Industrial Espionage and Counterfeiting
1
Table of Contents
Industrial Espionage and Counterfeiting....................................................................................................... 1
Introduction ................................................................................................................................................... 3
Literature Review.......................................................................................................................................... 3
Policies and Regulations ........................................................................................................................... 3
1.
Software oriented interactive platform.......................................................................................... 4
2.
Official Dynamic Website ............................................................................................................ 4
Fuel rational is approached from two different criterions working in parallel with each other: ............... 5
1.
For commercial vehicles ............................................................................................................... 5
2.
For private vehicles ....................................................................................................................... 5
Security Plan ............................................................................................................................................. 6
Scams & Frauds .................................................................................................................................... 6
Network Security .................................................................................................................................. 7
Website Security ................................................................................................................................... 7
Networking Technologies Deployed (Design Details) ............................................................................. 9
RFIDs ........................................................................................................................................................ 9
Design of the RFID tag ........................................................................................................................... 10
LAN Networks ........................................................................................................................................ 10
Wide-area networking to connect different branches ............................................................................. 10
Sensors .................................................................................................................................................... 11
System Engineering Perspective to Constitute a Project Management Plan .......................................... 13
The Development Phase of Fuel Ration System: .................................................................................... 13
The System Engineering Process Phase: ................................................................................................ 14
The Life Cycle Integration Phase: .......................................................................................................... 15
Conclusion .................................................................................................................................................. 15
Bibliography ............................................................................................................................................... 16
2
Introduction
Ever since the start of industrial revolution, global oil resources have been shrinking. Taking in view the
requirements of fuel management in order to deal with its shortage, this report constitutes a best possible
fuel ration plan, integrating all the latest technologies.
The report focuses on utilizing intelligent networking systems which have the potential to completely
transform the way fuel ration was approached in the past years. Through networking not only people
involved but the physical objects can also exchange information and data can be incurred from every
element of a system to make smart decisions and do effective planning and management. This
transformation has the potential to bring along more robust and reliable fuel ration management solution.
The purpose of this report is to enable the sustained execution of mission critical processes and
information technology systems for fuel rational in the event of an extraordinary event that causes these
systems to fail and create loopholes for counterfeiting and corruption. The report also contains
Contingency Plan will assess the needs and requirements so that fuel ration may be prepared to respond to
the event in order to efficiently regain operation of the systems that are made inoperable from the event.
One of the major constituents is the demonstration of essential elements of cyber security. The report
focuses on making the system optimally reliable and robust in order to avoid counterfeiting, corruption
and cyber-attacks. Intelligent sensor networks are proposed, along with the essential tactics to mitigate the
effects of cyber-attacks and planned corruptions. The system is designed to be as transparent as possible
and to minimize human intervention in maintaining the records.
Literature Review
Policies and Regulations
Firstly an online database will be established which will be in coordination with the governmental
authorities to maintain an authentic profile of each element in the system of fuel rational.
The department of transport will be required to maintain their own official website, which will cover all
the essential domains: data entry at the employee level, data registration for general public, record
3
maintenance at the shop floor level (fuel station), automated analytical report generation for the analysis
of official regulatory authorities [1].
The whole process requires a very dynamic and interactive platform for data entry and acquisition. The
software to be developed will be integrated with the deployed hardware in order to accentuate the
automation of the whole system and avoid all sorts of counterfeiting and malfunctioning at each level.
The two major elements that are essential for the maintenance of record and fuel rational are:
1. Software oriented interactive platform
This software oriented platform will be deployed on computers at every fueling station. The
system will be operated by an official government employee [2].
The architecture of the software will be designed in order to manage data entry, to
integrate the hardware such as sensor moths deployed in the fuelling station, to check the
details of the accounts registered on the official website of the fuel rational authority.
The system will be internally connected throughout a certain area through intranet
technology; servers will be deployed at offices of the transport authority and centralized
control units will be maintained to manage and check the activities at different fuelling
station and to detect any malfunctioning or counterfeiting.
This will give a constant update to the control units for the analysis of total number of
transaction and fueling activities carried out and due to the transparency of the system
internally, the officials will be able to access analytical reports on daily basis.
2. Official Dynamic Website
Cloud sourcing and cloud servicing will be utilized in order to maintain and handle such a
website [3].
Some major elements that will be integrated with the architecture of the website:
All citizens acquiring official driving license will be able to access the website and make
a personal account to get registered, in order to claim their appropriate fuel requirements.
Fuel requirements will be analyzed after ensuring the authenticity of the person applying,
through the databases of governmental agencies.
In lieu of the account, the citizen will be provided with a certain code along with a card
which will be scanned at every fueling station before getting a refill of private vehicles.
Alternatively for commercial vehicles, the driver or the concerned caretaker will register
on the basis of vehicle registration number, along with the specific details; model, engine,
4
capacity, the kind of business used for, the name of the owner, the route to be followed
by the vehicle etc.
In lieu of the account of the commercial vehicle an RFID tag will be attached to the
vehicle, which will have non-volatile (irreplaceable) memory. The RFID tag will be
scanned by a scanner allotted at each fuelling station, this RFID tag will carry all the
required information regarding fuel rational for the vehicle.
Fuel rational is approached from two different criterions working in parallel with each
other:
1. For commercial vehicles [4]
For the commercial usage of fuel, considering the high fidelity of counterfeiting that can
be exploited if drivers are assigned the ration, fuel ration will be attached to the vehicles.
As explained earlier an account on the official website of transport authority will be
managed.
