=Paper= {{Paper |id=Vol-2590/short28 |storemode=property |title=Model of Secure Informational Messages for Ensuring Informational Interaction in Smart Factory |pdfUrl=https://ceur-ws.org/Vol-2590/short28.pdf |volume=Vol-2590 |authors=Maria Usova,Sergey Chuprov,Ilya Viksnin,Oksana Baranova |dblpUrl=https://dblp.org/rec/conf/micsecs/UsovaCVB19 }} ==Model of Secure Informational Messages for Ensuring Informational Interaction in Smart Factory== https://ceur-ws.org/Vol-2590/short28.pdf
     Model of Secure Informational Messages for
     Ensuring Informational Interaction in Smart
                      Factory

    Maria Usova[0000−0001−6981−035X] , Sergey Chuprov[0000−0001−7081−8797] , Ilya
     Viksnin[0000−0002−3071−6937] , and Oksana Baranova[0000−0002−7495−8647]

                     ITMO University, Saint-Petersburg, Russia
              gipurer@gmail.com, chuprov@itmo.ru, wixnin@mail.ru,
                        oksana-baranova1212@rambler.ru



        Abstract. The need to reduce costs and human involvement in the
        production processes has led to the development of new production ap-
        proaches such as the Smart Factory concept. Smart Factory is the basis
        of Industry 4.0. The model of the information space provides a wide
        spectrum of opportunities for developers to implement new methods of
        information interactions within the system of Smart Factory. In this pa-
        per we propose the model of informational message and the basic model
        of information space for Smart Factory networks. The following model
        helps to ensure confidentiality of the data transmitting by the elements
        of Smart Factory.


Keywords: Smart Factory · Informational Message · Industry 4.0


1     Introduction
The Smart Factory is a vital part of Industry 4.0. At the present moment it
is desired as a fully autonomous and self-organized manufacturing system that
aimed to reduce the influence of the human factor in the production process.
It brings a wide list of topics to be discussed. Authors of [4] defined 8 research
fields for a smart factory model such as decision making, cloud computing, in-
frastructure, data handling, cyber-physical systems, Internet of Things, digital
transformation and human-machine interaction.
    The main disadvantage of the existing smart factory models is the lack of the
information interactions’ formal description among system elements. Generally
all basic operations conducting by agents are dependent on the type and the
content of the received messages. Errors in messages transmission can lead to
the system malfunctions or crashes.
    In the present work, we focus on the representation of information in the
Smart Factory. We proposed a general description of informational interaction,
described model of informational messages and defined their features.
Copyright c 2019 for this paper by its authors. Use permitted under Creative Commons License
Attribution 4.0 International (CC BY 4.0).
2       M. Usova, S. Chuprov, I. Viksnin

2    Related Work

Nowadays the smart factory is represented as a fully connected and flexible sys-
tem [1], which uses information and adapts it for new technological requests.
Supply manufacturing chains transformed from a static sequence to a dynamic
one that utilize many sources of information to drive a production process. Ac-
cording to this paper, the five key characteristics of a smart factory are: con-
nected, optimized, transparent, proactive, and agile.
    One of the approaches for smart factory processes modeling is ontology-based
proposal [2]. In this case, the researches are focused on the main concepts of a
factory, objects, and their features. The purpose of the approach is to repre-
sent the most important relations in the industrial domain to achieve context
representation and context reasoning.
    Another solution for Smart Factory architecture is to build a blockchain-
based cyber-physical system [5]. In this paper, the informational interaction
among Smart Factory elements is described. The internal network has a man-
agement hub and storage level, the information in the system is encrypted using
private and public keys.
    Some of the researchers had already published frameworks for simulation of
information flows in a smart factory [3].


3    Smart Factory Model

Generally, the Smart Factory may be presented as a structure < A, I, R, P >
which consists of the sets of the following objects.
    The set A = {(a1 | q1 ), . . . , (an | qn )} is a set of autonomous agents which
communicate with each other via informational messages. The agents are not
static, they may change their position according to the task which they perform.
The task is a set of operations in a unique order for completing the stage of
product assembly. The system of agents is self-organized, it does not need a com-
puting center for manufacturing management. The process of task distribution
may be random or follow a predefined rule. When the agent gets his position and
the task, it may start functioning and product assembly. Parameter 0 ≤ qi ≤ 1
is a value that characterizes the access level of each agent of the system to an
elementary message placed in informational space. The higher the value of qi an
agent has, the higher the access level it has. We propose the assumption that the
number of robots involved in the production process is constant and the system
is not scalable.
    Set I is a set of elementary informational messages described in Section 4.
The set R = r1 , . . . , rs is a set of resources used for product assembly.
    The production result is a set of products P r = pr1 , . . . , prs that is assembled
as a result of the uniquely defined production algorithm. On the other hand,
the product is a result of a function pri = f (Ai , Ri , I, t) which is indirectly
dependent on the informational messages transmitted by agents and the time
spent on product assembly.
             Model of Secure IM for Confidentiality Assurance in SF Networks              3

