ã¯ããã«
ã€ã³ãã¹ããª4.0ã®äžå¿ã«ããã®ã¯ããã¡ã¯ããªã»ãªãŒãã¡ãŒã·ã§ã³(FA)ã§ãããã®ãããã€ã³ãã¹ããª4.0ã®å®çŸãç®æãäžã§ã¯ããããã®ååšãéèŠã«ãªããŸããã€ãŸããçµã¿ç«ãŠäœæ¥ãªã©ãæ ãããããããèªåŸèµ°è¡æ¬éãããã(AMR:Autonomous Mobile Robot)ãååãããã(ã³ããã)ãªã©ãç£æ¥çšã®ããããå šè¬ãéèŠãªåœ¹å²ãæ ããšããããšã§ããå®éãçŸåšã®ããããã¯ããã¹ããŒãã§å調çãªãã®ã«ãªã£ãŠããŸãããããã人éã®ä»å ¥ã®æç¡ã«ãããããè€éãªäœæ¥ãããªããããã«ãªãã€ã€ãããŸãããã®ããã«ããŠããããã®å©çšãæ¡å€§ããçµæããªãŒãã¡ãŒã·ã§ã³ã®ã¬ãã«ã¯å€§ããåäžããŸãããããã«äŒŽãããããããå¶åŸ¡ããã·ã¹ãã (ããããå¶åŸ¡ã·ã¹ãã )ã®å®å šæ§ãšã»ãã¥ãªãã£ã®åŒ·åãåŒ·ãæ±ããããããã«ãªããŸããã
åœåãããããã¯äž»ã«å·¥å Žã®è£œé ããã¢ã§äœ¿çšããããã®ã§ããããããçŸåšã§ã¯ãå»çãè»äºãç©æµã蟲æ¥ãšãã£ãæ§ã ãªåéã§æŽ»çšãããããã«ãªã£ãŠããŸããå®å šæ§ãšã»ãã¥ãªãã£ã¯ã10幎ã»ã©åãšæ¯ã¹ãŠã¯ããã«éèŠãããããã«ãªããŸãããäºæ ãå®å šã«é²æ¢ããã®ã¯é£ããã§ãããããæªæããæ»æã¯é»æ¢ã§ããããã«ããªããã°ãªããŸãããæªæãæã£ã人ã«ãããããä¹ã£åãããèªç±ã«å¶åŸ¡ããããããªããšãããã°èŽåœçã§ããããã«ãããçµæžç/財æ¿çãªé¢ã§æ·±å»ãªäºæ ã«é¥ãå¯èœæ§ããããŸãã
ããããå¶åŸ¡ã·ã¹ãã ãæ±ããã»ãã¥ãªãã£äžã®ãªã¹ã¯
ãŸãã¯å³1ãã芧ãã ãããããã¯ãããããå¶åŸ¡ã·ã¹ãã ãæ±ããã»ãã¥ãªãã£äžã®ãªã¹ã¯ã«ã€ããŠãŸãšãããã®ã§ãããããã®èŠå ã«ãããããããå¶åŸ¡ã·ã¹ãã ã¯æªæããæ»æã«ãããããå¯èœæ§ããããŸã1ã
ç¶ããŠã衚1ãã芧ãã ãããããã¯ããã€ãã®æžå¿µäºé ã®æŠèŠã瀺ãããã®ã§ãã
ç£æ¥/ããããåãã®æ³ä»€ããµã€ããŒã»ã¬ãžãªãšã³ã¹ãšå®å šå¯Ÿçã®åŒ·åãåŸæŒã
