SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Securing the Manufacturing Environment using Biometrics

                      Shimon K. Modi                                   Stephen J. Elliott, Ph.D.
                    shimon@purdue.edu                                     elliott@purdue.edu
                   Industrial Technology,                     Assistant Professor,Industrial Technology,
                     Purdue University                                    Purdue University
               West Lafayette, IN-47906, USA                       West Lafayette, IN-47906, USA

                      ABSTRACT                                 onto the system, after which the system is open to anyone
                                                               on the manufacturing floor to operate. The manufacturing
Over the past decade, there has been substantial growth in     systems are sophisticated enough to provide remote
global business, of which the manufacturing industry           operation capability, but most require only a password as
plays a large part. This, accompanied by an increase in        a form of authentication. There are no means to ascertain
intelligent    manufacturing      equipment,     increased     who was operating the machine, and if they were
connectivity of equipment and software both internally         authorized to do so. In an event of a malfunction or
within a company, and with external partners has led to an     accident the audit trail does not provide relevant operator
increase in the probability of attacks and threats to these    information. Physical access to the manufacturing
systems. Combine this with the current events and the          environment is also an important factor to consider for
additional requirements of governmental regulation, and        security infrastructure. Because physical access
several businesses in advanced manufacturing have to           vulnerabilities have been examined for longer than logical
increase both physical and logical security. This paper        access vulnerabilities in the manufacturing environment,
outlines a unique application of biometrics and computer       legacy physical access security systems are considered to
integrated manufacturing systems as part of providing an       be sufficient. Designs of security frameworks generally
applied solution to solving security problems for              don’t try to integrate physical access and logical access
manufacturing and control systems, and adhering to             security. Biometric systems can incorporate physical and
government regulations related to the manufacturing            logical access security into a single framework, and
industry.                                                      provide a more centralized and integrated solution. The
                                                               rest of this paper describes the different government
                  1. INTRODUCTION                              regulations related to manufacturing security, and the
                                                               proof of concept implementation that uses commercially
Computer integrated manufacturing systems have changed         available biometric systems to improve physical and
the interaction of industrial manufacturing equipment with     logical security for a manufacturing environment.
different systems within and outside the manufacturing
environment. The increase in the sophistication of the                            2. REGULATIONS
manufacturing equipment, along with increased
connectivity with internal and external systems has            The US government has also passed several regulations so
changed the way that manufacturing security is designed.       that companies take into account general concerns like
As manufacturers move towards a more connected                 physical and logical security. The Sarbanes-Oxley Act of
collaborative environment in order to compete in global        2002 and the Food and Drug Administration’s (FDA) 21
businesses, concerns that their proprietary manufacturing      CFR Part 11 are two such regulations which require that
processes and intellectual property could be exposed to        companies have specific controls to ensure authenticity,
damaging compromise on a worldwide scale are                   integrity and auditability of electronic records. On March
increasing. Security in the manufacturing environment has      20, 1997, the FDA published the Electronic Records:
not been able to keep up with the advancement of               Electronic Signatures Rule in the Federal Register. This
interconnectivity and sophistication of manufacturing          rule became effective on August 20, 1997, and was
systems. The general problem that the manufacturing            codified as 21 CFR Part 11. FDA’s 21 CFR Part 11
environment is facing is that operation of most industrial     primarily targets the health, and pharmaceutical industries.
manufacturing equipment does not require any strong            The initial targeted user community within these
form of authentication or identification when some             industries are the operators of the distributed control
transaction related to product manufacturing takes place.      systems where the FDA has expressed concern regarding
Most manufacturing systems require a password to log           the ability to authenticate an individual who performs any
type of transaction in the manufacturing process, that          concept uses iris recognition to authenticate the operator
would be governed by the regulations associated with            from a remote location, hand geometry for physical
electronic signatures, and the guidance of 21 CFR Part 11.      access, and fingerprint and facial recognition for logical
There are several criteria like validity of records, accuracy   access. Fig 1 shows the network diagram of the entire
of records, audit trails, protection of records, authority      security framework.
checks, system documentation, and operator entry checks
that need to be satisfied in order to adhere to the FDA’s
regulation. Validity is achieved by ensuring the system’s
accuracy, reliability, consistency, and ability to discern
invalid or altered records. Accuracy is achieved by
creating adequate means to protect records for accurate
and ready retrieval throughout the record retention period.
Systems must use secure, computer-generated, and time-
stamped audit trails to independently record the date and
time of operator entries and actions that create, modify, or
delete electronic records. Operator entry checks must
include some mechanism that determines and records the
