Research Outputs

2021 2021 2020 2020 2019 2019 2018 2018 2017 2017 0.0 0.0 0.5 0.5 1.0 1.0 1.5 1.5 2.0 2.0 2.5 2.5 3.0 3.0 3.5 3.5 4.0 4.0
Now showing 1 - 10 of 13
  • Publication
    Towards trustworthy end-to-end communication in industry 4.0
    (IEEE, 2017) ; ; ; ;
    Matischek, Rainer 
    ;
    Schmittner, Christoph 
    ;
    Mantas, Georgios 
    ;
    Thron, Mario 
    ;
    Delsing, Jerker 
    Industry 4.0 considers integration of IT and control systems with physical objects, software, sensors and connectivity in order to optimize manufacturing processes. It provides advanced functionalities in control and communication for an infrastructure that handles multiple tasks in various locations automatically. Automatic actions require information from trustworthy sources. Thus, this work is focused on how to ensure trustworthy communication from the edge devices to the backend infrastructure. We derive a meta-model based on RAMI 4.0, which is used to describe an end-to-end communication use case for an Industry 4.0 application scenario and to identify dependabilities in case of security challenges. Furthermore, we evaluate secure messaging protocols and the integration of Trusted Platform Module (TPM) as a root of trust for dataexchange. We define a set of representative measurable indicator points based on existing standards and use them for automated dependability detection within the whole system.
      173Scopus© Citations 13
  • Publication
    Smart industrial indoor farming - Technical and societal challenges
    (Trauner, 2019)
    Schmittner, Christoph 
    ;
    Christl, Korbinian 
    ;
    Macher, Georg 
    ;
    Knapitsch, Johannes 
    ;
    Parapatits, Martin 
    ;
    ; ;
    Population growth and food development are two of the major challenges for society. While smart farming can help, available arable land is restricted. Smart industrial indoor farming has the potential to increase agricultural production while also reducing resources usage. To guarantee a reliable food supply, we need to ensure a dependable system, which protects not only the plants, but also the Intellectual property (IP). We give an overview about the challenges on agriculture, available indoor farming systems and standards for smart farming. We evaluate the standards for applicability towards indoor farming and present a use case for a smart industrial indoor farming system. To assure a dependable system, we present a methodology to analyze the system and achieve a trade-off between different dependability attributes.
      123
  • Publication
      271  595
  • Publication
    Engineering of IoT automation system
    (CRC Press, 2017)
    Carlsson, Oscar 
    ;
    Vera, Daniel 
    ;
    Arceredillo, Eduardo 
    ;
    ;
    Bilal, Ahmad 
    ;
    Schmittner, Christoph 
    ;
    Plosz, Sandor 
    ;
    Ruprechter, Thomas 
    ;
    Aldrian, Andreas 
    ;
    Delsing, Jerker 
      184
  • Publication
    A recommendation for suitable technologies for an indoor farming framework
    (Springer, 2020) ; ;
    Schmittner, Christoph 
    ;
    ;
    Christl, Korbinian 
    ;
    Knapitsch, Johannes 
    ;
    Parapatits, Martin 
    Facing food insecurity and overuse of resources due to effects of climate change, humanity needs to find new ways to secure food production and produce close to consumers. Vertical farming, where plants are grown in vertical arrays inside buildings with help of Information and Communication Technology (ICT) components, could contribute to solving this issue. Such systems integrate heterogeneous devices on different computing layers and acquire a lot of data to monitor and optimize the production process. We created an indoor testing unit in which growing conditions can be monitored and controlled to optimize growth of microgreens. This setup includes an Indoor Farming Support as a Service (IFSaaS) prototype that provides safe and secure monitoring and controlling, as well as self-adaption of an indoor farming system. In this article we provide information about the combination of most suitable technologies.
      599  34915Scopus© Citations 6
  • Publication
    Towards a secure and self-adapting smart indoor farming framework
    (Springer, 2019-10-21) ; ; ;
    Schmittner, Christoph 
    ;
    Christl, Korbinian 
    ;
    Knapitsch, Johannes 
    ;
    Parapatits, Martin 
    Facing the increase in world population and the stagnation in available arable land there is a high demand for optimizing the food production. Considering the world-wide and ongoing reduction of the agricultural labor force novel approaches for food production are required. Vertical farming may be such a solution where plants are being produced indoors in racks, cared by robotic appliances which will be operated by specialized software. Given the multitude of parameters which determine the ideal condition, a lot of data needs to be acquired. As this data is used to adapt the entire Cyber-Physical System to a changing environment the data has to be secure and adaptations have to consider safety aspects as well. Such systems must hence be secure, safe, scalable and self-adaptable to a high degree. We present an important element for such solutions, a cloud, IoT and robotic based smart farming framework.
      611  32944Scopus© Citations 16
  • Publication
    Monitoring Industry 4.0 Applications for Security and Safety Standard Compliance
    (IEEE, 2018-05) ;
    Schmittner, Christoph 
    ;
    ;
    Delsing, Jerker 
    In Industry 4.0 independent entities shall inter-operate to allow flexible and customized production. To assure the parties that individual components are secured to inter-operate, we investigate automated standard compliance. The standard compliance is defined based on given sets of security and safety requirements from which are derived measurable indicator points. Those reflect configurations of systems recommended by security, safety or legally relevant standards and guidelines, which help to demonstrate the state of compliance. We propose in this paper an initial approach to automate such assessment when components are inter-operating with each other by using a monitoring and standard compliance verification framework. This will assure the parties that services or devices within their organizations operate in a secure and standard compliant way, without compromising the underlying infrastructure.
      176Scopus© Citations 17
  • Publication
    Establishing a Chain of Trust in a Sporadically Connected Cyber-Physical System
    (IEEE, 2021-05) ; ; ;
    Stummer, Anna 
    ;
    ; ;
    Pirker, Dominic 
    ;
    Schmittner, Christoph 
    ;
    Delsing, Jerker 
    Drone based applications have progressed significantly in recent years across many industries, including agriculture. This paper proposes a sporadically connected cyber-physical system for assisting winemakers and minimizing the travel time to remote and poorly connected infrastructures. A set of representative diseases and conditions, which will be monitored by land-bound sensors in combination with multispectral images, is identified. To collect accurate data, a trustworthy and secured communication of the drone with the sensors and the base station should be established. We propose to use an Internet of Things framework for establishing a chain of trust by securely onboarding drones, sensors and base station, and providing self-adaptation support for the use case. Furthermore, we perform a security analysis of the use case for identifying potential threats and security controls that should be in place for mitigating them.
      126
  • Publication
      122Scopus© Citations 2
  • Publication
    Connected cars — Threats, vulnerabilities and their impact
    (IEEE, 2018-05) ; ;
    Schmittner, Christoph 
    ;
    ; ;
    Delsing, Jerker 
    The growing demand for interoperability between system components within a connected car has led to new security challenges in automotive development. The existing components, based on established technology, are often being combined to form such a connected car. For such established technologies, individual, often sector specific threat and vulnerability catalogs exist. The aim of this paper is to identify blocks of established technologies in a connected car and to consolidate the corresponding threat and vulnerability catalogs relevant for the individual constituent components. These findings are used to estimate the impact on specific system components and subsystems to identify the most crucial components and threats.
      212Scopus© Citations 15