ããããã®ã»ãã¥ã¢ãªæªæ¥ã«åããŠããµã€ããŒã»ãã¥ãªãã£ãæãã圹å²
Thought Leadership
ããããã®ã»ãã¥ã¢ãªæªæ¥ã«åããŠããµã€ããŒã»ãã¥ãªãã£ãæãã圹å²
æŠèŠ
æ¬çš¿ã§ã¯ããŸãããããã®å¶åŸ¡ãæ ãã·ã¹ãã ãæ±ããã»ãã¥ãªãã£äžã®ãªã¹ã¯ã«ã€ããŠèª¬æããŸãããã®äžã§ãã»ãã¥ãªãã£ã確ä¿ããããã®å¹æçãªææ³ã玹ä»ããŸããæŽã«ãç£æ¥åéåãã®ã»ãã¥ãªãã£èŠæ Œã«æºæ ããããã«å¿ èŠãªèŠä»¶ã«ã€ããŠã®åæãè¡ããŸãã
ã¯ããã«
ã€ã³ãã¹ããª4.0ã®äžå¿ã«ããã®ã¯ããã¡ã¯ããªã»ãªãŒãã¡ãŒã·ã§ã³ïŒFAïŒã§ãããã®ãããã€ã³ãã¹ããª4.0ã®å®çŸãç®æãäžã§ã¯ããããã®ååšãéèŠã«ãªããŸããã€ãŸããçµã¿ç«ãŠäœæ¥ãªã©ãæ ãããããããèªåŸèµ°è¡æ¬éããããïŒAMRïŒAutonomous Mobile RobotïŒãååããããïŒã³ãããïŒãªã©ãç£æ¥çšã®ããããå šè¬ãéèŠãªåœ¹å²ãæ ããšããããšã§ããå®éãçŸåšã®ããããã¯ããã¹ããŒãã§å調çãªãã®ã«ãªã£ãŠããŸãããããã人éã®ä»å ¥ã®æç¡ã«ãããããè€éãªäœæ¥ãããªããããã«ãªãã€ã€ãããŸãããã®ããã«ããŠããããã®å©çšãæ¡å€§ããçµæããªãŒãã¡ãŒã·ã§ã³ã®ã¬ãã«ã¯å€§ããåäžããŸãããããã«äŒŽãããããããå¶åŸ¡ããã·ã¹ãã ïŒããããå¶åŸ¡ã·ã¹ãã ïŒã®å®å šæ§ãšã»ãã¥ãªãã£ã®åŒ·åãåŒ·ãæ±ããããããã«ãªããŸãããåœåãããããã¯äž»ã«å·¥å Žã®è£œé ããã¢ã§äœ¿çšããããã®ã§ããããããçŸåšã§ã¯ãå»çãè»äºãç©æµã蟲æ¥ãšãã£ãæ§ã ãªåéã§æŽ»çšãããããã«ãªã£ãŠããŸããå®å šæ§ãšã»ãã¥ãªãã£ã¯ã10幎ã»ã©åãšæ¯ã¹ãŠã¯ããã«éèŠãããããã«ãªããŸãããäºæ ãå®å šã«é²æ¢ããã®ã¯é£ããã§ãããããæªæããæ»æã¯é»æ¢ã§ããããã«ããªããã°ãªããŸãããæªæãæã£ã人ã«ãããããä¹ã£åãããèªç±ã«å¶åŸ¡ããããããªããšãããã°èŽåœçã§ããããã«ãããçµæžçïŒè²¡æ¿çãªé¢ã§æ·±å»ãªäºæ ã«é¥ãå¯èœæ§ããããŸãã
ããããå¶åŸ¡ã·ã¹ãã ãæ±ãã ã»ãã¥ãªãã£äžã®ãªã¹ã¯
ãŸãã¯å³1ãã芧ãã ãããããã¯ãããããå¶åŸ¡ã·ã¹ãã ãæ±ããã»ãã¥ãªãã£äžã®ãªã¹ã¯ã«ã€ããŠãŸãšãããã®ã§ãããããã®èŠå ã«ãããããããå¶åŸ¡ã·ã¹ãã ã¯æªæããæ»æã«ãããããå¯èœæ§ããããŸã1ã

ç¶ããŠã衚1ãã芧ãã ãããããã¯ããã€ãã®æžå¿µäºé ã®æŠèŠã瀺ãããã®ã§ãã
