Smart Factory?

FactoCrypt, a security solution for secure data collection, monitoring, and process control for Smart Factory

After the announcement of “Industry 4.0,” ‘Smart Factories’ have emerged as an important topic in the IoT era. To develop a Smart Factory, tens of thousands of sensors are required and it is necessary to track down the location of parts in real time while collecting and analyzing data before proceeding to the automation process.

Complex and precise industrial management systems remain vulnerable to malicious attacks by hackers. Malfunctions of certain facility parts can compromise safety and quality of products. They can even lead to severe personal injuries and property damage. To solve this problem, an organization was established to respond to Smart Factory security threats. In 2008 in the U.S. and Korea, the Smart Factory Group was organized to deal with security issues.

At Penta Security, we have extensive security system references and expertise in Smart Factory security such as AMI (Advanced Metering Infrastructure). Companies looking to introduce Smart Factories are required to authenticate and protect communication between their systems while ensuring the security of their servers and infrastructure in order to prevent personal injuries and maintain processing quality.

iot-security-one (1)

About FactoCrypt

There are four types of security threats that need to be dealt with in the IoT-based Smart Factory environment. Hackers attempt to compromise the integrity of data and attack networks in the IoT communication environment through N/W sniffing, or data tampering repudiation. Therefore, all these threats need to be dealt with in order to ensure security in Smart Factories.

FactoCrypt Structure

FactoCrypt is designed to protect the Smart Factory environment against the four main types of security threats. By installing H/W-based security modules and creating a secure IoT network environment, it can maintain the integrity of data while protecting networks in the IoT communication environment. In addition, the solution introduces PKI (Public Key Infrastructure) technology to provide certificates for each device and user in order to prevent N/W sniffing. Finally, a customized security environment is created based on the experience and know-how we have gained while working with corporate clients in order to prevent data tampering in the application areas and maintain the integrity of data.