ã¯ããã«
å è¬ããããããã®ã»ãã¥ã¢ãªæªæ¥ã«åããŠããµã€ããŒã»ãã¥ãªãã£ãæãã圹å²ããšé¡ããèšäºã«ãŠãããããã®å¶åŸ¡ãæ ãã·ã¹ãã ãæ±ããã»ãã¥ãªãã£äžã®ãªã¹ã¯ã«ã€ããŠèª¬æããã»ãããããããéçºããéãç£æ¥åéåãã®ã»ãã¥ãªãã£èŠæ Œãéµå®ããããšã®éèŠæ§ã匷調ããŸããããŸããããããå¶åŸ¡ã·ã¹ãã ã®ä¿è·ã匷åããäžã§äžå¯æ¬ ãªã»ãã¥ãªãã£æ©èœã«ã€ããŠã解説ããŸããã
ããããåãçµã¿ãèžãŸãæ¬çš¿ã§ã¯ãç£æ¥çšã®ãããã/ã³ãããã®æ§æèŠçŽ ãšãªãåçš®ã®ã³ã³ããŒãã³ãã«ã€ããŠèª¬æããŸããæ³šç®ãã¹ãã¯ãããããšäŒŒãå€ãã®ã³ã³ããŒãã³ãããèªåŸèµ°è¡æ¬éãããã(AMR:Autonomous Mobile Robot)ãããã¯ïŒãã¬ãŒã¹ã»ã·ã¹ãã ã§ãäžè¬çã«äœ¿çšãããŠãããšããããšã§ãããŸããæ§ã ãªããããã®ã»ãã¥ãªãã£ã«é¢ãããŠãŒã¹ã»ã±ãŒã¹ã«ã€ããŠã®æ€èšãè¡ã£ãäžã§ãã»ãã¥ãªãã£åãåå°äœè£œåãæŽ»çšããããšã§ã倿§ãªããããå¶åŸ¡ã·ã¹ãã ã«å¿ èŠãªæ©èœãã©ãã ãã·ã³ãã«ã«å®è£ ã§ããã®ããèããŠãããããšæããŸãã
ã»ãã¥ã¢ãªããããå¶åŸ¡ã·ã¹ãã ã«å¿ é ã®æ©èœãšéçºã¢ãããŒã
ããã§ã¯ãã»ãã¥ã¢ãªããããå¶åŸ¡ã·ã¹ãã ã«å¿ é ã®æ©èœãšãã®å®è£ æ¹æ³ã«ã€ããŠèª¬æããŸãããŸãã¯ãæ¬çš¿ãèªã¿é²ããäžã§åæãšãªãç¥èã«ã€ããŠç¢ºèªããŠãããŸããããå¿ èŠã«ãªãã®ã¯ã以äžã®ãããªæ©èœãšå®è£ æ¹æ³ã§ãã
- ã»ãã¥ã¢ãªèªèšŒ:ããã€ã¹/ã³ã³ããŒãã³ãã®IDã確èªããããã«ã»ãã¥ã¢èªèšŒçšICãæ¡çšãã
- ã»ãã¥ã¢ãªã³ããã»ããµ:ã»ãã¥ã¢ãªã¹ãã¬ãŒãžãšæå·åã®åŠçã«å¯Ÿå¿ããããã®å°çšããŒããŠã§ã¢ã掻çšãã
- ã»ãã¥ã¢ãªéä¿¡:ããŒã¿äº€æã«å¯Ÿããä¿è·ãå®çŸããããã«ãæå·åçšã®ãããã³ã«ãå®è£ ãã
- ã¢ã¯ã»ã¹å¶åŸ¡:ã·ã¹ãã ã«å¯Ÿããäžæ£ãªã¢ã¯ã»ã¹ãå¶éããããã«ãæš©éããã现ããèšå®ãã
- ç©ççãªã»ãã¥ãªãã£å¯Ÿç:ç©ççãªæ¹ç«ãé²ãããã®å¯Ÿçãå°å ¥ãã
ã»ãã¥ã¢ãªã·ã¹ãã ãéçºããããã«ã¯ãæ§é åãããã¢ãããŒããæ¡çšããå¿ èŠããããŸãããã®ã¢ãããŒãã¯ãèŠä»¶ã®åéãè åšã®ã¢ãã«åãã»ãã¥ã¢ãªèšèšãå®è£ ããã¹ããèªèšŒãä¿å®ãå å«ãããã®ã«ãªããŸããSDLC(Secure Development Life Cycle)ã«åŸãã°ãéçºããã»ã¹ã«æåãã確å®ã«ã»ãã¥ãªãã£å¯Ÿçãçµã¿èŸŒãŸããããšã«ãªããŸãã
