Challenges in Anti-Counterfeiting of Cyber-Physical Systems

This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in this paper.




References:
[1] Mittelstaedt, A.; Strategisches IP-Management - mehr als nur Patente.
Gabler Verlag, Wiesbaden, 2009
[2] World Intellectual Property Organization (WIPO); Understanding
industrial property. WIPO publication no. 895(E), Geneva, 2008
[3] Herzog, O.; Schildhauer, T. (Hrsg.): acatech DISKUTIERT. Intelligente
Objekte: Technische Gestaltung – Wirtschaftliche Verwertung –
Gesellschaftliche Wirkung. Springer Verlag, Berlin, 2009 [4] Damm, W.; Achatz, R.; Beetz, K.; Broy, M.; Grimm, K.; Liggesmeyer,
P.: Nationale Roadmap Embedded Systems. In: Broy, M. (Hrsg.):
Cyber-Physical Systems – Innovation durch softwareintensive
eingebettete Systeme. acatech DISKUTIERT, Springer Verlag, Berlin,
2010
[5] Schäfer, W.; Wehrheim, H.: The Challenges of Building Advanced
Mechatronic Systems. In FOSE ´07: 2007 Future of Software
Engineering, pp. 72-84, IEEE Computer Society, 2007
[6] Broy, M. (Hrsg.): Cyber-Physical Systems – Innovation durch
softwareintensive eingebettete Systeme. acatech DISKUTIERT,
Springer Verlag, Berlin, 2010
[7] Gausemeier, J.; Tschirner, C.; Dumitrescu, R.: Der Weg zu Intelligenten
Technischen Systemen. Industrie Management, GITO Verlag, 1/2013.
[8] Verband Deutscher Maschinen- und Anlagenbau e.V. (VDMA): Studie
Produktpiraterie 2014
[9] World Economic Forum; McKinsey & Company: Risk and
Responsibility in a Hyperconnected World – Insight Report, 2014
[10] Gausemeier, J.; Glatz, R.; Lindemann, U. (Hrsg): Präventiver
Produktschutz – Leitfaden und Anwendungsbeispiele. Carl Hanser
Verlag, München, 2012
[11] Kokoschka, M.: Verfahren zur Konzipierung imitationsgeschützter
Produkte und Produktionssysteme. Dissertation, Universität Paderborn,
Paderborn, 2013
[12] Fuchs, H.J. (HRSG.): Piraten, Fälscher und Kopierer – Strategien und
Instrumente zum Schutz geistigen Eigentums in der Volksrepublik
China, Betriebswirtschaftlicher Verlag Dr. Th. Gabler, Wiesbaden, 2006
[13] Neemann, C. W.: Methodik zum Schutz gegen Produktimitationen,
Dissertation Fraun-hofer Institut für Produktionstechnologie IPT,
Aachen, Shaker Verlag, Band 13/2007, Aachen, 2007
[14] Jacobs, L.; Samli, A. C.; Jedlik, T.: The Nightmare of International
Product Piracy – Exploring Defensive Strategies. In: Industrial
Marketing Management 30, S. 499-509, North-Holland Publishing, 2001
[15] Fraunhofer Institute for Applied and Integrated Security;
http://www.aisec.fraunhofer.de/de/fields-of-expertise/productprotection/
pep-protecting-electronic-products.html, March 2015