4     Representation of the Information in Smart Factory
4.1   Informational Message Model
A set of all the informational messages is presented as a set I = {i1 , i2 , . . . , il }.
This set has an additional set of the parameters characterizing the security level
for the particular message or the access level. This is the set D = {d1 , d2 , . . . , dl },
0 ≤ di ≤ 1. The higher the value of the parameter, the higher access level the
particular agent has to have.
    Figure 1 represents the proposed structure of the informational message.


         field 1    field 2    field 3     field 4    field 5    field 6     field 7

           a          b           d         time       type       info        DS



Fig. 1. Structure of the informational message for Smart Factory elements communi-
cation


   The content of the messages is represented as a fields of the particular type
and length. The fields description is given below:
 – a is the ID of the agent who sent the information message;
 – b is the ID of the agent who received the information message;
 – d is an access parameter for the following message. Agent-sender may spec-
   ify this parameter by himself but it cannot be higher than his own access
   parameter. Alternatively, it may be specified automatically. In this case it
   will be calculated as di = min(qa , qb ), where qa is an access parameter for
   agent a, qb is an access parameter of agent b;
 – time is the time, when the message was sent. We propose the assumption
   that the transmission time tends to zero value. Consequently, the value of
   the sending and delivery time are equal;
 – type is the message type;
 – inf o is a content of the message;
 – DS is the digital signature used for the security of message transmission.

4.2   Informational space
Basically, the informational space is a set of information messages in the Smart
Factory. In fact, it may be presented in several different ways.
    In the first case we used parameters a, b and time to introduce a three-
dimensional space (Figure 2). The axis a is the axis of agents sending informa-
tional messages, axis b is the axis of agents receiving informational messages,
axis time is the time axis. The number of agents is limited, n is the last agent’s
ID, the axes a and b are limited by agents an , bn .
4        M. Usova, S. Chuprov, I. Viksnin

   To introduce the informational space, the following assumptions were pro-
posed:
    – all the agents are discretely displayed on the following axis;
    – time is considered as a discrete value;
    – Messages transmission time tends to zero. This assumption allows to find
      the particular message in the space.




                                        b




                                   bi




                                                     ai         a
                                            i




                           timei


                    time



          Fig. 2. Three-dimensional representation of the informational space.


   When the agent-sender transmits the message, it specifies the parameter b as
the ID of the agent-receiver. There are three scenarios how the parameter could
be specified:
1. b = 0. If the parameter b is 0, it means that agent sent the message to itself.
   The type of the message is “own agent’s message” and it is a work report.
   The set of such messages is a set Iown ;
2. b = (1, n). The messages of this class indicate the interaction between
   agents a and b. The set of the messages transmitting between agents is a
   set Iinteraction ;
3. b = n+1, b = all. This messages are broadcasting to all agents. All the agents
   satisfying the condition q ≥ d have an access to them. These messages are
   placed to the set Iall .
According to these parameters, we consider the information space as a set of
subsets of information messages grouped by their current location:
          Model of Secure IM for Confidentiality Assurance in SF Networks      5



                              I = Iall ∪ Iinteraction ∪ Iown
   The visualization of the informational space divided by clusters is shown in
the Figure 3.


               Receiver ID




                      n+1
                      (all)
                                        Iall
                          n




                                    Iinteraction




                         0
                                       Iown          n
                                                               Sender ID


               Fig. 3. The informational space divided by clusters.




4.3   Messages Transmitting

Basically, the process of informational messages’ transmitting includes the se-
quential creation of an informational message, digital signature, sending to the
communication channel (informational space), sending a message from the com-
munication channel to the receiver and checking the digital signature by the
receiver agent.


4.4   Possible Actions with Messages

Here we describe the actions, which agents could perform on messages.

1. Reading. All agents possessing sufficient access rights have rights to read
   messages from the Iall cluster. Reading messages from the Iinteraction and
   Iown is performed by the receiver-agents and sender-agents for the first case,
   and by sender-agents for the second case.
2. Writing. It is possible to generate a message once only, rewriting an existing
   message is impossible.
6         M. Usova, S. Chuprov, I. Viksnin

3. Exploit. The agents who have rights to read the informational message have
   the rights to exploit the data contained in these messages. It is understood
   that the messages are intended for a specific group of agents in the factory
   system.


