I4S+ content for subscribers only

RMI 4.0: A Maturity Model for SMEs

RMI 4.0: A Maturity Model for SMEs

Alexandra Fiedler, Christoph Krieger, Dirk Sackmann, Heiko Wenzel-Schinzer
Digitisation offers enormous possibilities but also holds entrepreneurial risks such as data security aspects and misinvestments. Especially small and medium sized enterprises (SMEs) are facing problems by trying to keep pace with digital progress. A helpful tool would be a classification scheme specifically designed for SMEs that shows to which degree the company has already implemented digitisation technologies. Therefore we discuss why such a model is crucial, conduct a comprehensive literature survey and outline a new model.
Industrie 4.0 Management | Volume 34 | 2018 | Edition 2 | Pages 48-52
Which Benefits Drive the Implementation of Industry 4.0? An Empirical Comparison of Leading German Industry Sectors

Which Benefits Drive the Implementation of Industry 4.0? An Empirical Comparison of Leading German Industry Sectors

Ein empirischer Vergleich führender deutscher Industriezweige
Julian M. Müller, Daniel Kiel, Kai-Ingo Voigt
Industry 4.0-related potentials leading to Industry 4.0 implementation mostly remain unclear. Consequently, this paper analyzes potentials that drive manufacturers to implement Industry 4.0 in five industries. Whereas mechanical and plant engineering as well as electrical engineering companies consider business-model driven, operational as well as ecological and social benefits as relevant for Industry 4.0 implementation, the chemical and steel industry widely disregard business-model driven opportunities. The automotive industry merely focuses on operational benefits provided by Industry 4.0.
Industrie 4.0 Management | Volume 34 | 2018 | Edition 2 | Pages 25-28
Secure Processes in Modern Business Models

Secure Processes in Modern Business Models

Alexander Giehl, Peter Schneider
Technological progress offers opportunities for introducing new business models but also opens new paths for attackers. Security-by-design integrates factory security from the start and introduces a continuous security process built upon a variety of components. This article illustrates some of these components by highlighting secure processes with specific case studies: anomaly detection within value networks and secure production planning with simulation.
Industrie 4.0 Management | Volume 34 | 2018 | Edition 1 | Pages 55-58
Secure Cloud Auditing

Secure Cloud Auditing

Konzept zum sicheren IT-Auditing in unsicheren Umgebungen zur Erlangung von Vertrauen
Aljona Wehrhahn-Aklender, Norbert Pohlmann
The popularity of the Cloud rises, but there is still much insecurity in the IT-Security of a cloud solution. Companies want to be able to check, if the processes in the cloud are secure and trustworthy. This is possible with an external auditing system, which compares measured data with predefined rules. But there is a chance, that the measured data are manipulated on its way to the auditing system, before leaving the cloud. To prevent these threads, the measured data must be protected right after it is generated. This is possible with the forward integrity method, which builds a chain-of-trust for the measured data without need of a TPM.
Industrie 4.0 Management | Volume 34 | 2018 | Edition 1 | Pages 27-30
Security Made Easy for IoT

Security Made Easy for IoT

Gerhard Wunder, Andreas Müller, Christof Paar, Hans D. Schotten, Thomas Wollinger, Escrypt, Eduard Jorswieck, Aydin Sezgin
Securing the IoT poses specific challenges which are still only partially solved. These include the often very limited computing, storage, and energy resources of wirelessly connected IoT devices, the high demands on the user-friendliness, as well as the high-cost pressure. Upon this background, the research project PROPHYLAXE (“Providing Physical Layer Security for the Internet of Things”), funded by the BMBF, pursued a novel approach in which the physical properties of the wireless transmission link between two devices are exploited. Based on these properties, cryptographic keys can be generated that are known only to the communicating devices and can be used to secure and authenticate a connection.
Industrie 4.0 Management | Volume 34 | 2018 | Edition 1 | Pages 6-10
A Strategic Approach for Integration of Lot Size 1

A Strategic Approach for Integration of Lot Size 1

Stufenweises Vorgehen zur Implementierung dezentraler Steuerungssysteme in Kombination mit additiven Fertigungsverfahren
Patrick Stanula, Joachim Metternich, Thimo Keller, Thomas Glockseisen
In the project CrimpProd-S the integration of decentralized, self-learning production control systems in the context of Industry 4.0 in combination with additive manufacturing is investigated. The overall target is the economic evolutionary integration of lot size 1 in existing production facilities. Therefore a procedure model and customized methods are developed to analyze the potentials regarding the existing company’s strategy, value chain as well as the business model. This integrated procedure guarantees the efficient and customer-oriented transformation.
Industrie 4.0 Management | Volume 34 | 2018 | Edition 1 | Pages 31-35
Technology Selection for Human-Robot-Collaboration

Technology Selection for Human-Robot-Collaboration

Ein Vorgehensmodell zur Unterstützung der Technologieauswahl für Mensch-Roboter-Montageprozesse
Pierre T. Kirisci, Zied Ghrairi, Marvin Overbeck
Due to the advancement of robotics in industrial production, the strict separation of workspaces is gradually dissolving (HRC - human-robot collaboration). HRC combines the strength and efficiency of robots with the skills and cognitive abilities of humans through seamless cooperation [1]. Manufacturing companies, in which HRC scenarios are to be implemented, require a transparent and reflective selection of technology with regard to safeguarding the worker against hazards posed by the robot. To address this challenge, this paper proposes a process model that helps technology developers and systems integrators select appropriate technologies and solutions for HRC scenarios.
Industrie 4.0 Management | Volume 34 | 2018 | Edition 1 | Pages 41-46
Securing IT-Risks in a Production Environment

Securing IT-Risks in a Production Environment

an Integrated Approach for Information and Operational Technology
Christof Thim
The IT-risks which factory infrastructures are exposed to, require a common view of IT-security and operational technology (OT) protection. In this context, the measures from office IT can only be transferred to the production area and production control to a limited extent. The requirements and protection goals for the equipment used and the networking between these components are too different. An integrated approach and continuous management of IT security helps to identify and implement targeted measures in a concerted manner.
Industrie 4.0 Management | Volume 34 | 2018 | Edition 1 | Pages 11-14
Ready for Industry 4.0?

Ready for Industry 4.0?

Standortbestimmung mit dem Maturity Index
Bertolt Gärtner
Many companies struggle to determine their own status and strategy when it comes to digitalization and self-organizing production. The Industry 4.0 Maturity Index offers a guideline in this process and helps to ensure future competitiveness. Using the multidimensional maturity model, companies can evaluate their status-quo and develop a roadmap to accelerate their digital development. The case study of a manufacturer of electrical connectivity solutions demonstrates how to reduce costs and increase productivity with the help of the Industry 4.0 Maturity Index.
Industrie 4.0 Management | Volume 34 | 2018 | Edition 1 | Pages 59-62
Toolbox Evolution – The Maturity of Industrial Security Methods

Toolbox Evolution - The Maturity of Industrial Security Methods

Der Reifegrad der Methoden in der Industrial Security
Timo Kob, David Fuhr
After a delayed start, in the last years OT security has substantially caught up with IT security. Many technical IT security controls are also available for machines and plants. But the maturity distribution in the field of OT is more complex and fragmented, as shown in the present article. Certain fundamental issues and contradictions of IT security become particularly obvious here and might need to be solved within OT security.
Industrie 4.0 Management | Volume 34 | 2018 | Edition 1 | Pages 19-22
1 36 37 38 43