validity of the source of any data entered manually [1].
   At first glance, Sarbanes-Oxley appears to be only
concerned with financial information and therefore would
have little to do with the manufacturing industry. But
manufacturing systems are closely integrated with
financial and inventory systems thereby increasing the
importance of security in the manufacturing environment.
   A security system that depends on usernames and                    Fig. 1. Network diagram of access framework
passwords does not provide authenticity, integrity and
auditability of records. A stronger authentication system is       A commercially available middleware solution is used
required in order to comply with these regulations.             to integrate all the different biometric systems, and
Biometric systems offer a stronger authentication system        provides centralized administration capability. The
compared to traditional username password combinations,         middleware solution manages of all the enrolment
or identification tokens. The following sections describe       templates, and provides identity and privileges
the proof of concept implementation that can improve            management capability. A centralized server stores all the
security in the manufacturing environment, and comply           enrolment templates, and all queries are made to this
with government regulations.                                    server when a particular template is requested. In this
                                                                particular design, the matching operation is done on the
   3. PROOF OF CONCEPT IMPLEMENTATION                           server whenever possible due to certain security, and
                                                                performance benefits. A centralized system has its
The proof of concept design is comprised of physical            benefits over a decentralized system. Data management is
access security, and logical access security systems. One       easier, since all the data is stored in a central repository. A
of the primary goals while creating this proof of concept       centralized storage system can be integrated with a
was to use a wide variety of commercially available             decentralized matching system. Different profiles can be
biometric systems as possible while keeping in mind the         setup for machine operators, thus allowing separation of
environment that they would be deployed in, matching            duties for using the manufacturing systems. A centralized
performance rates, and cost-benefit ratio. The physical         architecture also provides the benefit of expanding the
access security system uses hand geometry recognition to        authentication to multiple locations without any major
allow authorized individuals into the manufacturing             changes to the existing infrastructure. When an individual
environment. Access to the manufacturing machines               has to be enrolled into the system, they have to provide
requires the operator to be authenticated using fingerprint     proper credentials to the administrator or the supervisor
recognition. Along with fingerprint recognition, face           before proceeding with the enrolment procedure. It is
recognition is used to authenticate the operator.               important to carry out this first step with extreme care
Fingerprint recognition and face recognition make up the        because if an incorrect identity is linked to a particular
logical access security system.                                 biometric template, all the security measures are rendered
    Modern manufacturing equipment allows operators to          useless. If the administrator needs to deny access to an
access the manufacturing equipment from remote                  individual it can be done by removing the templates of the
locations for maintenance operations. This proof of             individual from the central repository.
for remote authentication. Statistically iris recognition
3.1. Physical Access                                          provides among the best matching performance rates
                                                              when compared to existing biometric systems [3]. An
As mentioned earlier, hand geometry recognition is used       unauthorized operator gaining remote access to a machine
to authenticate individuals attempting to gain physical       could have far reaching implications in terms of human
access to the manufacturing environment. Commercially         safety, and business liability. Commercially available iris
available hand geometry systems are designed to               recognition software’s can use web cams to capture the
withstand environmental and climate changes, making           image of the iris. Normally operators log on to the
them an ideal choice for an uncontrolled environment.         machines from their home which makes iris recognition
Also, the features of hand geometry are not affected by       quite suitable because they can control any kind of visual
climate so much that the performance of the system will       interference that might affect the web cam.
be affected. Hand geometry recognition systems use a
personal identification number (PIN) to pull up the                     4. WALK THROUGH SCENARIO
enrolment template linked to that PIN, and performing the
matching operation. The use of a PIN reduces the time         This section describes a typical scenario of an operator
taken for matching operations, and offers the capability of   entering the manufacturing environment, and gaining
separating personal information of the individual from the    access to a machine. The operator can enter the
enrolment template repository. For example, the personal      manufacturing premises only by using the hand geometry
information of all the enrolled individuals and their         machine. When a positive verification occurs, the central
enrolment templates can be kept in separate databases,        server registers that the operator has entered the premises,
and the PIN can be used to interlink the two databases.       shown in Fig 2. For the operator to log onto his/her
Since the physical access security is the first system the    respective machine, they have to use the fingerprint
operators interact with all remaining transactions can be     recognition, and the facial recognition systems. But just a
done using the PIN as the identifier.                         positive match on the fingerprint, and facial recognition
                                                              systems does not let the operator log onto the machine. If