ç£æ¥çšã®ãããã/ã³ãããã®æ§æèŠçŽ ãšãªãã³ã³ããŒãã³ã
å³1ã¯ãç£æ¥çšã®ãããã/ã³ãããã®æ§æèŠçŽ ãšãªãäžè¬çãªã³ã³ããŒãã³ãã瀺ãããã®ã§ãããŸãã衚1ã«ã¯ãããã®ã³ã³ããŒãã³ãã®æŠèŠããŸãšããŠããŸãã
ããããã®ã»ãã¥ãªãã£æ©èœã®ãŠãŒã¹ã»ã±ãŒã¹
ããã§ã¯ãããããã«é©çšãããã»ãã¥ãªãã£æ©èœã®ãŠãŒã¹ã»ã±ãŒã¹ã«ã€ããŠèª¬æããŸãããã®äžã§ãã¢ããã°ã»ããã€ã»ãº(ADI)ãæããç¥èãšè£œåãæŽ»çšãã圢ã§èšèš/å®è£ æ¹æ³ãèããŠã¿ãŸãã
ä¿¡é Œæ§ã®é«ãPLCã®åäœãã²ãŒããŠã§ã€ã®ä¿è·
PLCãšããããã»ã³ã³ãããŒã©ãçµã¿åãããããšã§ããã¡ã¯ããªã»ãªãŒãã¡ãŒã·ã§ã³(FA)ã®ç°å¢ã«ãããé«ç²ŸåºŠã®å¶åŸ¡ãå¯èœã«ãªããŸãããŸããæ§ã ãªããã»ã¹ããã现ããå¶åŸ¡ã§ããããã«ãªããŸãã
ããããã«é¢é£ããæè¡ãé²åããçµæãPLCãšåæ§ã®æ©èœãåããçµ±åã³ã³ãããŒã©ãéçºãããããã«ãªããŸãããFAç°å¢ã«ãããå®å šãªéçšãå®çŸããããã«ã¯ãPLCã®åäœã®ä¿¡é Œæ§ãšã»ãã¥ãªãã£ãé«ããããšã極ããŠéèŠã§ã(å³2)ã
ADIã§ã¯ãChipDNAæè¡ãé©çšãã補åãæäŸããããšã§ã»ãã¥ãªãã£ã®åäžãå³ã£ãŠããŸããåæè¡ã¯ãåã ã®é»åéšåã«åºæã®ç¹æ§ãå©çšããŠã»ãã¥ã¢ãªæå·éµãçæãããšãããã®ã§ãããã®æå·éµã¯ãã¡ã¢ãªã«ã¯ä¿åãããŸããããŸããã»ãã¥ãªãã£ã®äŸµå®³ã®å¯Ÿè±¡ã«ãªãåŸãéçãªç¶æ ã§ä¿åãããããšããããŸããããã®ããããµã€ããŒæ»æã«å¯Ÿããä¿è·ã匷åãããŸãããMAXQ1065ãã¯ããã®ChipDNAæè¡ãæ¡çšããæå·ã³ã³ãããŒã©ICã§ãçµèŸŒæ©åšåãã®è£œåãšããŠãæ¶è²»é»åãå°ãªãããšãç¹åŸŽãšããŸããPLCã«MAXQ1065ã®ãããªããã€ã¹ãé©çšãããšã以äžã®ãããªãŠãŒã¹ã»ã±ãŒã¹ããµããŒãããããšãå¯èœã«ãªããŸãã
- PLCã¢ãžã¥ãŒã«ã®ã»ãã¥ã¢ãªèå¥ãã¯ããŒãã³ã°ã®é²æ¢
- ã»ãã¥ã¢ã»ããŒãããã¡ãŒã ãŠã§ã¢ã®ã»ãã¥ã¢ãªããŠã³ããŒã
- PLCã¢ãžã¥ãŒã«ãšPLCãµãŒãã®éã§è¡ãé察称éµã«ããçžäºèªèšŒ