ãµã€ããŒã»ãã¥ãªãã£ãåãå·»ãç¶æ³ã¯æ¥éã«å€åããŠããŸããç£æ¥åéãããããã®åéã察象ãšããèŠå¶ãæ³ä»€ãå¢ããŠããããšããããããå€åã®1ã€ã§ããçŸåšã§ã¯ããµã€ããŒã»ãã¥ãªãã£ã察象ãšããæ³åŸãå°ãªããããŸããã代衚çãªãã®ãšããŠã¯ãEUã®ãµã€ããŒã»ãã¥ãªãã£æ³(EU Cybersecurity Act)ããµã€ããŒã»ã¬ãžãªãšã³ã¹æ³(EU Cyber Resilience Act)ãç±³åœã®éèŠã€ã³ãã©åããµã€ããŒã»ã€ã³ã·ãã³ãå ±åæ³(U.S. Cyber Incident Reporting for Critical Infrastructures Act)ãæããããŸããäžåœãã€ã³ãã§ãæ°ããªèŠå¶ãæ³ä»€ãèªçããŠããŸããç±³åœç«æšæºæè¡ç ç©¶æ(NIST:National Institute of Standards and Technology)ã®OTã»ãã¥ãªãã£ã»ã¬ã€ã(Guide to Operational Technology(OT) Security)ãIEC 62443ã®ãããªèŠæ Œã¯ãæè¡äŒæ¥ã«ãšã£ãŠã®æéã«ãªããŸããã»ãã¥ã¢ã»ãã€ã»ãã¶ã€ã³ã®ã¢ãããŒããæ¡çšããã°ããµã€ããŒæ»æã«å¯ŸããŠã¬ãžãªãšã³ããªå¶åŸ¡ã·ã¹ãã ãéçºããããšãã§ããŸãã
IEC 62443ãå®ããIACSã®èŠä»¶
IEC 62443ã¯ãIACS(Industrial Automation and Control Systems)ã®ã»ãã¥ãªãã£ã«é¢ããèŠæ Œã§ã2ãç£æ¥çšãªãŒãã¡ãŒã·ã§ã³ã®åéã§ã¯ãå¶åŸ¡ã·ã¹ãã ãéçºããéã®æéãšããŠåºãæ¡çšãããŠããŸãããŸããå€ãã®èŠå¶ã«ãããŠãããã®èŠæ Œã«æºæ ããããšãæšå¥šãããŠããŸããã€ãŸãããã®éèŠæ§ã¯æããã ãšèšããã§ããããå®éããã®èŠæ Œã«é¢é£ããèŠå¶ã«æºæ ããã°ãå¶åŸ¡ã·ã¹ãã ãæ±ããæœåšçãªãµã€ããŒã»ãã¥ãªãã£ã®ãªã¹ã¯ã軜æžããããšãå¯èœã«ãªããŸãããŸããå¶åŸ¡ã·ã¹ãã ã«ãããã»ãã¥ãªãã£ã»ã®ã£ããã«å¯ŸåŠããéèŠãªã¢ã»ãããä¿è·ããããšãã§ããŸããIEC 62443ã«æºæ ããã°ãå€ãã®ã¡ãªããã享åã§ãããšããããšã§ã(å³2)ã
-

å³2. IEC 62443ã®æŠèŠãå æ¬çãªã»ãã¥ãªãã£èŠæ ŒãšããŠçå®ãããŠããããšãããããŸã
IEC 62443ã§ã¯ãããã»ã¹ãæé ã«ã€ããŠå€ãã®äºæãèŠå®ããŠããŸãããã ãIEC 62443-4-1ãšIEC 62443-4-2ã§ã¯ãã³ã³ããŒãã³ãã®ã»ãã¥ãªãã£ã«é¢ããèŠå®ã«éç¹ã眮ãããŠããŸããIEC 62443-4-2ã§ã¯ãã³ã³ããŒãã³ããæ¬¡ã®ããã«åé¡ããŠããŸããããªãã¡ããœãããŠã§ã¢ã»ã¢ããªã±ãŒã·ã§ã³ããã¹ãã»ããã€ã¹ãçµã¿èŸŒã¿ããã€ã¹ããããã¯ãŒã¯ã»ããã€ã¹ã®4çš®ã§ãããã®èŠæ Œã§ã¯ãåçš®ã®ã³ã³ããŒãã³ãã«å¯ŸããèŠæ±äºé (CR:Component Requirement)ãšåŒ·åèŠæ±äºé (RE:Requirement Enhancement)ã«åºã¥ããŠæ©èœã®ã»ãã¥ãªãã£ã»ã¬ãã«(SL:Security Level)ãå®ããŠããŸããSL1ããSL4ãŸã§ã®4ã€ã®ã¬ãã«(SL)ã®ãã¡ãSL3ãšSL4ã¯ããŒããŠã§ã¢ã»ããŒã¹ã®ã»ãã¥ãªãã£ãå¿ èŠãšããŸãã
ããããåãã»ãã¥ãªãã£ã»ã·ã¹ãã ã®éçºã«å¿ èŠãªæ©èœãšæè¡
ã»ãã¥ã¢ãªããããå¶åŸ¡ã·ã¹ãã ãæ§ç¯ããã«ã¯ãå³1ãšè¡š1ã«ç€ºãããªã¹ã¯ã«å¯ŸåŠããå¿ èŠããããŸããæè¡çãªé¢ã§å¿ èŠãªæ©èœãæè¡ãšããŠã¯ã以äžã®ãããªãã®ãæããããŸãã
- ã»ãã¥ã¢ãªèªèšŒ:ããã€ã¹/ã³ã³ããŒãã³ãã®IDã確èªããããã«ã»ãã¥ã¢èªèšŒçšICãæ¡çšãã
- ã»ãã¥ã¢ãªã³ããã»ããµ:ã»ãã¥ã¢ãªã¹ãã¬ãŒãžãšæå·åã®åŠçã«å¯Ÿå¿ããããã®å°çšããŒããŠã§ã¢ã掻çšãã
- ã»ãã¥ã¢ãªéä¿¡:ããŒã¿äº€æã«å¯Ÿããä¿è·ãå®çŸããããã«ãæå·åçšã®ãããã³ã«ãå®è£ ãã
- ã¢ã¯ã»ã¹å¶åŸ¡:ã·ã¹ãã ã«å¯Ÿããäžæ£ãªã¢ã¯ã»ã¹ãå¶éããããã«ãæš©éããã现ããèšå®ãã
- ç©ççãªã»ãã¥ãªãã£å¯Ÿç:ç©ççãªæ¹ç«ãé²ãããã®å¯Ÿçãå°å ¥ãã
ã»ãã¥ã¢èªèšŒçšICãã³ããã»ããµICãªã©ã¯ã¿ãŒã³ããŒã®ãœãªã¥ãŒã·ã§ã³ãšããŠèšèšãããŠããŸãããããã¯äžèšã®èŠä»¶ãæºããããšãç®çãšãããã®ã§ãããå®è£ ã容æã§ã³ã¹ãå¹çã«åªããŠããŸãããã®ãããªå°çšICã®æ©èœã¯ããã¹ãã»ããã»ããµåãã«èšèšãããå æ¬çãªãœãããŠã§ã¢ã»ã¹ã¿ãã¯ã«ãã£ãŠè£å®ãããŸã2ã
ãªãããã£ã¹ã¯ãªãŒãã®ã»ãã¥ã¢ã»ãšã¬ã¡ã³ãã䜿çšããã°ãæ»æãåããã¢ããªã±ãŒã·ã§ã³ã»ããã»ããµããå¥ã®ICã«ä¿åãããèªèšŒæ å ±ãžã®ã¢ã¯ã»ã¹ã鲿¢ããããšãã§ããŸã(éé¢)ããã®ãããã·ã¹ãã ã®ã¬ãžãªãšã³ã¹ãé«ãŸããŸãã
ã»ãã¥ã¢ãªã·ã¹ãã ãéçºããããã«ã¯ãæ§é åãããã¢ãããŒããæ¡çšããå¿ èŠããããŸãããã®ã¢ãããŒãã¯ãèŠä»¶ã®åéãè åšã®ã¢ãã«åãã»ãã¥ã¢ãªèšèšãå®è£ ããã¹ããèªèšŒãä¿å®ãå å«ãããã®ã«ãªããŸããã»ãã¥ã¢éçºã©ã€ããµã€ã¯ã«(SDLC:Secure Development Life Cycle)ã«åŸãã°ãéçºããã»ã¹ã«æåãã確å®ã«ã»ãã¥ãªãã£å¯Ÿçãçµã¿èŸŒãŸããããšã«ãªããŸãã