3.2. Logical Access                                           a positive match occurs using the fingerprint machine but
                                                              the operator did not get registered on the central server
Fingerprint recognition is used to authorize operators for    because he/she just followed some one through the
accessing     manufacturing      machines.    Traditionally   physical access system, that operator will not be allowed
username password combinations are used to allow              to log onto the machine. In order for the operator to use
operators to access manufacturing machines. Typing in         the machine, he/she has to enter the manufacturing
the username and password every time an operator wants        environment using the hand geometry system.
to access the machine can be cumbersome, and lead to
loss of productivity. Fingerprint recognition takes less
than a few seconds to complete one to many match
operation depending on the size of the enrolment database
[2], and doesn’t require the operator to remember any
usernames and passwords. The inside of the
manufacturing environment tends to be relatively
controlled in terms of temperatures and climate changes,
which makes it suitable for fingerprint recognition.
   Facial recognition is used in combination with
fingerprint recognition to provide an added level of
authentication. Also, commercially available facial
recognition software’s provide capability of tracking faces
within a predetermined field of vision. This feature can be
used to lock the machine if the operator steps away from
the machine, and unlock the machine only if the
authorized operator steps back into the field of vision of
the facial recognition system. If a situation arises where        Fig 2. Stages for physical access to manufacturing
an audit trail is required for usage of particular machine                           environment.
transactions from the fingerprint recognition system, and
visual information can be used to provide accurate details.
   Iris recognition performs optimally in a well lit, and
controlled environment, which was the reason for using it
recognition is used to control physical access, and remove
                                                               the inadequacies and management issues related to
                                                               traditional lock and key systems or card based systems.
                                                               Logical access is secured by using fingerprint recognition
                                                               in tandem with facial recognition to overcome the
                                                               weakness of traditional logical access security based on
                                                               usernames and passwords. Remote authentication is
                                                               performed using iris recognition as it is best suited to
                                                               work in controlled environments, and provide a high level
                                                               of security. The entire framework is centralized to provide
                                                               ease of management, and increased security.
                                                                  The current framework does not integrate smart cards
                                                               or radio frequency identification (RFID) tags in
                                                               conjunction with biometrics. Smart cards could provide
                                                               local storage of templates, as well as an additional layer of
    Fig 3. Stages for logical access to manufacturing          identification. Similarly RFID tags can be used instead of
                       environment.                            facial tracking to lock down a machine if the operator
                                                               steps out of range of the RFID scanner. One of the
This cross referencing prevents an unauthorized                improvements for the future is to concentrate on
individual from entering the premises and using a              developing policies, and procedures which would make
machine that is not locked, is schematically shown in Fig      the biometric security system more effective. The system
3.                                                             in its present form does not record if an operator leaves
   The facial recognition system also provides facial          the manufacturing premises, and then re-enters. Future
tracking capabilities which can be used to lock down a         work should focus on exit protocol so that records can be
machine when the operator moves away from the field of         more accurate. An in depth return on investment study can
vision of the camera. This functionality prevents              also be carried out to assess the feasibility of large scale
unauthorized operators from using a machine that an            deployments, although long term considerations, and
authorized operator has logged on to.                          intangible advantages should be measured.
            5. OTHER CONSIDERATIONS                                                7. REFERENCES
The proof of concept described in this paper is by no           [1] Haley, T. A., The Electronic Records Regulation: An
means completely secure. The system was designed to            Implementation Guide for the Food Industry,
reduce security inadequacies, and indeterministic nature       http://www.ces.purdue.edu/extmedia/FS/FS-12/FS-
of audit trails in current manufacturing environments.         12W.html
Security in any system is only as strong as its weakest
link. Security technology can keep on advancing, but the       [2] http://www.neurotechnologija.com/verifinger.html.
human interaction with the system is a step that
technology cannot replace. Human interaction with the          [3] Wildes, R.P., Iris Recognition: An Emerging
system has to be considered whenever a security system is      Biometric Technology, Proceedings of IEEE, Sept., 1997.
designed. For example, in the system described in this
paper the administrator of the system has to ensure that
proper credentialing takes place during enrolment in order
to link the correct identity with the biometric template.
Awareness and implementation of policies that limit the
possibility of malicious actions will help reap the benefits
of advancement made by technology.