5      General Case of Informational Channel

Due to the fact that the process of informational messages’ transmitting is a
process that includes the sequential creation of an informational message, digital
signature, sending to the communication channel (informational space), sending
a message from the communication channel to the receiver, and checking the
digital signature, we propose the informational space as a middle point in the
process of informational messages transmitting. It serves to record informational
messages in the permanent memory of the system. After receiving the message
by the information space, the following basic attributes are assigned to it:

    – the time of creating a memory cell to store it (transmission time);
    – sender-agent, receiver-agent IDs;
    – access level parameter.

    Digital signature and its validation are mandatory steps in the process of
information exchange due to the fact that the possibility of the attack is not
excluded.
    Any of the agents involved in the process of messages transmission can refer
to them for the purpose of reading or exploit using the recording time of the
message and the identification number of the interlocutor-agent as parameters
for the search.


6      Properties of Informational Messages

    – Theoretical properties of informational messages:
       1. Informational messages (IM) are discrete in time and space.
       2. Nonadditiveness. Adding IM to existing ones does not increase the total
          amount of information by the amount of added information.
       3. Nonassociativeness. Let f1 (I) = h(i1 + . . . + in ) is the first function
          algorithm to be executed by the agent, f2 (I) = h(in + . . . + i1 ) is the
          second function algorithm, and the functions differ only in the order
          of summation of certain informational messages, then f1 (I) 6= f2 (I) by
          definition of determinacy of algorithms inside the factory system.
       4. Obsolescence of IM. The data contained in IM may lose their relevance
          after a certain time.
       5. Non-disappearance of IM. As part of the work, the authors introduce
          the assumption that a message placed in informational space cannot be
          deleted.
            Model of Secure IM for Confidentiality Assurance in SF Networks            7

    6. The invariability of information in time. Similar to property 5, an infor-
       mational message in the space cannot be changed by the sender-agent,
       the receiver-agent, or the third-party agent.
    7. Independence of the representation of informational messages for various
       agents, syntactically and semantically.
    8. The pragmatic value of informational messages depends on the class to
       which the agent belongs.
    9. Non-equivalence of the value and usefulness of the information contained
       in the IM (consequence of property 8).
 – Physical properties of informational messages:
    1. Memorability. Due to the fact that the messages transmitted by agents
       are recorded in the information space, these messages are linked to the
       transmission time, therefore, they are also remembered physically.
    2. Transferability. Informational messages are transmitted via communica-
       tion channels within the factory system.
    3. From property 2 follows the ability of the IM to be copied. Let tcopy be
       the point in time at which the message will be copied, then, according
       to (1):
                       i(tcopy , i(tk )) = i(tk ) = i(tcopy ), tk ≤ tcopy     (1)
     4. Reproducibility. In the ideal case, the copied message is syntactically
        identical to the original (reproduced) message. In real systems, there is
        a possibility of copying errors.

    Let a discrete message i(l, X) be transmitted, where l is the length of the
information message, l ∈ N, X = {(x1 |p1 ), (x2 |p2 ), . . . , (xn |pn )} - is the set of
available symbols of the alphabet with the length n and the corresponding error
probabilities of recording the letter is p, 0 6= p 6= 1. To be considered that a
writing error has occurred, the number of incorrectly written characters of the
message must be more than or equal to the number m. Message characters are
written independently of each other. Then the probability of writing a message
is calculated by (2):
                                              l
                                              X
                                   Perror =         Pk                               (2)
                                              k=m


7    Conclusion
The rapid development of the Smart Manufacturing concept arises the need to
provide safe and secure interaction among system elements.To address this issue,
in the present paper we proposed information space concept which allows to im-
plement our developed model of the informational messages for communication
among Smart Factory elements.
    Due to the implementation of digital signature and access parameters to the
informational space, the new structure of informational messages help to ensure
confidentiality of informational interaction. In further work we plan to develop
8       M. Usova, S. Chuprov, I. Viksnin

information interaction simulator and analyze the results of simulation on speed
and security in the presence of the intruder of the information security.


References
1. Burke, R., Mussomeli, A., Laaper, S., Hartigan, M., Sniderman, B.: The smart
   factory.(2017). URL: http://www. smartfactory-owl. de/index. php/en/industry-4-
   0
2. Giustozzi, F., Saunier, J., Zanni-Merk, C.: Context modeling for industry 4.0: An
   ontology-based proposal. Procedia Computer Science 126, 675–684 (2018)
3. Komoto, H., Kondoh, S., Furukawa, Y., Sawada, H.: A simulation framework to
   analyze information flows in a smart factory with focus on run-time adaptability of
   machine tools. Procedia CIRP 81, 334–339 (2019)
4. Osterrieder, P., Budde, L., Friedli, T.: The smart factory as a key construct of
   industry 4.0: A systematic literature review. International Journal of Production
   Economics (2019)
5. Wan, J., Li, J., Imran, M., Li, D., et al.: A blockchain-based solution for enhancing
   security and privacy in smart factory. IEEE Transactions on Industrial Informatics
   (2019)