Challenges in Anti-Counterfeiting of Cyber-Physical Systems
This paper examines the system protection for cyber-physical
systems (CPS). CPS are particularly characterized by their
networking system components. This means they are able to adapt to
the needs of their users and its environment. With this ability, CPS
have new, specific requirements on the protection against anti-counterfeiting,
know-how loss and manipulation. They increase the
requirements on system protection because piracy attacks can be
more diverse, for example because of an increasing number of
interfaces or through the networking abilities. The new requirements
were identified and in a next step matched with existing protective
measures. Due to the found gap the development of new protection
measures has to be forced to close this gap. Moreover a comparison
of the effectiveness between selected measures was realized and the
first results are presented in this paper.
[1] Mittelstaedt, A.; Strategisches IP-Management - mehr als nur Patente.
Gabler Verlag, Wiesbaden, 2009
[2] World Intellectual Property Organization (WIPO); Understanding
industrial property. WIPO publication no. 895(E), Geneva, 2008
[3] Herzog, O.; Schildhauer, T. (Hrsg.): acatech DISKUTIERT. Intelligente
Objekte: Technische Gestaltung – Wirtschaftliche Verwertung –
Gesellschaftliche Wirkung. Springer Verlag, Berlin, 2009 [4] Damm, W.; Achatz, R.; Beetz, K.; Broy, M.; Grimm, K.; Liggesmeyer,
P.: Nationale Roadmap Embedded Systems. In: Broy, M. (Hrsg.):
Cyber-Physical Systems – Innovation durch softwareintensive
eingebettete Systeme. acatech DISKUTIERT, Springer Verlag, Berlin,
2010
[5] Schäfer, W.; Wehrheim, H.: The Challenges of Building Advanced
Mechatronic Systems. In FOSE ´07: 2007 Future of Software
Engineering, pp. 72-84, IEEE Computer Society, 2007
[6] Broy, M. (Hrsg.): Cyber-Physical Systems – Innovation durch
softwareintensive eingebettete Systeme. acatech DISKUTIERT,
Springer Verlag, Berlin, 2010
[7] Gausemeier, J.; Tschirner, C.; Dumitrescu, R.: Der Weg zu Intelligenten
Technischen Systemen. Industrie Management, GITO Verlag, 1/2013.
[8] Verband Deutscher Maschinen- und Anlagenbau e.V. (VDMA): Studie
Produktpiraterie 2014
[9] World Economic Forum; McKinsey & Company: Risk and
Responsibility in a Hyperconnected World – Insight Report, 2014
[10] Gausemeier, J.; Glatz, R.; Lindemann, U. (Hrsg): Präventiver
Produktschutz – Leitfaden und Anwendungsbeispiele. Carl Hanser
Verlag, München, 2012
[11] Kokoschka, M.: Verfahren zur Konzipierung imitationsgeschützter
Produkte und Produktionssysteme. Dissertation, Universität Paderborn,
Paderborn, 2013
[12] Fuchs, H.J. (HRSG.): Piraten, Fälscher und Kopierer – Strategien und
Instrumente zum Schutz geistigen Eigentums in der Volksrepublik
China, Betriebswirtschaftlicher Verlag Dr. Th. Gabler, Wiesbaden, 2006
[13] Neemann, C. W.: Methodik zum Schutz gegen Produktimitationen,
Dissertation Fraun-hofer Institut für Produktionstechnologie IPT,
Aachen, Shaker Verlag, Band 13/2007, Aachen, 2007
[14] Jacobs, L.; Samli, A. C.; Jedlik, T.: The Nightmare of International
Product Piracy – Exploring Defensive Strategies. In: Industrial
Marketing Management 30, S. 499-509, North-Holland Publishing, 2001
[15] Fraunhofer Institute for Applied and Integrated Security;
http://www.aisec.fraunhofer.de/de/fields-of-expertise/productprotection/
pep-protecting-electronic-products.html, March 2015
[1] Mittelstaedt, A.; Strategisches IP-Management - mehr als nur Patente.
