old manufacturing problems: Secure IoT-enabled monitoring of legacy production machinery(Springer, 2017-08-31) Tedeschi, Stefano; Emmanouilidis, Christos; Farnsworth, Michael; Mehnen, Jorn; Roy, RajkumarThe digitization of manufacturing through the introduction of Industrie 4.0 technologies creates additional business opportunities and technical challenges. The integration of such technologies on legacy production machinery can upgrade them to become part of the digital and smart manufacturing environment. A typical example is that of industrial monitoring and maintenance, which can benefit from internet of things (IoT) solutions. This paper presents the development of an-IoT-enabled monitoring solution for machine tools as part of a remote maintenance approach. While the technical challenges pertaining to the development and integration of such solutions in a manufacturing environment have been the subject of relevant research in the literature, the corresponding new security challenges arising from the introduction of such technologies have not received equal attention. Failure to adequately handle such issues is a key barrier to the adoption of such solutions by industry. This paper aims to assess and classify the security aspects of integrating IoT technology with monitoring systems in manufacturing environments and propose a systematic view of relevant vulnerabilities and threats by taking an IoT architecture point of view. Our analysis has led to proposing a novel modular approach for secure IoT-enabled monitoring for legacy production machinery. The introduced approach is implemented on a case study of machine tool monitoring, highlighting key findings and issues for further research.Item Open Access Secure IoT Devices for the Maintenance of Machine Tools(Elsevier, 2017-03-02) Tedeschi, Stefano; Mehen, Jorn; Tapoglou, N.; Roy, RajkumarThrough the Internet of Things (IoT) interaction between objects becomes possible in a way we have never seen before. With the advent of IoT and its introduction into almost all aspects of life, safety and security of IoT devices has to be considered for their whole life cycle. This concerns not only the large amounts of data that needs to be exchanged securely but also the design of the hardware of the devices themselves. Security has to be designed right from the start into IoT devices rather than added on later. This paper will introduce a global strategy for secure Design for IoT which includes: • Safe solutions for environments with rich information • Guarantee that the devices are functioning as intended by the manufacturer and are not damaged • Life cycle security across devices, networks and data centers • Support for industry standards and interoperability of devices • Ability to solve the challenges of the information link • Secure Clouds for traditional systems. This paper lays the foundation for the creation of a safe remote monitoring system for machine tools through IoT devices and analyses the critical issues focusing on the manufacturing environment.Item Open Access Security aspects in cloud based condition monitoring of machine tools(Elsevier, 2015-10-27) Tedeschi, Stefano; Mehnen, Jorn; Tapoglou, Nikolaos; Roy, RajkumarIn the modern competitive environments companies must have rapid production systems that are able to deliver parts that satisfy highest quality standards. Companies have also an increased need for advanced machines equipped with the latest technologies in maintenance to avoid any reduction or interruption of production. Eminent therefore is the need to monitor the health status of the manufacturing equipment in real time and thus try to develop diagnostic technologies for machine tools. This paper lays the foundation for the creation of a safe remote monitoring system for machine tools using a Cloud environment for communication between the customer and the maintenance service company. Cloud technology provides a convenient means for accessing maintenance data anywhere in the world accessible through simple devices such as PC, tablets or smartphones. In this context the safety aspects of a Cloud system for remote monitoring of machine tools becomes crucial and is, thus the focus of this paperItem Open Access A systematic design approach to IOT security for legacy production machinery(Cranfield University, 2020-03) Tedeschi, Stefano; Emmanouilidis, Christos; Salonitis, Konstantinos; Mehnen, JornThe Internet of Things (IoT) is an emerging topic of rapidly growing technical importance for the industry. The aim is to connect objects with unique identifiers and combine them with internet connectivity for data transfer. This advanced connectivity has significant potential in the workshop-level upgrade of existing legacy equipment to unlock new features and economic benefits especially for monitoring and control applications However, the introduction of the Industrial Internet of Things (IIoT) brings new additional security and integrity risks for the industrial environment in the form of network, communication, software and hardware security risks. This thesis addresses such fundamental new risks at their root by introducing a novel approach for IoT-enabled monitoring of legacy production machinery, which consist of five stages, incorporating security by design features. The first two phases of this novel approach aim to analyse current monitoring practices and security and vulnerability issues related to the application domain. The proposed approach applies three more stages which make the domain-relevant analysis to become application specific. These include a detailed model of the application context on legacy production machinery monitoring, together with its interfaces and functionality, implementing threat mitigations combined with a new modular IoT DAQ unit mechanism, validated by functional tests against Denial of Service (DoS) and clone attacks. Thus, to be effective, the design approach is further developed with application-specific functionality. This research demonstrates an instance of this innovative riskaverse design thinking through introducing an IoT device design which is applicable to a wide set of industrial scenarios. A practical showcase example of a specific implementation of the generic IoT design is given through a concrete industrial application that upgrades existing legacy machine tool equipment. The reported work establishes a novel viewpoint for the understanding of IoT security risks and their consequent mitigation, opening a new space of riskaverse designs that can bring significant confidence in data, safety, and security of IoT-enabled industry.