- ECDH(Elliptic Curve Diffie-Hellman)éµäº€æã«ããã»ãã¥ã¢ãªéä¿¡ã»ãã·ã§ã³ã®ç¢ºç«
- ãããã¯ãŒã¯ã®ãã±ããã®æå·å/埩å·åã«å¯ŸããAES(Advanced Encryption Standard)ã®é©çš
ããŒããšã¯ã©ãŠãã®çŽæ¥éä¿¡ã«å¯Ÿããã»ãã¥ãªãã£
ããããã§ã¯ãããŒããšã¯ã©ãŠãã®éã§çŽæ¥éä¿¡ãè¡ãããããšããããŸã(å³3)ããã®å Žåããªã¢ãŒãã§ã®ç£èŠãããŒã¿ã®åæããœãããŠã§ã¢ã®ã¢ããããŒããšãã£ãæ§ã ãªæ©èœãå®çŸã§ããããšã«ãªããŸãããã®ããã«ã¯ãäž¡è ã®éã®éä¿¡ã«ãããŠã»ãã¥ãªãã£ã確ä¿ããããšãéåžžã«éèŠã§ãã
-

å³3. ããŒããšã¯ã©ãŠãã®éã®çŽæ¥éä¿¡ãMAXQ1065ãçµã¿èŸŒãããšã«ããããã®éä¿¡ã®ã»ãã¥ãªãã£ã確ä¿ããããšãå¯èœã«ãªããŸã
MAXQ1065ã䜿çšããããšã§ãã»ã³ãµãŒãšã¯ã©ãŠãã®éãã»ã³ãµãŒãšã²ãŒããŠã§ã€ã®éã®éä¿¡ã«é©çšããã»ãã¥ãªãã£æ©èœã匷åããããšãã§ããŸããå ·äœçã«ã¯ã以äžã®ãããªå¹æãåŸãããŸãã
- TLS(Transport Layer Security)ãããã³ã«ã®å®è£ ãå¯èœã«ãªããæå·åãããããŒã¿ã®ã»ãã¥ã¢ãªéä¿¡ãä¿èšŒãããŸããTLSã§ã¯çæ£æ§ãæ€èšŒãããæ©å¯æ å ±ãä¿è·ãããŸããããŒããšã¯ã©ãŠãã®éã®ã»ãã¥ã¢ãªéä¿¡ã«äžå¯æ¬ ãªæè¡ã ãšèšããŸãã
- ã»ã³ãµãŒãšã²ãŒããŠã§ã€ã®éãŸãã¯ããŒããšã²ãŒããŠã§ã€ã®éã§ç¬èªæè¡ãçšããæ¥ç¶ãè¡ãããšã«ãããã»ãã¥ã¢ãªéä¿¡ã容æã«å®çŸã§ããŸããã³ã³ãããŒã©ã¯ãéµã®äº€æãšããŒã¿ã®æå·åãå¯èœã«ããŸããããã«ãããéä¿¡ãã£ã³ãã«ã®ä¿è·ã確ç«ãããŸãããŸããRFããŒã¹ãŸãã¯ãã®ä»ã®ç¬èªãããã³ã«ã䜿çšããå Žåã®ã»ãã¥ãªãã£ã匷åããããšãå¯èœã§ãã
- ããŒãã®èªèšŒãä¿¡é Œæ§ã®é«ãããŒãã®åäœãã»ãã¥ã¢ã»ããŒãããã¡ãŒã ãŠã§ã¢ã®ã»ãã¥ã¢ãªã¢ããããŒããšãã£ãã»ãã¥ãªãã£æ©èœã远å ã§ããŸãããããã®æ©èœã«ãããããŒãã®ã¢ã€ãã³ãã£ãã£ãæ€èšŒããä¿¡é Œã§ããåäœã確ä¿ããäžæ£ãªæ¹ç«ã鲿¢ããããšãå¯èœã«ãªããŸãããã®çµæãã·ã¹ãã ã®ã»ãã¥ãªãã£ã匷åãããŸãã
ã»ã³ãµãŒã®ããŒã¿ã®ä¿è·
ã»ã³ãµãŒã§ååŸããããŒã¿ã«ã€ããŠã¯ã以äžã®ãããªä¿è·æ©èœãé©çšã§ããŸãã