      6. CONCLUSION AND FUTURE WORK

The main aim of this research project was to demonstrate
effective use of advanced technologies that keep up the
advances made in the manufacturing environment. The
proof of concept is designed using commercially available
biometric products, and systems. Hand geometry

Mais conteúdo relacionado

Mais procurados

ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesCertification Europe
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013SAIGlobalAssurance
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security BaselineBarry Caplin
 
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityReports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityA. V. Rajabahadur
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)AHM Pervej Kabir
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr WafulaDiscover JKUAT
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromMart Rovers
 
Iso 27001 in images - sample slides from different levels of training, e.g. F...
Iso 27001 in images - sample slides from different levels of training, e.g. F...Iso 27001 in images - sample slides from different levels of training, e.g. F...
Iso 27001 in images - sample slides from different levels of training, e.g. F...Stratos Lazaridis
 
Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...IJCSIS Research Publications
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 

Mais procurados (19)

ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and Challenges
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
ISO/IEC 27001:2005
ISO/IEC 27001:2005ISO/IEC 27001:2005
ISO/IEC 27001:2005
 
ISO 27001:2013 - Changes
ISO 27001:2013 -  ChangesISO 27001:2013 -  Changes
ISO 27001:2013 - Changes
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013  ChecklistISO/IEC 27001:2005 naar ISO 27001:2013  Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security Baseline
 
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityReports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber Security
 
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
Reporting about Overview Summery  of ISO-27000 Se.(ISMS)Reporting about Overview Summery  of ISO-27000 Se.(ISMS)
Reporting about Overview Summery of ISO-27000 Se.(ISMS)
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
Iso 27001 in images - sample slides from different levels of training, e.g. F...
Iso 27001 in images - sample slides from different levels of training, e.g. F...Iso 27001 in images - sample slides from different levels of training, e.g. F...
Iso 27001 in images - sample slides from different levels of training, e.g. F...
 