ããããã®ã»ãã¥ãªãã£ã確ä¿ããããã®çæ³çãªããŒãããŒ
ã¢ããã°ã»ããã€ã»ãº(ADI)ã¯ãã»ãã¥ãªãã£ã確ä¿ããããã®ã³ããã»ããµãšããŠãMAXQ1065ãããDS28S60ããšãã£ã補åãæäŸããŠãããã¿ãŒã³ããŒã»ãœãªã¥ãŒã·ã§ã³ãšãªãICã®ãã³ããŒãšãããŸããããããADIã§ã¯ãã®ãããªICãã³ããŒãšããæ çµã¿ãè¶ ããŠãããããæ¥çãã»ãã¥ãªãã£ã«é¢ãã倿§ãªèŠä»¶ãæºããããããªæ¯æŽãšããŠãã»ãã¥ãªãã£ãšãããã£ã¯ã¹ã«é¢ããåºç¯ãªå°éæè¡ã®èåãå³ã£ãŠããŸãããããããããã®å®å šã確ä¿ããäžã§çŽé¢ããç¹æã®èª²é¡ã«å¯ŸåŠå¯èœãªçæ³çãªãœãªã¥ãŒã·ã§ã³ãæäŸããããšã«ã€ãªãããåãªãICãã³ããŒã§ã¯ãªãããœãªã¥ãŒã·ã§ã³ã»ãããã€ããšããŠã®åœ¹å²ãæ ãããšã«ãªãããã§ããã»ãã¥ãªãã£ãããããã«ç²ŸéããŠããããšã§ãããŒãããŒãã¡ã¯å æ¬çãªãœãªã¥ãŒã·ã§ã³ã®æŽ»çšãå¯èœãšãªããããŒããŠã§ã¢ããœãããŠã§ã¢ãã·ã¹ãã ã®åã¬ãã«ã«ããã課é¡ã解決ã§ããããã«ãªãããã§ãã
ãŸããããããã®ã»ãã¥ãªãã£ã確ä¿ããããã«ã¯ãå æ¬çãªã¢ãããŒããå¿ èŠã ãšããããšã匷ãèªèããŠããŸããããã«åºã¥ããã³ã³ããŒãã³ãã»ã¬ãã«ã®è£œåãéçºããã ãã§ãªããã·ã¹ãã ã»ã¬ãã«ã®èŠç¹ã§å¿ èŠã«ãªããã®ãæäŸããŠããŸããã€ãŸããããŒããŠã§ã¢ãšãœãããŠã§ã¢ãã«ããŒããããšã«ãšã©ãŸãããã·ã¹ãã éã®éä¿¡ãã·ã¹ãã ã®çµ±åãšãã£ãåŽé¢ã«ã泚ç®ããŠããŸããããã«ããããã¹ãŠã®éèŠãªã³ã³ããŒãã³ããã·ãŒã ã¬ã¹ã«çµ±åã§ããããã«ããŠããŸãã
ããã§ãADIãšèªåè»æ¥çã®äŒæ¥ã«ãã代衚çãªã³ã©ãã¬ãŒã·ã§ã³ã®äŸã玹ä»ããŠãããŸããããããã¯ãã¯ã€ã€ã¬ã¹ã»ããããªç®¡ç(ããããªã»ãããŒãžã¡ã³ã)ã·ã¹ãã (wBMS:Wireless Battery Management System)ã«é¢ãããã®ã§ããADIã¯èªåè»æ¥çã®ããŒãããŒãšç·å¯ãªé£æºãæ§ç¯ããããšã«ãã£ãŠISO 21434ã®èªèšŒãååŸããwBMSãéçºããŸãããã€ãŸãããã®wBMSã¯å®å šãã€ã»ãã¥ã¢ãªãã®ã§ããããšãå®èšŒãããŠãããå ç¢æ§ã®é«ãã»ãã¥ãªãã£å¯Ÿçãå®çŸããããšã瀺ããããšãšãªããŸããåæã«ããã®wBMSã¯å æ¬çãªãœãªã¥ãŒã·ã§ã³ãæäŸãããšããADIã®ã³ãããã¡ã³ããå ·çŸåãããã®ã§ããããŸãã