æ¬ èœããŠããèŠçŽ | åœ±é¿ |
ã»ãã¥ã¢ãªãããã¯ãŒã¯ | è€æ°ã®ããããå¶åŸ¡ã·ã¹ãã ã®éã§è¡ãããéä¿¡ã®å®å šæ§ãæãªããããããã«ããããªãããŸããæ¹ç«ãçèŽãªã©ãçãããããªããã·ã¹ãã ã®å¯çšæ§ã«åœ±é¿ãåã¶å¯èœæ§ããã |
é©åãªèªèšŒ |
|
æ©å¯æ§ | æå·åã«å¯Ÿå¿ããŠããªãããŸãã¯æå·åã®ã¢ã«ãŽãªãºã ã®ã¬ãã«ãäœãå Žåãããããã«é¢ããæ©å¯ããŒã¿ãèšèšã®èšç»ãååïŒæŽé²ãããå¯èœæ§ããã |
å®å šæ§ | ããããã«é¢ããæ©å¯ããŒã¿ããæ§ææ å ±ããã¡ãŒã ãŠã§ã¢ãä¿åäžïŒè»¢éäžã«æ¹ç«ããããããããã |
ã»ãã¥ã¢ãªããŒããã¢ããããŒã |
|
èã¿ã³ãæ§ãåããããŒããŠã§ã¢ | ããããã«ã¯ãéåžžã«æ©å¯æ§ã®é«ãæ å ±ãä¿åãããããšãããïŒè»äºïŒé²è¡ã®çšéã§äœ¿ããããããããªã©ïŒãããããæ å ±ã¯ãæå³ãã¬äººç©ããã¢ã¯ã»ã¹ãããªãããä¿è·ããªããã°ãªããªããèã¿ã³ãæ§ãåããããŒããŠã§ã¢ãæ¡çšããªããã°ã䟵襲çãªæ»æããæ å ±ãä¿è·ããã®ã¯é£ãã |
ã»ãã¥ã¢ã»ãã€ã»ãã¶ã€ã³ | æè¿ãŸã§ãå¶åŸ¡ã·ã¹ãã ãéçºããéã«ã»ãã¥ã¢ã»ãã€ã»ãã¶ã€ã³ã®ã¢ãããŒããæ¡çšãããããšã¯ã»ãšãã©ãªãã£ãããã®ãããæ§æ¥ã®ã¢ãŒããã¯ãã£ãèšèšãæ¡çšããããããã¯äŸµå ¥ãèš±ãå¯èœæ§ããããã€ãŸããæ»æã仿ããããã®è匱æ§ãèŠåºãããæªçšã«ãããè¡çºãèš±ããŠããŸããããããã |
ã¢ããããŒã | ããããã®OSããã¡ãŒã ãŠã§ã¢ããœãããŠã§ã¢ã®ã¢ããããŒããé©åã«è¡ãããŠããªãå Žåããµã€ããŒãã£ãžã«ã«æ»æã«ãããããå¯èœæ§ããã |
泚ïŒã»ãã¥ãªãã£äžã®ãªã¹ã¯ã¯ãããªãã®å²åã§ãœãããŠã§ã¢ã®è匱æ§ã«èµ·å ããŸãã
ç£æ¥ïŒããããåãã®æ³ä»€ããµã€ããŒã»ã¬ãžãªãšã³ã¹ãšå®å šå¯Ÿçã®åŒ·åãåŸæŒã
ãµã€ããŒã»ãã¥ãªãã£ãåãå·»ãç¶æ³ã¯æ¥éã«å€åããŠããŸããç£æ¥åéãããããã®åéã察象ãšããèŠå¶ãæ³ä»€ãå¢ããŠããããšããããããå€åã®1ã€ã§ããçŸåšã§ã¯ããµã€ããŒã»ãã¥ãªãã£ã察象ãšããæ³åŸãå°ãªããããŸããã代衚çãªãã®ãšããŠã¯ãEUã®ãµã€ããŒã»ãã¥ãªãã£æ³ïŒEU Cybersecurity ActïŒããµã€ããŒã»ã¬ãžãªãšã³ã¹æ³ïŒEU Cyber Resilience ActïŒãç±³åœã®éèŠã€ã³ãã©åããµã€ããŒã»ã€ã³ã·ãã³ãå ±åæ³ïŒU.S.Cyber Incident Reporting for Critical Infrastructures ActïŒãæããããŸããäžåœãã€ã³ãã§ãæ°ããªèŠå¶ãæ³ä»€ãèªçããŠããŸããç±³åœç«æšæºæè¡ç ç©¶æïŒNISTïŒNational Institute of Standards and TechnologyïŒã®OTã»ãã¥ãªãã£ã»ã¬ã€ãïŒGuide to Operational Technology (OT) SecurityïŒãIEC62443ã®ãããªèŠæ Œã¯ãæè¡äŒæ¥ã«ãšã£ãŠã®æéã«ãªããŸããã»ãã¥ã¢ã»ãã€ã»ãã¶ã€ã³ã®ã¢ãããŒããæ¡çšããã°ããµã€ããŒæ»æã«å¯ŸããŠã¬ãžãªãšã³ããªå¶åŸ¡ã·ã¹ãã ãéçºããããšãã§ããŸãã
IEC 62443ãå®ããIACSã®èŠä»¶
IEC 62443ã¯ãIACSïŒIndustrial Automation and Control SystemsïŒã®ã»ãã¥ãªãã£ã«é¢ããèŠæ Œã§ã2ãç£æ¥çšãªãŒãã¡ãŒã·ã§ã³ã®åéã§ã¯ãå¶åŸ¡ã·ã¹ãã ãéçºããéã®æéãšããŠåºãæ¡çšãããŠããŸãããŸããå€ãã®èŠå¶ã«ãããŠãããã®èŠæ Œã«æºæ ããããšãæšå¥šãããŠããŸããã€ãŸãããã®éèŠæ§ã¯æããã ãšèšããã§ããããå®éããã®èŠæ Œã«é¢é£ããèŠå¶ã«æºæ ããã°ãå¶åŸ¡ã·ã¹ãã ãæ±ããæœåšçãªãµã€ããŒã»ãã¥ãªãã£ã®ãªã¹ã¯ã軜æžããããšãå¯èœã«ãªããŸãããŸããå¶åŸ¡ã·ã¹ãã ã«ãããã»ãã¥ãªãã£ã»ã®ã£ããã«å¯ŸåŠããéèŠãªã¢ã»ãããä¿è·ããããšãã§ããŸããIEC 62443ã«æºæ ããã°ãå€ãã®ã¡ãªããã享åã§ãããšããããšã§ãïŒå³2ïŒã

IEC 62443ã§ã¯ãããã»ã¹ãæé ã«ã€ããŠå€ãã®äºæãèŠå®ããŠããŸãããã ãIEC 62443-4-1ãšIEC 62443-4-2ã§ã¯ãã³ã³ããŒãã³ãã®ã»ãã¥ãªãã£ã«é¢ããèŠå®ã«éç¹ã眮ãããŠããŸããIEC 62443-4-2ã§ã¯ãã³ã³ããŒãã³ããæ¬¡ã®ããã«åé¡ããŠããŸããããªãã¡ããœãããŠã§ã¢ã»ã¢ããªã±ãŒã·ã§ã³ããã¹ãã»ããã€ã¹ãçµã¿èŸŒã¿ããã€ã¹ããããã¯ãŒã¯ã»ããã€ã¹ã®4çš®ã§ãããã®èŠæ Œã§ã¯ãåçš®ã®ã³ã³ããŒãã³ãã«å¯ŸããèŠæ±äºé ïŒCRïŒComponent RequirementïŒãšåŒ·åèŠæ±äºé ïŒREïŒRequirement EnhancementïŒã«åºã¥ããŠæ©èœã®ã»ãã¥ãªãã£ã»ã¬ãã«ïŒSLïŒSecurity LevelïŒãå®ããŠããŸããSL1ããSL4ãŸã§ã®4ã€ã®ã¬ãã«ïŒSLïŒã®ãã¡ãSL3ãšSL4ã¯ããŒããŠã§ã¢ã»ããŒã¹ã®ã»ãã¥ãªãã£ãå¿ èŠãšããŸãã