Iso 27001 10_apr_2006
Iso 27001 10_apr_2006Iso 27001 10_apr_2006
Iso 27001 10_apr_2006
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 

Destaque

ApresentaçAo Minas Decide
ApresentaçAo Minas DecideApresentaçAo Minas Decide
ApresentaçAo Minas Decideminasdecide
 
Emaint_U_2
Emaint_U_2Emaint_U_2
Emaint_U_2EMAINT
 
Presentation school g. ferrari parma
Presentation school g. ferrari   parmaPresentation school g. ferrari   parma
Presentation school g. ferrari parmagofarusr
 

Destaque (6)

ApresentaçAo Minas Decide
ApresentaçAo Minas DecideApresentaçAo Minas Decide
ApresentaçAo Minas Decide
 
Genetic diseases
Genetic diseasesGenetic diseases
Genetic diseases
 
Pathways[1]
Pathways[1]Pathways[1]
Pathways[1]
 
Emaint_U_2
Emaint_U_2Emaint_U_2
Emaint_U_2
 
All About Me
All About MeAll About Me
All About Me
 
Presentation school g. ferrari parma
Presentation school g. ferrari   parmaPresentation school g. ferrari   parma
Presentation school g. ferrari parma
 

Semelhante a (2005) Securing Manufacturing Environment using Biometrics

Biometrics Provide Strategic Business Advantage in Pharmaceutical Manufacturing
Biometrics Provide Strategic Business Advantage in Pharmaceutical ManufacturingBiometrics Provide Strategic Business Advantage in Pharmaceutical Manufacturing
Biometrics Provide Strategic Business Advantage in Pharmaceutical ManufacturingARC Advisory Group
 
Information security management guidance for discrete automation
Information security management guidance for discrete automationInformation security management guidance for discrete automation
Information security management guidance for discrete automationjohnnywess
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0Osama Shahumi
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial deviceIJNSA Journal
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTIJNSA Journal
 
Intrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIntrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIJMTST Journal
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresIJRES Journal
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxjaggernaoma
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudLockheed Martin
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfICS
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...Schneider Electric
 
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded SystemsDr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded SystemsDr Dev Kambhampati
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management ActMichelle Singh
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)Zero Science Lab
 

Semelhante a (2005) Securing Manufacturing Environment using Biometrics (20)

Biometrics Provide Strategic Business Advantage in Pharmaceutical Manufacturing
Biometrics Provide Strategic Business Advantage in Pharmaceutical ManufacturingBiometrics Provide Strategic Business Advantage in Pharmaceutical Manufacturing
Biometrics Provide Strategic Business Advantage in Pharmaceutical Manufacturing
 
ch10.pptx
ch10.pptxch10.pptx
ch10.pptx
 
(2003) Securing the Biometric Model
(2003) Securing the Biometric Model(2003) Securing the Biometric Model
(2003) Securing the Biometric Model
 
Information security management guidance for discrete automation
Information security management guidance for discrete automationInformation security management guidance for discrete automation
Information security management guidance for discrete automation
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Employee trust based industrial device
Employee trust based industrial deviceEmployee trust based industrial device
Employee trust based industrial device
 
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENTEMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
EMPLOYEE TRUST BASED INDUSTRIAL DEVICE DEPLOYMENT AND INITIAL KEY ESTABLISHMENT
 
Intrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIntrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin Authorization
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docx
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdf
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
 
G1803044045
G1803044045G1803044045
G1803044045
 
F017223742
F017223742F017223742
F017223742
 
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded SystemsDr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
 

Mais de International Center for Biometric Research

An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...International Center for Biometric Research
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...International Center for Biometric Research
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applicationsInternational Center for Biometric Research
 

Mais de International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
Cerias talk on testing and evaluation
Cerias talk on testing and evaluationCerias talk on testing and evaluation
Cerias talk on testing and evaluation
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 