ADIã¯ãã»ãã¥ãªãã£ã«é¢ããå®è£ ãè¡ãããã®èªç€Ÿä¿æã®å°éæè¡ãåºã掻çšãããããã«ããããšèããŠããŸãããã®ããã«ã¯ãããããæ¥çã®ããŒãããŒãšããèªåè»æ¥çã§è¡ã£ãã®ãšåæ§ã®å調çãªåãçµã¿ãæšé²ããå¿ èŠããããŸããã¹ããŒã¯ãã«ããšç·å¯ã«é£æºããããšã«ãããèªåè»åéã§ã®çµéšãšææã掻ãããŠå®å šãã€ã»ãã¥ã¢ãªããããã®éçºã«è²¢ç®ããããšãçŸåšã®ç®æšã®1ã€ã§ãã
ãŸããã»ãã¥ãªãã£ã«é¢ãã倿§ãªèœåãæŽ»ããã¹ããç®èº«çãªåãçµã¿ãé²ããŠãããããŒãããŒã«å¯ŸããŠããµã€ããŒã»ãã¥ãªãã£ã«é¢é£ããããããæ¡ä»¶ã«å¯Ÿããæ¯é¡ãªãã¬ãã«ã®å°éæè¡ãšãµããŒããæäŸããŠããŸãããã®ããã·ã¹ãã èšèšã«æºããäŒæ¥ã«ãšã£ãŠã®éžæãã¹ãããŒãããŒãšãªããçŽ è³ªãåããŠãããšèšããŸãã
ADIã«ããã»ãã¥ãªãã£ã®è©³çŽ°ãªæ å ±ã¯ã以äžã®ãããªã¢ãããŒãã«ãã£ãŠååŸããããšãã§ããŸãã
- EngineerZoneã§ã¯ãã»ãã¥ãªãã£ã«é¢é£ããããã°ãå ¬éããŠããŸããããã§è¡ããããã£ã¹ã«ãã·ã§ã³ã«åå ããã°ãçµã¿èŸŒã¿ã»ãã¥ãªãã£ã®ã³ãã¥ããã£ãšã®äº€æµãå³ããç¥èŠãå ±æããããšãã§ããŸãããŸãã¯è³ªåãããšãã圢ã§ã³ãã¥ããã£ã«åå ããããšã«ãããé²è¡äžã®è°è«ã«è²¢ç®ããŠããã ããã°å¹žãã§ãããŸãããã»ãã¥ãªãã£ããšããèªã§æ€çŽ¢ãè¡ãã°ãããã«é¢ãã貎éãªèšäºããªãœãŒã¹ã«ã¢ã¯ã»ã¹ã§ããŸãã
- ADIã®Webãµã€ãã®çµã¿èŸŒã¿ã»ãã¥ãªãã£ã®ããŒãžã1-Wireã«é¢ããããŒãžã掻çšããã°ãæ§ã ãªã»ãã¥ãªãã£è£œåã«é¢ããæ å ±ã貎éãªç¥èŠãåŸãããšãã§ããŸããææ°ã®æè¡èšäºãã¢ããªã±ãŒã·ã§ã³ã»ããŒãããããªã確èªããŠãããããšã§ãã»ãã¥ãªãã£ã«é¢ããçè§£ãæ·±ããããšãã§ããã§ãããã
- wBMSã«ã€ããŠã¯ãADIã®ç¡æã®æè¡æ å ±èªãã¢ããã°ã»ãã€ã¢ãã°ãã®èšäºãã¯ã€ã€ã¬ã¹ã»ããããªç®¡çã·ã¹ãã ã®æ°æä»£ã泚ç®ãã¹ãã¯ã»ãã¥ãªãã£ã®ã¬ãã«ããåèã«ãªããŸãã
ããããã®ãžã§ã€ã³ãã»ã³ã³ãããŒã©ã®æ§æäŸ
ããããã§ã¯ããžã§ã€ã³ã(é¢ç¯)ã®å¶åŸ¡ãéåžžã«éèŠã§ããå³3ã«ç€ºããã®ã¯ããžã§ã€ã³ãã»ã³ã³ãããŒã©ã®èšèšäŸã§ãã