- ä¿åãããããŒã¿ã«ã¯ChipDNAæè¡ã«ããæå·åãé©çšã§ããŸãã
- ã»ã³ãµãŒã®ãã£ãªãã¬ãŒã·ã§ã³ã«äœ¿çšããéèŠãªããŒã¿ãã»ã³ãµãŒã®æ§ææ å ±ã¯ãMAXQ1065ã®ã»ãã¥ã¢ãªã¹ãã¬ãŒãžå ã«ä¿åãããŸããããã«ãããæ¹ç«ãæŒæŽ©ã鲿¢ã§ããŸãããŸããæå·åãé©çšããäžã§ã·ã¹ãã å ã«ä¿åããããšãå¯èœã§ã(å³4)ã
ãµãã©ã€ãã§ãŒã³ã®ã»ãã¥ãªãã£
ãµãã©ã€ãã§ãŒã³ã®ã»ãã¥ãªãã£ã«ã¯ãæ§ã ãªãããã¯ãé¢é£ããŸã(å³5)ãäŸãã°ã以äžã®ãããªããšãå®çŸããå¿ èŠããããŸãã
- 補åã®ã¯ããŒã³(åœé å)ã鲿¢ããå¿ èŠããããŸãã
- IP(Intellectual Property)ã®åªå€±ãåçã®æå€±ãé²ãããã«ã¯ãœãããŠã§ã¢ã»ããŒã¹ã®æ©èœãå©çšã§ããŸãããããã€ããŒãã«ã«ããéã®ã»ãã¥ãªãã£ã確ä¿ããå¿ èŠããããŸãã
- ããŒããŠã§ã¢ã®çæ£æ§ãæ€èšŒããå¿ èŠããããŸã(å³6)ã
以äžã®ãããªçç±ããããµãã©ã€ãã§ãŒã³ã®ã»ãã¥ãªãã£ã¯ãADIã®ã»ãã¥ã¢èªèšŒçšICãæ¡çšããããšã§å®¹æã«ç¢ºä¿ã§ããŸãã
- ADIãæäŸããããã°ã©ã æžã¿ã®èªèšŒçšICã¯ãé«ãå ç¢æ§ã§åœé åããã®ä¿è·ãå®çŸããŸãã
- ã»ãã¥ã¢ãªã©ã€ããµã€ã¯ã«ã®ç®¡çãšéµã®ç®¡çã«ãããããã€ã¹/補åã®ã©ã€ããµã€ã¯ã«å šäœã«ããã£ãŠã¢ã»ããã®ã»ãã¥ãªãã£ãç¶æã§ããŸãã
- ADIã®èªèšŒçšICã䜿çšããã°ãæ©èœã®æå¹åãã»ãã¥ã¢ã«å®è¡ã§ããŸããããã«ããã貎éãªIPãä¿è·ããããšãå¯èœã«ãªããŸãã
PLCãšããŒãã®ã»ãã¥ã¢ãªéä¿¡
ã»ãã¥ã¢èªèšŒçšICã¯ãéä¿¡ã®ã»ãã¥ãªãã£ã確ä¿ããããšã«åœ¹ç«ã¡ãŸãã察象ã«ãªãã®ã¯ãPLCãšã¢ã¯ãã¥ãšãŒã¿/ã»ã³ãµãŒã®éã®éä¿¡ãPLCãšSCADA(Supervisory Control and Data Acquisition)å¶åŸ¡ã·ã¹ãã (SCADAã®ã·ã¹ãã å ã§ã¯ãªãPLCå )ã®éã®éä¿¡ãªã©ã§ããã»ãã¥ã¢èªèšŒçšICã䜿çšããã°ãTLSãããã³ã«ãã€ããŒãã«ã«ãªããŸããTLSã¯ãã€ã³ã¿ãŒãããã»ãããã³ã«ãããŒã¹ãšããéä¿¡ã§åºã䜿çšãããŠãããã©ã³ã¹ããŒãå±€çšã®ã»ãã¥ã¢ãªãããã³ã«ã§ãã
ããããã®ãžã§ã€ã³ãã®èªèšŒ