Último

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

(2005) Securing Manufacturing Environment using Biometrics

  • 1. Securing the Manufacturing Environment using Biometrics Shimon K. Modi Stephen J. Elliott, Ph.D. shimon@purdue.edu elliott@purdue.edu Industrial Technology, Assistant Professor,Industrial Technology, Purdue University Purdue University West Lafayette, IN-47906, USA West Lafayette, IN-47906, USA ABSTRACT onto the system, after which the system is open to anyone on the manufacturing floor to operate. The manufacturing Over the past decade, there has been substantial growth in systems are sophisticated enough to provide remote global business, of which the manufacturing industry operation capability, but most require only a password as plays a large part. This, accompanied by an increase in a form of authentication. There are no means to ascertain intelligent manufacturing equipment, increased who was operating the machine, and if they were connectivity of equipment and software both internally authorized to do so. In an event of a malfunction or within a company, and with external partners has led to an accident the audit trail does not provide relevant operator increase in the probability of attacks and threats to these information. Physical access to the manufacturing systems. Combine this with the current events and the environment is also an important factor to consider for additional requirements of governmental regulation, and security infrastructure. Because physical access several businesses in advanced manufacturing have to vulnerabilities have been examined for longer than logical increase both physical and logical security. This paper access vulnerabilities in the manufacturing environment, outlines a unique application of biometrics and computer legacy physical access security systems are considered to integrated manufacturing systems as part of providing an be sufficient. Designs of security frameworks generally applied solution to solving security problems for don’t try to integrate physical access and logical access manufacturing and control systems, and adhering to security. Biometric systems can incorporate physical and government regulations related to the manufacturing logical access security into a single framework, and industry. provide a more centralized and integrated solution. The rest of this paper describes the different government 1. INTRODUCTION regulations related to manufacturing security, and the proof of concept implementation that uses commercially Computer integrated manufacturing systems have changed available biometric systems to improve physical and the interaction of industrial manufacturing equipment with logical security for a manufacturing environment. different systems within and outside the manufacturing environment. The increase in the sophistication of the 2. REGULATIONS manufacturing equipment, along with increased connectivity with internal and external systems has The US government has also passed several regulations so changed the way that manufacturing security is designed. that companies take into account general concerns like As manufacturers move towards a more connected physical and logical security. The Sarbanes-Oxley Act of collaborative environment in order to compete in global 2002 and the Food and Drug Administration’s (FDA) 21 businesses, concerns that their proprietary manufacturing CFR Part 11 are two such regulations which require that processes and intellectual property could be exposed to companies have specific controls to ensure authenticity, damaging compromise on a worldwide scale are integrity and auditability of electronic records. On March increasing. Security in the manufacturing environment has 20, 1997, the FDA published the Electronic Records: not been able to keep up with the advancement of Electronic Signatures Rule in the Federal Register. This interconnectivity and sophistication of manufacturing rule became effective on August 20, 1997, and was systems. The general problem that the manufacturing codified as 21 CFR Part 11. FDA’s 21 CFR Part 11 environment is facing is that operation of most industrial primarily targets the health, and pharmaceutical industries. manufacturing equipment does not require any strong The initial targeted user community within these form of authentication or identification when some industries are the operators of the distributed control transaction related to product manufacturing takes place. systems where the FDA has expressed concern regarding Most manufacturing systems require a password to log the ability to authenticate an individual who performs any
  • 2. type of transaction in the manufacturing process, that concept uses iris recognition to authenticate the operator would be governed by the regulations associated with from a remote location, hand geometry for physical electronic signatures, and the guidance of 21 CFR Part 11. access, and fingerprint and facial recognition for logical There are several criteria like validity of records, accuracy access. Fig 1 shows the network diagram of the entire of records, audit trails, protection of records, authority security framework. checks, system documentation, and operator entry checks that need to be satisfied in order to adhere to the FDA’s regulation. Validity is achieved by ensuring the system’s accuracy, reliability, consistency, and ability to discern invalid or altered records. Accuracy is achieved by creating adequate means to protect records for accurate and ready retrieval throughout the record retention period. Systems must use secure, computer-generated, and time- stamped audit trails to independently record the date and time of operator entries and actions that create, modify, or delete electronic