Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30579
Challenges in Anti-Counterfeiting of Cyber-Physical Systems

Authors: Jürgen Gausemeier, Daniel Kliewe, Arno Kühn, Roman Dumitrescu


This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in this paper.

Keywords: Cyber Physical Systems, anti-counterfeiting, Intellectual property (IP) and knowledge management, system protection

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1411


[1] Mittelstaedt, A.; Strategisches IP-Management - mehr als nur Patente. Gabler Verlag, Wiesbaden, 2009
[2] World Intellectual Property Organization (WIPO); Understanding industrial property. WIPO publication no. 895(E), Geneva, 2008
[3] Herzog, O.; Schildhauer, T. (Hrsg.): acatech DISKUTIERT. Intelligente Objekte: Technische Gestaltung – Wirtschaftliche Verwertung – Gesellschaftliche Wirkung. Springer Verlag, Berlin, 2009
[4] Damm, W.; Achatz, R.; Beetz, K.; Broy, M.; Grimm, K.; Liggesmeyer, P.: Nationale Roadmap Embedded Systems. In: Broy, M. (Hrsg.): Cyber-Physical Systems – Innovation durch softwareintensive eingebettete Systeme. acatech DISKUTIERT, Springer Verlag, Berlin, 2010
[5] Schäfer, W.; Wehrheim, H.: The Challenges of Building Advanced Mechatronic Systems. In FOSE ´07: 2007 Future of Software Engineering, pp. 72-84, IEEE Computer Society, 2007
[6] Broy, M. (Hrsg.): Cyber-Physical Systems – Innovation durch softwareintensive eingebettete Systeme. acatech DISKUTIERT, Springer Verlag, Berlin, 2010
[7] Gausemeier, J.; Tschirner, C.; Dumitrescu, R.: Der Weg zu Intelligenten Technischen Systemen. Industrie Management, GITO Verlag, 1/2013.
[8] Verband Deutscher Maschinen- und Anlagenbau e.V. (VDMA): Studie Produktpiraterie 2014
[9] World Economic Forum; McKinsey & Company: Risk and Responsibility in a Hyperconnected World – Insight Report, 2014
[10] Gausemeier, J.; Glatz, R.; Lindemann, U. (Hrsg): Präventiver Produktschutz – Leitfaden und Anwendungsbeispiele. Carl Hanser Verlag, München, 2012
[11] Kokoschka, M.: Verfahren zur Konzipierung imitationsgeschützter Produkte und Produktionssysteme. Dissertation, Universität Paderborn, Paderborn, 2013
[12] Fuchs, H.J. (HRSG.): Piraten, Fälscher und Kopierer – Strategien und Instrumente zum Schutz geistigen Eigentums in der Volksrepublik China, Betriebswirtschaftlicher Verlag Dr. Th. Gabler, Wiesbaden, 2006
[13] Neemann, C. W.: Methodik zum Schutz gegen Produktimitationen, Dissertation Fraun-hofer Institut für Produktionstechnologie IPT, Aachen, Shaker Verlag, Band 13/2007, Aachen, 2007
[14] Jacobs, L.; Samli, A. C.; Jedlik, T.: The Nightmare of International Product Piracy – Exploring Defensive Strategies. In: Industrial Marketing Management 30, S. 499-509, North-Holland Publishing, 2001
[15] Fraunhofer Institute for Applied and Integrated Security; pep-protecting-electronic-products.html, March 2015