ããããåãã»ãã¥ãªãã£ã»ã·ã¹ãã ã®éçºã«å¿ èŠãªæ©èœãšæè¡
ã»ãã¥ã¢ãªããããå¶åŸ¡ã·ã¹ãã ãæ§ç¯ããã«ã¯ãå³1ãšè¡š1ã«ç€ºãããªã¹ã¯ã«å¯ŸåŠããå¿ èŠããããŸããæè¡çãªé¢ã§å¿ èŠãªæ©èœãæè¡ãšããŠã¯ã以äžã®ãããªãã®ãæããããŸãã
- ã»ãã¥ã¢ãªèªèšŒïŒããã€ã¹ïŒã³ã³ããŒãã³ãã®IDã確èªããããã«ã»ãã¥ã¢èªèšŒçšIC ãæ¡çšãã
- ã»ãã¥ã¢ãªã³ããã»ããµïŒã»ãã¥ã¢ãªã¹ãã¬ãŒãžãšæå·åã®åŠçã«å¯Ÿå¿ããããã®å°çšããŒããŠã§ã¢ã掻çšãã
- ã»ãã¥ã¢ãªéä¿¡ïŒããŒã¿äº€æã«å¯Ÿããä¿è·ãå®çŸããããã«ãæå·åçšã®ãããã³ã«ãå®è£ ãã
- ã¢ã¯ã»ã¹å¶åŸ¡ïŒã·ã¹ãã ã«å¯Ÿããäžæ£ãªã¢ã¯ã»ã¹ãå¶éããããã«ãæš©éããã现ããèšå®ãã
- ç©ççãªã»ãã¥ãªãã£å¯ŸçïŒç©ççãªæ¹ç«ãé²ãããã®å¯Ÿçãå°å ¥ãã
ã»ãã¥ã¢èªèšŒçšICãã³ããã»ããµICãªã©ã¯ã¿ãŒã³ããŒã®ãœãªã¥ãŒã·ã§ã³ãšããŠèšèšãããŠããŸãããããã¯äžèšã®èŠä»¶ãæºããããšãç®çãšãããã®ã§ãããå®è£ ã容æã§ã³ã¹ãå¹çã«åªããŠããŸãããã®ãããªå°çšICã®æ©èœã¯ããã¹ãã»ããã»ããµåãã«èšèšãããå æ¬çãªãœãããŠã§ã¢ã»ã¹ã¿ãã¯ã«ãã£ãŠè£å®ãããŸã2ã
ãªãããã£ã¹ã¯ãªãŒãã®ã»ãã¥ã¢ã»ãšã¬ã¡ã³ãã䜿çšããã°ãæ»æãåããã¢ããªã±ãŒã·ã§ã³ã»ããã»ããµããå¥ã®ICã«ä¿åãããèªèšŒæ å ±ãžã®ã¢ã¯ã»ã¹ã鲿¢ããããšãã§ããŸãïŒéé¢ïŒããã®ãããã·ã¹ãã ã®ã¬ãžãªãšã³ã¹ãé«ãŸããŸãã
ã»ãã¥ã¢ãªã·ã¹ãã ãéçºããããã«ã¯ãæ§é åãããã¢ãããŒããæ¡çšããå¿ èŠããããŸãããã®ã¢ãããŒãã¯ãèŠä»¶ã®åéãè åšã®ã¢ãã«åãã»ãã¥ã¢ãªèšèšãå®è£ ããã¹ããèªèšŒãä¿å®ãå å«ãããã®ã«ãªããŸããã»ãã¥ã¢éçºã©ã€ããµã€ã¯ã«ïŒSDLCïŒSecure Development Life CycleïŒã«åŸãã°ãéçºããã»ã¹ã«æåãã確å®ã«ã»ãã¥ãªãã£å¯Ÿçãçµã¿èŸŒãŸããããšã«ãªããŸãã
ããããã®ã»ãã¥ãªãã£ã確ä¿ããããã®çæ³çãªããŒãããŒ