records. Operator entry checks must include some mechanism that determines and records the validity of the source of any data entered manually [1]. At first glance, Sarbanes-Oxley appears to be only concerned with financial information and therefore would have little to do with the manufacturing industry. But manufacturing systems are closely integrated with financial and inventory systems thereby increasing the importance of security in the manufacturing environment. A security system that depends on usernames and Fig. 1. Network diagram of access framework passwords does not provide authenticity, integrity and auditability of records. A stronger authentication system is A commercially available middleware solution is used required in order to comply with these regulations. to integrate all the different biometric systems, and Biometric systems offer a stronger authentication system provides centralized administration capability. The compared to traditional username password combinations, middleware solution manages of all the enrolment or identification tokens. The following sections describe templates, and provides identity and privileges the proof of concept implementation that can improve management capability. A centralized server stores all the security in the manufacturing environment, and comply enrolment templates, and all queries are made to this with government regulations. server when a particular template is requested. In this particular design, the matching operation is done on the 3. PROOF OF CONCEPT IMPLEMENTATION server whenever possible due to certain security, and performance benefits. A centralized system has its The proof of concept design is comprised of physical benefits over a decentralized system. Data management is access security, and logical access security systems. One easier, since all the data is stored in a central repository. A of the primary goals while creating this proof of concept centralized storage system can be integrated with a was to use a wide variety of commercially available decentralized matching system. Different profiles can be biometric systems as possible while keeping in mind the setup for machine operators, thus allowing separation of environment that they would be deployed in, matching duties for using the manufacturing systems. A centralized performance rates, and cost-benefit ratio. The physical architecture also provides the benefit of expanding the access security system uses hand geometry recognition to authentication to multiple locations without any major allow authorized individuals into the manufacturing changes to the existing infrastructure. When an individual environment. Access to the manufacturing machines has to be enrolled into the system, they have to provide requires the operator to be authenticated using fingerprint proper credentials to the administrator or the supervisor recognition. Along with fingerprint recognition, face before proceeding with the enrolment procedure. It is recognition is used to authenticate the operator. important to carry out this first step with extreme care Fingerprint recognition and face recognition make up the because if an incorrect identity is linked to a particular logical access security system. biometric template, all the security measures are rendered Modern manufacturing equipment allows operators to useless. If the administrator needs to deny access to an access the manufacturing equipment from remote individual it can be done by removing the templates of the locations for maintenance operations. This proof of individual from the central repository.
  • 3. for remote authentication. Statistically iris recognition 3.1. Physical Access provides among the best matching performance rates when compared to existing biometric systems [3]. An As mentioned earlier, hand geometry recognition is used unauthorized operator gaining remote access to a machine to authenticate individuals attempting to gain physical could have far reaching implications in terms of human access to the manufacturing environment. Commercially safety, and business liability. Commercially available iris available hand geometry systems are designed to recognition software’s can use web cams to capture the withstand environmental and climate changes, making image of the iris. Normally operators log on to the them an ideal choice for an uncontrolled environment. machines from their home which makes iris recognition Also, the features of hand geometry are not affected by quite suitable because they can control any kind of visual climate so much that the performance of the system will interference that might affect the web cam. be affected. Hand geometry recognition systems use a personal identification number (PIN) to pull up the 4. WALK THROUGH SCENARIO enrolment template linked to that PIN, and performing the matching operation. The use of a PIN reduces the time This section describes a typical scenario of an operator taken for matching operations, and offers the capability of entering the manufacturing environment, and gaining separating personal information of the individual from the access to a machine. The operator can enter the enrolment template repository. For example, the personal manufacturing premises only by using the hand geometry information of all the enrolled individuals and their machine. When a positive verification occurs, the central enrolment templates can be kept in separate databases, server registers that the operator has entered the premises, and the PIN can be used to interlink the two databases. shown in Fig 2. For the operator to log onto his/her Since the physical access security is the first system the respective machine, they have to use the fingerprint operators interact with all remaining