å³7ã¯ãããããã«ãžã§ã€ã³ãã®èªèšŒæ©èœãå®è£ ããæ¹æ³ã瀺ãããã®ã§ããããã«ãããããããã»ã·ã¹ãã ã®å éšã§ã¯ãæ£åœãã€èªèšŒæžã¿ã®ãšã³ãã£ãã£ã ããããããåãã«å ãããªããªããŸãããã®çµæãå šè¬çãªã»ãã¥ãªãã£ã匷åãããŸãããã詳ããèšãã°ãäžæ£ã¢ã¯ã»ã¹ã广çã«é²æ¢ããããéä¿¡ã®ã»ãã¥ãªãã£ã匷åãããããããšãå¯èœã«ãªããŸãããã®ããšã¯ãã·ã¹ãã å šäœã®å®å šæ§ãšä¿¡é Œæ§ã®ç¢ºä¿ã«åœ¹ç«ã¡ãŸãã
ãžã§ã€ã³ãã®ã»ãã¥ã¢ã»ããŒã
ããããã®ãžã§ã€ã³ãã®ã»ãã¥ã¢ã»ããŒãã¯ãå³8ã®ããã«ããããšã§å®çŸã§ããŸããã»ãã¥ã¢ã»ããŒãã¯ãã»ãã¥ã¢ã§ä¿¡é Œã§ããåäœç°å¢ãæ§ç¯ããããã®åŒ·åºãªåºç€ã«ãªããŸããå ·äœçã«ã¯ãäžæ£ãªãœãããŠã§ã¢ã®å®è¡ããã«ãŠã§ã¢ãæ¹ç«ã«å¯Ÿããä¿è·ãå®çŸããã·ã¹ãã ã®ã»ãã¥ãªãã£ãšä¿¡é Œæ§ã匷åãã圹å²ãæãããŸããéèŠãªã®ã¯ããã§ãŒã³ã»ãªãã»ãã©ã¹ã(Chain of Trust)ã確ç«ãããœãããŠã§ã¢ã»ã³ã³ããŒãã³ãã®å®å šæ§ãæ€èšŒããããšã§ãããã®çµæããžã§ã€ã³ãã®ã»ãã¥ã¢ã»ããŒãã«ãã£ãŠãããããã»ã·ã¹ãã ã®åäœå šäœã®å®å šæ§ãšçæ£æ§ã確ä¿ãããŸãããžã§ã€ã³ãã®ã»ãã¥ã¢ã»ã¢ããããŒããåæ§ã®æ¹æ³ã§å®çŸãããŸãã
ãžã§ã€ã³ã/ããããã»ã³ã³ãããŒã©ã«ãããæ©èœã®éžæçãªæå¹å
ã»ãã¥ã¢ã»ããŒãã«æåããããã¢ããªã±ãŒã·ã§ã³ã®ãã€ã¯ãã³ã³ãããŒã©(MCU)/ããã»ããµ/FPGAã¯ãèªèšŒçšIC/ã³ããã»ããµã®ã»ãã¥ã¢ãã€æ§æå¯èœãªã¡ã¢ãªããããŒã¿ãèªã¿åºããŸããããã«ããããžã§ã€ã³ããŸãã¯ããããã»ã³ã³ãããŒã©ã®æ©èœãéžæçã«æå¹ã«ããããšãã§ããŸã(å³9)
ãã£ãªãã¬ãŒã·ã§ã³ã»ããŒã¿çšã®ã¹ãã¬ãŒãž
ããªãã§ã©ã«ã®äžã«ã¯ãå·¥å Žããåºè·ãããéãåå¥ã«ãã£ãªãã¬ãŒã·ã§ã³ããããã®ããããŸããããã«åããé«ç²ŸåºŠã®æž¬å®ãç¶æããããã«ã¯ããã£ãªãã¬ãŒã·ã§ã³ã»ããŒã¿çšã®ã¹ãã¬ãŒãžãäžå¯æ¬ ã§ããåããŒã¿ãèªèšŒçšICå ã«ã»ãã¥ã¢ã«ä¿åããããšã«ãããå®å šæ§ã確ä¿ããäžæ£ãªã¢ã¯ã»ã¹ããã®ä¿è·ãå®çŸããããšãå¯èœã«ãªããŸãã