ãã®èšèšã§ã¯ãMAXQ1065ãæ¡çšããŠããŸããåICã䜿çšããããšã«ãããã»ãã¥ã¢ã»ããŒãã®æ©èœãå®è£ ããããšãã§ããŸãããã®çµæãã·ã¹ãã å šäœã®ã»ãã¥ãªãã£ã匷åããããšãå¯èœã«ãªããŸããMAXQ1065ã¯ãæå·éµçšã®ã»ãã¥ã¢ãªã¹ãã¬ãŒãžãã»ãã¥ã¢ãªéä¿¡ãããã³ã«ãæå·åŠçãªã©ã«å¯Ÿå¿ããæ§ã ãªæ©èœãåããŠããŸãã
ãŸãšã
ä»åŸã®ããããéçºã«ãããŠã¯ããµã€ããŒã»ãã¥ãªãã£ãéåžžã«éèŠãªèŠçŽ ã«ãªããŸããæ§ã ãªè åšã«å¯Ÿããä¿è·ãå®çŸããã«ã¯ãã»ãã¥ã¢ãªèªèšŒãæå·åãããéä¿¡ããµãã©ã€ã»ãã§ãŒã³ãžã®ã»ãã¥ãªãã£æè¡ã®é©çšãšãã£ã匷åºãªå¯Ÿçãå°å ¥ããããšãäžå¯æ¬ ã§ããéèŠãªã®ã¯ããµã€ããŒã»ãã¥ãªãã£ãäœãããåªå ããããšã§ãããã®äžã§ãADIã®å°éæè¡ã掻çšããã°ãçžäºã«æ¥ç¶ãããäžçã«åºçŸããæ°ããªãªã¹ã¯ãåé¿ãã€ã€ãããããã®æœåšèœåãæå€§éã«åŒãåºãããšãå¯èœã«ãªããŸãã
ãªãããRobotic Security Use Cases and Implementation for a Secure Future(ããããã®ã»ãã¥ãªãã£æ©èœã®ãŠãŒã¹ã»ã±ãŒã¹ãšå®è£ ãã»ãã¥ã¢ãªæªæ¥ãå®çŸããã«ã¯ïŒ)ããšããADIã®èšäºã§ã¯ããµã€ããŒã»ãã¥ãªãã£ãšããããã®é¢ä¿ã«ã€ããŠè©³ãã説æããŠããã»ããçŸå®ã®ã·ããªãªã«ãããŠADIã®ã»ãã¥ãªãã£è£œåãæŽ»çšããæ¹æ³ã玹ä»ããŠããŸãã
æ¬èšäºã¯Analog Deviceã®æè¡è§£èª¬èšäºãEnsuring a Secure Future for Robotics: The Role of Cybersecurityãã翻蚳ãããã®ãšãªããŸã
åèè³æ
1:Jean-Paul A. YaacoubãHassan N. NouraãOla SalmanãAli ChehabãRobotics Cyber Security: Vulnerabilities, Attacks, Countermeasures, and Recommendations(ãããã£ã¯ã¹ã®ãµã€ããŒã»ãã¥ãªã㣠-- è匱æ§ãæ»æã察æçãæšå¥šäºé )ãInternational Journal of Information Securityã2021幎3æ
2:Christophe TremletãIEC 62443ã·ãªãŒãºã®èŠæ Œ:ãµã€ããŒæ»æããã€ã³ãã©ã¹ãã©ã¯ãã£ãä¿è·ããæ¹æ³ãAnalog Devicesã2023幎4æ