transactions can be recognition, and the facial recognition systems. But just a done using the PIN as the identifier. positive match on the fingerprint, and facial recognition systems does not let the operator log onto the machine. If 3.2. Logical Access a positive match occurs using the fingerprint machine but the operator did not get registered on the central server Fingerprint recognition is used to authorize operators for because he/she just followed some one through the accessing manufacturing machines. Traditionally physical access system, that operator will not be allowed username password combinations are used to allow to log onto the machine. In order for the operator to use operators to access manufacturing machines. Typing in the machine, he/she has to enter the manufacturing the username and password every time an operator wants environment using the hand geometry system. to access the machine can be cumbersome, and lead to loss of productivity. Fingerprint recognition takes less than a few seconds to complete one to many match operation depending on the size of the enrolment database [2], and doesn’t require the operator to remember any usernames and passwords. The inside of the manufacturing environment tends to be relatively controlled in terms of temperatures and climate changes, which makes it suitable for fingerprint recognition. Facial recognition is used in combination with fingerprint recognition to provide an added level of authentication. Also, commercially available facial recognition software’s provide capability of tracking faces within a predetermined field of vision. This feature can be used to lock the machine if the operator steps away from the machine, and unlock the machine only if the authorized operator steps back into the field of vision of the facial recognition system. If a situation arises where Fig 2. Stages for physical access to manufacturing an audit trail is required for usage of particular machine environment. transactions from the fingerprint recognition system, and visual information can be used to provide accurate details. Iris recognition performs optimally in a well lit, and controlled environment, which was the reason for using it
  • 4. recognition is used to control physical access, and remove the inadequacies and management issues related to traditional lock and key systems or card based systems. Logical access is secured by using fingerprint recognition in tandem with facial recognition to overcome the weakness of traditional logical access security based on usernames and passwords. Remote authentication is performed using iris recognition as it is best suited to work in controlled environments, and provide a high level of security. The entire framework is centralized to provide ease of management, and increased security. The current framework does not integrate smart cards or radio frequency identification (RFID) tags in conjunction with biometrics. Smart cards could provide local storage of templates, as well as an additional layer of Fig 3. Stages for logical access to manufacturing identification. Similarly RFID tags can be used instead of environment. facial tracking to lock down a machine if the operator steps out of range of the RFID scanner. One of the This cross referencing prevents an unauthorized improvements for the future is to concentrate on individual from entering the premises and using a developing policies, and procedures which would make machine that is not locked, is schematically shown in Fig the biometric security system more effective. The system 3. in its present form does not record if an operator leaves The facial recognition system also provides facial the manufacturing premises, and then re-enters. Future tracking capabilities which can be used to lock down a work should focus on exit protocol so that records can be machine when the operator moves away from the field of more accurate. An in depth return on investment study can vision of the camera. This functionality prevents also be carried out to assess the feasibility of large scale unauthorized operators from using a machine that an deployments, although long term considerations, and authorized operator has logged on to. intangible advantages should be measured. 5. OTHER CONSIDERATIONS 7. REFERENCES The proof of concept described in this paper is by no [1] Haley, T. A., The Electronic Records Regulation: An means completely secure. The system was designed to Implementation Guide for the Food Industry, reduce security inadequacies, and indeterministic nature http://www.ces.purdue.edu/extmedia/FS/FS-12/FS- of audit trails in current manufacturing environments. 12W.html Security in any system is only as strong as its weakest link. Security technology can keep on advancing, but the [2] http://www.neurotechnologija.com/verifinger.html. human interaction with the system is a step that technology cannot replace. Human interaction with the [3] Wildes, R.P., Iris Recognition: An Emerging system has to be considered whenever a security system is Biometric Technology, Proceedings of IEEE, Sept., 1997. designed. For example, in the system described in this paper the administrator of the system has to ensure that proper credentialing takes place during enrolment in order to link the correct identity with the biometric template. Awareness and implementation of policies that limit the possibility of malicious actions will help reap the benefits of advancement made by technology. 6. CONCLUSION AND FUTURE WORK The main aim of this research project was to demonstrate effective use of advanced technologies that keep up the advances made in the manufacturing environment. The proof of concept is designed using commercially available biometric products, and systems. Hand geometry