ãã¹ãã»ã·ã¹ãã ã¯ãä¿åãããããŒã¿ãèªã¿åºããããå©çšãããããããšãå¯èœã§ããã€ãŸããããªãã§ã©ã«ãã粟床ãšä¿¡é Œæ§ã«åªããæž¬å®å€ãååŸããããšãã§ããŸãããã£ãªãã¬ãŒã·ã§ã³ã»ããŒã¿çšã®ã»ãã¥ã¢ãªã¹ãã¬ãŒãžã«ãããã·ã¹ãã å šäœã®ç²ŸåºŠãšæ§èœãåäžããŸãããŸãã貎éãªç¥èŠãåŸãããé«ãåè³ªåºæºãç¶æããããšãå¯èœã«ãªããŸãã
ãžã§ã€ã³ããšã®ã»ãã¥ã¢ãªéä¿¡
ãžã§ã€ã³ããšã®ã»ãã¥ã¢ãªéä¿¡ãå®çŸããããšã«ãããããããã»ã·ã¹ãã å šäœã®ã»ãã¥ãªãã£äœå¶ã匷åãããŸãããŸããä¿¡é Œæ§ãé«ãä¿è·ãããããŒã¿äº€æãå®çŸå¯èœã«ãªããŸã(å³10)ã
ãŸãšã
ããããã®æªæ¥ãã»ãã¥ã¢ãªãã®ã«ããããã«ã¯ããµã€ããŒã»ãã¥ãªãã£ãéåžžã«éèŠã§ããè åšããã®ä¿è·ãå®çŸããã«ã¯ãã»ãã¥ã¢ãªèªèšŒãæå·åãå©çšããéä¿¡ããµãã©ã€ãã§ãŒã³ã®ã»ãã¥ãªãã£ãšãã£ãå ç¢æ§ã®é«ã察çãäžå¯æ¬ ã§ããADIã®è£œå/ãœãªã¥ãŒã·ã§ã³ãæ¡çšããããšã§ãé«åºŠãªã»ãã¥ãªãã£æ©èœãå©çšããããšãã§ããããã«ãªããããããã»ã·ã¹ãã ã®å®å šæ§ãšä¿¡é Œæ§ã確ä¿ããããšãå¯èœã«ãªããŸããéèŠãªã®ã¯ããµã€ããŒã»ãã¥ãªãã£ãäœãããåªå ããããšã§ãããã®äžã§ãADIãæäŸãããããªå°éæè¡ã掻çšããã°ãçžäºã«æ¥ç¶ãããäžçã«åºçŸããæ°ããªãªã¹ã¯ãåé¿ãã€ã€ãããããã®æœåšèœåãæå€§éã«åŒãåºãããšãå¯èœã«ãªããŸãã
æ¬èšäºã¯Analog Deviceã®æè¡è§£èª¬èšäºãRobotic Security Use Cases and Implementation for a Secure Futureãã翻蚳ãããã®ãšãªããŸã
åèè³æ
ã»Jean-Paul A. YaacoubãHassan N. NouraãOla SalmanãAli ChehabãRobotics Cyber Security: Vulnerabilities, Attacks, Countermeasures, and Recommendations(ãããã£ã¯ã¹ã®ãµã€ããŒã»ãã¥ãªã㣠-- è匱æ§ãæ»æã察æçãæšå¥šäºé )ã International Journal of Information Securityã2021幎3æ
ã»Christophe TremletãIEC 62443ã·ãªãŒãºã®èŠæ Œ:ãµã€ããŒæ»æããã€ã³ãã©ã¹ãã©ã¯ãã£ãä¿è·ããæ¹æ³ãAnalog Devicesã2023幎4æ
ã»ãã»ãã¥ã¢èªèšŒã«ããRïŒDæè³ã®ä¿è·ãAnalog Devices
ã»ãThe Basics of Using the DS28S60(DS28S60ã®åºæ¬çãªäœ¿ãæ¹)ãAnalog Devices