ã¢ããã°ã»ããã€ã»ãºã¯ãã»ãã¥ãªãã£ã確ä¿ããããã®ã³ããã»ããµãšããŠãMAXQ1065ãããDS28S60ããšãã£ã補åãæäŸããŠããŸããã€ãŸããåœç€Ÿã¯ããããã¿ãŒã³ããŒã»ãœãªã¥ãŒã·ã§ã³ãšãªãICã®ãã³ããŒã§ããããããåœç€Ÿã¯ãã®ãããªæ çµã¿ãè¶ ããŠãããããæ¥çã®ã客æ§ãã»ãã¥ãªãã£ã«é¢ãã倿§ãªèŠä»¶ãæºãããããæ¯æŽãè¡ã£ãŠããŸããåœç€Ÿã¯ãã»ãã¥ãªãã£ãšãããã£ã¯ã¹ã«é¢ããåºç¯ãªå°éæè¡ã®èåãå³ã£ãŠããŸããããã«ãããããããã®å®å šã確ä¿ããäžã§çŽé¢ããç¹æã®èª²é¡ã«å¯ŸåŠå¯èœãªçæ³çãªãœãªã¥ãŒã·ã§ã³ãæäŸããŠããŸããã€ãŸããåãªãICãã³ããŒã§ã¯ãªãããœãªã¥ãŒã·ã§ã³ã»ãããã€ããšããŠã®ç«å Žã確ç«ããŠãããšããããšã§ããã»ãã¥ãªãã£ãããããã«ç²ŸéããŠããåœç€Ÿãšé£æºããã°ãã客æ§ã¯å æ¬çãªãœãªã¥ãŒã·ã§ã³ãæ§ç¯ã§ããŸããã€ãŸããããŒããŠã§ã¢ããœãããŠã§ã¢ãã·ã¹ãã ã®åã¬ãã«ã«ããã£ãŠèª²é¡ã解決ã§ãããšããããšã§ãã
ã¢ããã°ã»ããã€ã»ãºã¯ãããããã®ã»ãã¥ãªãã£ã確ä¿ããããã«ã¯ãå æ¬çãªã¢ãããŒããå¿ èŠã ãšããããšã匷ãèªèããŠããŸããããã«åºã¥ããã³ã³ããŒãã³ãã»ã¬ãã«ã®è£œåãéçºããã ãã§ãªããã·ã¹ãã ã»ã¬ãã«ã®èŠç¹ã§å¿ èŠã«ãªããã®ãæäŸããŠããŸããã€ãŸããããŒããŠã§ã¢ãšãœãããŠã§ã¢ãã«ããŒããããšã«ãšã©ãŸãããã·ã¹ãã éã®éä¿¡ãã·ã¹ãã ã®çµ±åãšãã£ãåŽé¢ã«ã泚ç®ããŠããŸããããã«ããããã¹ãŠã®éèŠãªã³ã³ããŒãã³ããã·ãŒã ã¬ã¹ã«çµ±åã§ããããã«ããŠããŸãã
ããã§ãã¢ããã°ã»ããã€ã»ãºãšèªåè»æ¥çã®äŒæ¥ã«ãã代衚çãªã³ã©ãã¬ãŒã·ã§ã³ã®äŸã玹ä»ããŠãããŸããããããã¯ãã¯ã€ã€ã¬ã¹ã»ããããªç®¡çïŒããããªã»ãããŒãžã¡ã³ãïŒã·ã¹ãã ïŒwBMSïŒWireless Battery Management SystemïŒã«é¢ãããã®ã§ããåœç€Ÿã¯ãã客æ§ãšã®ç·å¯ãªé£æºã«ãã£ãŠISO 21434ã®èªèšŒãååŸããwBMSãéçºããŸãããã€ãŸãããã®wBMSã¯å®å šãã€ã»ãã¥ã¢ãªãã®ã§ããããšãå®èšŒãããŠããŸããåœç€Ÿã¯ããã®åè¶ããèœåãæŽ»ãããå ç¢æ§ã®é«ãã»ãã¥ãªãã£å¯Ÿçãå®çŸãããšããããšã§ããåæã«ããã®wBMSã¯å æ¬çãªãœãªã¥ãŒã·ã§ã³ãæäŸãããšããã¢ããã°ã»ããã€ã»ãºã®ã³ãããã¡ã³ããå ·çŸåãããã®ã§ããããŸããã¢ããã°ã»ããã€ã»ãºã¯ãã»ãã¥ãªãã£ã«é¢ããå®è£ ãè¡ãããã®åœç€Ÿã®å°éæè¡ãåºã掻çšãããããã«ããããšèããŠããŸãããã®ããã«ã¯ãããããæ¥çã®ã客æ§ãšããèªåè»æ¥çã§è¡ã£ãã®ãšåæ§ã®å調çãªåãçµã¿ãæšé²ããå¿ èŠããããŸããã¹ããŒã¯ãã«ããšç·å¯ã«é£æºããããšã«ãããèªåè»åéã§ã®çµéšãšææã掻ãããŠå®å šãã€ã»ãã¥ã¢ãªããããã®éçºã«è²¢ç®ããããšãåœç€Ÿã®ç®æšã®1ã€ã§ãã
