IIC Journal of Innovation 3rd Edition | Page 18

Blurry Box Encryption Scheme and Why it Matters to Industrial IoT
5.11 USE CASE: MICROGRID CONTROLS
Intelligent microgrids require the intelligent sharing of data for energy-efficient and reliable power distribution. Their controls depend on software-enabled functions and form part of a critical infrastructure that is highly exposed to cyber-attacks. Countermeasures include protection against reverse engineering, integrity protection from secure boot to secure firmware updates, and flexible licensing to enable features and measure their use reliably.
5.12 USE CASE: TEXTILE INDUSTRY
In the textile industry, embroidery machines are a common sight in the production of clothes, shoes, high-tech wearables, or industrial textiles for seat heating or antennas. Factories often use multiple machines in one location.
The challenge for machine vendors is to prevent the pirating of complete machines. Their control software contains the know-how needed for high-quality, flexible embroidering at high efficiency. The threat is mostly due to the extremely competitive textile industry itself. Machines are made with a set of features; their vendors offer a basic model at competitive low prices and sell more sophisticated functions – often software-realized – on top. This makes it important that factories do not, for example, buy several basic machines and only one with the full feature set that they then copy to the others.
Buyers of textiles face additional challenges: they provide production data – so called punch data – to the factories producing their fabrics on these machines. Unscrupulous factory owners could run extra shifts and produce additional wares for the grey market. The purchasers’ data needs to be controlled, from the original CAD design to the embroidery machine, which also includes controlling how many products made from the designs.
This can be seen as a general“ digitization” or“ Industrie 4.0” use case. It shows the great importance of protecting production data, which is essential for other areas as well, for example, additive manufacturing( 3D printing) or technology data, in the form of specific parameters for machines.
With software protection, flexible feature licensing, production data encryption, and secure storage of encryption keys and options, all of these challenges can be solved.
There are many more use cases. The chosen examples reveal the commercial relevance of the topic and the benefits of software protection. The mechanisms according to Kerckhoffs’ Principle published here allow developers and manufacturers to understand how much protection they need and why they should not put all of their trust into“ security through obscurity.”
IIC Journal of Innovation- 17-