Gabler Verlag, Wiesbaden, 2009
[2] World Intellectual Property Organization (WIPO); Understanding
industrial property. WIPO publication no. 895(E), Geneva, 2008
[3] Herzog, O.; Schildhauer, T. (Hrsg.): acatech DISKUTIERT. Intelligente
Objekte: Technische Gestaltung – Wirtschaftliche Verwertung –
Gesellschaftliche Wirkung. Springer Verlag, Berlin, 2009 [4] Damm, W.; Achatz, R.; Beetz, K.; Broy, M.; Grimm, K.; Liggesmeyer,
P.: Nationale Roadmap Embedded Systems. In: Broy, M. (Hrsg.):
Cyber-Physical Systems – Innovation durch softwareintensive
eingebettete Systeme. acatech DISKUTIERT, Springer Verlag, Berlin,
2010
[5] Schäfer, W.; Wehrheim, H.: The Challenges of Building Advanced
Mechatronic Systems. In FOSE ´07: 2007 Future of Software
Engineering, pp. 72-84, IEEE Computer Society, 2007
[6] Broy, M. (Hrsg.): Cyber-Physical Systems – Innovation durch
softwareintensive eingebettete Systeme. acatech DISKUTIERT,
Springer Verlag, Berlin, 2010
[7] Gausemeier, J.; Tschirner, C.; Dumitrescu, R.: Der Weg zu Intelligenten
Technischen Systemen. Industrie Management, GITO Verlag, 1/2013.
[8] Verband Deutscher Maschinen- und Anlagenbau e.V. (VDMA): Studie
Produktpiraterie 2014
[9] World Economic Forum; McKinsey & Company: Risk and
Responsibility in a Hyperconnected World – Insight Report, 2014
[10] Gausemeier, J.; Glatz, R.; Lindemann, U. (Hrsg): Präventiver
Produktschutz – Leitfaden und Anwendungsbeispiele. Carl Hanser
Verlag, München, 2012
[11] Kokoschka, M.: Verfahren zur Konzipierung imitationsgeschützter
Produkte und Produktionssysteme. Dissertation, Universität Paderborn,
Paderborn, 2013
[12] Fuchs, H.J. (HRSG.): Piraten, Fälscher und Kopierer – Strategien und
Instrumente zum Schutz geistigen Eigentums in der Volksrepublik
China, Betriebswirtschaftlicher Verlag Dr. Th. Gabler, Wiesbaden, 2006
[13] Neemann, C. W.: Methodik zum Schutz gegen Produktimitationen,
Dissertation Fraun-hofer Institut für Produktionstechnologie IPT,
Aachen, Shaker Verlag, Band 13/2007, Aachen, 2007
[14] Jacobs, L.; Samli, A. C.; Jedlik, T.: The Nightmare of International
Product Piracy – Exploring Defensive Strategies. In: Industrial
Marketing Management 30, S. 499-509, North-Holland Publishing, 2001
[15] Fraunhofer Institute for Applied and Integrated Security;
http://www.aisec.fraunhofer.de/de/fields-of-expertise/productprotection/
pep-protecting-electronic-products.html, March 2015
@article{"International Journal of Business, Human and Social Sciences:70148", author = "Daniel Kliewe and Arno Kühn and Roman Dumitrescu and Jürgen Gausemeier", title = "Challenges in Anti-Counterfeiting of Cyber-Physical Systems", abstract = "This paper examines the system protection for cyber-physical
systems (CPS). CPS are particularly characterized by their
networking system components. This means they are able to adapt to
the needs of their users and its environment. With this ability, CPS
have new, specific requirements on the protection against anti-counterfeiting,
know-how loss and manipulation. They increase the
requirements on system protection because piracy attacks can be
more diverse, for example because of an increasing number of
interfaces or through the networking abilities. The new requirements
were identified and in a next step matched with existing protective
measures. Due to the found gap the development of new protection
measures has to be forced to close this gap. Moreover a comparison
of the effectiveness between selected measures was realized and the
first results are presented in this paper.", keywords = "Anti-counterfeiting, cyber physical systems,
Intellectual property (IP) and knowledge management, system
protection.", volume = "9", number = "5", pages = "1732-8", }