ã¢ããã°ã»ããã€ã»ãºã¯ãã»ãã¥ãªãã£ã«é¢ãã倿§ãªèœåãæŽ»ããã€ã€ãç®èº«çãªåãçµã¿ãé²ããŠããŸããã客æ§ã«å¯ŸããŠã¯ããµã€ããŒã»ãã¥ãªãã£ã«é¢é£ããããããæ¡ä»¶ã«å¯Ÿããæ¯é¡ãªãã¬ãã«ã®å°éæè¡ãšãµããŒããæäŸããŠããŸããã·ã¹ãã èšèšã«æºããäŒæ¥ã«ãšã£ãŠãåœç€Ÿãéžæãã¹ãããŒãããŒã§ããããšã¯ééããããŸããã
åœç€Ÿã«é¢ããè©³çŽ°ãªæ å ±ã¯ã以äžã®ãããªã¢ãããŒãã«ãã£ãŠååŸããããšãã§ããŸãã
- EngineerZoneâ¢ã§ã¯ãã»ãã¥ãªãã£ã«é¢é£ããããã°ãå ¬éããŠããŸããããã§è¡ããããã£ã¹ã«ãã·ã§ã³ã«åå ããã°ãçµã¿èŸŒã¿ã»ãã¥ãªãã£ã®ã³ãã¥ããã£ãšã®äº€æµãå³ããç¥èŠãå ±æããããšãã§ããŸãããŸãã¯è³ªåãããšãã圢ã§ã³ãã¥ããã£ã«åå ããããšã«ãããé²è¡äžã®è°è«ã«è²¢ç®ããŠããã ããã°å¹žãã§ãããŸãããã»ãã¥ãªãã£ããšããèªã§æ€çŽ¢ãè¡ãã°ãããã«é¢ãã貎éãªèšäºããªãœãŒã¹ã«ã¢ã¯ã»ã¹ã§ããŸãã
- åœç€ŸãŠã§ããµã€ãã®çµã¿èŸŒã¿ã»ãã¥ãªãã£ã®ããŒãžã1-Wire® ã«é¢ããããŒãžã掻çšããã°ãæ§ã ãªã»ãã¥ãªãã£è£œåã«é¢ããæ å ±ã貎éãªç¥èŠãåŸãããšãã§ããŸããææ°ã®æè¡èšäºãã¢ããªã±ãŒã·ã§ã³ã»ããŒãããããªãã芧ããã ãã°ãã»ãã¥ãªãã£ã«é¢ããçè§£ãæ·±ããããšãå¯èœã«ãªãã§ããããææ°è£œåã®æ å ±ãååŸãããšãã£ã圢ã§ããã²åœç€Ÿã®ã»ãã¥ãªãã£æè¡ã«ã€ããŠè©³ããç¥ã£ãŠããã ããããšæããŸãã
- wBMSã«ã€ããŠã¯ãã¢ããã°ã»ãã€ã¢ãã°ã®èšäºãã¯ã€ã€ã¬ã¹ã»ããããªç®¡çã·ã¹ãã ã®æ°æä»£ã泚ç®ãã¹ãã¯ã»ãã¥ãªãã£ã®ã¬ãã«ããåèã«ãªããŸãããã®èšäºãã芧ã«ãªãã°ãåœç€Ÿã®wBMS ã«ãããŠãã»ãã¥ãªãã£ãã©ãã ãéèŠãããŠããã®ãçè§£ããŠããã ããã§ãããã
ããããã®ãžã§ã€ã³ãã»ã³ã³ãããŒã©ã®æ§æäŸ
ããããã§ã¯ããžã§ã€ã³ãïŒé¢ç¯ïŒã®å¶åŸ¡ãéåžžã«éèŠã§ããå³3ã«ç€ºããã®ã¯ããžã§ã€ã³ãã»ã³ã³ãããŒã©ã®èšèšäŸã§ãã

ãã®èšèšã§ã¯ãMAXQ1065ãæ¡çšããŠããŸããåICã䜿çšããããšã«ãããã»ãã¥ã¢ã»ããŒãã®æ©èœãå®è£ ããããšãã§ããŸãããã®çµæãã·ã¹ãã å šäœã®ã»ãã¥ãªãã£ã匷åããããšãå¯èœã«ãªããŸããMAXQ1065ã¯ãæå·éµçšã®ã»ãã¥ã¢ãªã¹ãã¬ãŒãžãã»ãã¥ã¢ãªéä¿¡ãããã³ã«ãæå·åŠçãªã©ã«å¯Ÿå¿ããæ§ã ãªæ©èœãåããŠããŸããä»åŸã®èšäºã§ã¯ããã®ãããªãŠãŒã¹ã»ã±ãŒã¹ã«ã€ããŠæ·±ãæãäžãããšå ±ã«ãå®çšçãªã¢ããªã±ãŒã·ã§ã³ã®äŸã玹ä»ããäºå®ã§ãã
ãŸãšã
ä»åŸã®ããããéçºã«ãããŠã¯ããµã€ããŒã»ãã¥ãªãã£ãéåžžã«éèŠãªèŠçŽ ã«ãªããŸããæ§ã ãªè åšã«å¯Ÿããä¿è·ãå®çŸããã«ã¯ãã»ãã¥ã¢ãªèªèšŒãæå·åãããéä¿¡ããµãã©ã€ã»ãã§ãŒã³ãžã®ã»ãã¥ãªãã£æè¡ã®é©çšãšãã£ã匷åºãªå¯Ÿçãå°å ¥ããããšãäžå¯æ¬ ã§ããéèŠãªã®ã¯ããµã€ããŒã»ãã¥ãªãã£ãäœãããåªå ããããšã§ãããã®äžã§ãã¢ããã°ã»ããã€ã»ãºã®å°éæè¡ã掻çšããã°ãçžäºã«æ¥ç¶ãããäžçã«åºçŸããæ°ããªãªã¹ã¯ãåé¿ãã€ã€ãããããã®æœåšèœåãæå€§éã«åŒãåºãããšãå¯èœã«ãªããŸãã
ãªãããRobotic Security Use Cases and Implementation for a Secure FutureïŒããããã®ã»ãã¥ãªãã£æ©èœã®ãŠãŒã¹ã»ã±ãŒã¹ãšå®è£ ãã»ãã¥ã¢ãªæªæ¥ãå®çŸããã«ã¯ïŒïŒããšããèšäºã§ã¯ããµã€ããŒã»ãã¥ãªãã£ãšããããã®é¢ä¿ã«ã€ããŠè©³ãã説æããŠããŸããçŸå®ã®ã·ããªãªã«ãããŠãã¢ããã°ã»ããã€ã»ãºã®ã»ãã¥ãªãã£è£œåãæŽ»çšããæ¹æ³ã玹ä»ããŠããŸãã
åèè³æ
1 Jean-Paul A. YaacoubãHassan N. NouraãOla SalmanãAli ChehabãRobotics Cyber Security: Vulnerabilities,Attacks, Countermeasures, and RecommendationsïŒãããã£ã¯ã¹ã®ãµã€ããŒã»ãã¥ãªã㣠-- è匱æ§ãæ»æã察æçãæšå¥šäºé ïŒãInternational Journal of Information Securityã2021幎3æ
2 Christophe TremletãIEC 62443ã·ãªãŒãºã®èŠæ ŒïŒãµã€ããŒæ»æããã€ã³ãã©ã¹ãã©ã¯ãã£ãä¿è·ããæ¹æ³ãAnalog Devicesã2023幎4æ
â»ååºå žã2024幎 TECH+ïŒãã€ãããã¥ãŒã¹ïŒ