For the purpose of fuel rational, each vehicle will be required to give an estimated
distance of the route that it requires to travel on daily basis, after considering the
authenticity of the business it will be used for.
The RFID tag assigned to each commercial vehicle will be used to store information
regarding the last fuel refill, the number of miles the vehicle has already travelled, the
date of last refill, at what reading will the vehicle be eligible to get next refill.
At every fuelling station RFID tags will be scanned and data will be entered in the
deployed software at each station.
An average mileage of the vehicle will be established in the database and will be used to
estimate next refill date.
This will prevent the drivers from getting extra refill and will efficiently complete the
necessary fuel requirements.
As the data stored in RFID tags will be non-volatile, this will further decrease the chance
of counterfeiting and getting deceived.
2. For private vehicles
As mentioned earlier all the citizens with official driving license will be eligible to make an
account on the official transport authority website [5].
5
The account will hold information about the family, job; number of cars owned and
estimated minimum usage of the citizen.
For authenticity of the data provided databases of other governmental agencies will be
analyzed by the interactive system and any spoofing or deception will be detected by the
cloud sourced services used by the website.
A readable card with a microchip on it will be allotted to each official member, which
will be scanned at each fueling station in order to check the credential before the refill.
After an individual exceeds the minimum usage limit, the private refill will be charged
double the original price up to a maximum limit, after the private owner exceeds the
upper limit he will not be allowed to have a refill up to next month.
Furthermore to eliminate any sort of forgery, the driver will only be allowed to get a refill
in the cars he is registered with in the database, so that the system could not be
monopolized for black money.
Security Plan
Scams & Frauds
Countless opportunities are offered by new telecommunication technologies for small businesses;
however they also make them prone to new cybercrimes and scams. Hence the employees should be
aware of most common scams perpetrated on the Internet [6].
Cyber Plan Action:
1. Train employees to recognize social engineering
2. Protect against online fraud
3. Protect against phishing
4. Don’t fall for fake antivirus offers
5. Protect against malware
6. Develop a layered approach to guard against malicious software
6
7. Verify the identity of telephone information seekers
Network Security
Securing your company’s network consists of [7]
1. Identifying all devices and connections on the network
2. Setting boundaries between your company’s systems and others
3. Enforcing controls to ensure that unauthorized access, misuse, or denial-of-service events can be
thwarted or rapidly contained and recovered from if they do occur.
Cyber Plan Action Items:
1. Secure internal network and cloud services
a. Internal network
b. Cloud based services
2. Develop strong password policies
3. Secure and encrypt your company’s Wi-Fi
a. Wireless access control
b. Wireless encryption
4. Encrypt sensitive company data
5. Regularly update all applications
6. Set safe web browsing rules
7. If remote access is enabled, make sure it is secure
8. Website security is more important than ever.
Website Security
Webserver hosts the data and other content available to customers on the Internet. Components targeted
and attacked from the company's network. Cybercriminals are constantly looking for the incorrect.
Secured sites to attack, while he says many customers the security of the site is considered higher when
7
they chose to shop online. As a result, it is necessary to secure servers and the network infrastructure that
supports them [8].
The consequences of a security breach significant: loss of revenue, damage to credibility, legal liability
and loss customer confidence.
The following are examples of specific security threats to Web servers:
Cybercriminals may exploit software bugs in web server, the underlying operating system, or
activity content to gain unauthorized access to a web server. Examples of unauthorized access
win access to the files or folders that were not meant to be available to the public and be able to
execute orders and / or install malicious software on the web server.
May be directed denial of service attacks on web server or support network infrastructure for
prevent or obstruct the users of your website to take advantage of its services.
Sensitive information on a web server that can be read or modified without permission.
Sensitive information on the back-end databases that are used to support the interactive elements
on the web may be exposed to the risk of the application by injecting orders unauthorized
software. Examples include Structured Query Language (SQL) injection, and the Protocol
Lightweight Directory Access (LDAP)
Web servers, which host the data and other content available to your customers on the Internet, are often
the most targeted and attacked components of a company’s network. Cyber criminals are constantly
looking for improperly secured websites to attack, while many customers say website security is a top
consideration when they choose to shop online. As a result, it is essential to secure servers and the
network infrastructure that supports them.
Cyber Plan Action Items:
1. Carefully plan and address the security aspects of the deployment of a public web server.
2. Implement appropriate security management practices and controls when maintaining and
operating a secure web server.
3. Ensure that web server operating systems meet your organization’s security requirements.
4. Ensure the web server application meets your organization’s security requirements.
5. Ensure that only appropriate content is published on your website.
8
6. Ensure appropriate steps are taken to protect web content from unauthorized access or
modification.
7. Use active content judiciously after balancing the benefits and risks.
8. Use authentication and cryptographic technologies as appropriate to protect certain types of
sensitive data.
9. Employ network infrastructure to help protect public web servers.
10. Commit to an ongoing process of maintaining web server security.
Networking Technologies Deployed (Design Details)
The major aim of deploying high level of networking technology along with sensor moths and scanner, is
to eliminate the element of counterfeiting from the fuel rational system.
Networking technologies will allow transport authority to mechanize such dynamic environment in which
data can be shared, organized and used effectively in decision making. It will allow all the integrated
teams involved to get the holistic view of the system and give them an idea of the loops that connect each
element to the other. It will allow higher authorities to analyze and shape the pattern of how things move
around in the boundaries of a system [9].
Furthermore networking technologies will allow minimum human intervention in the process handling
and record maintenance for fuel rational techniques. This will reduce counterfeiting and corruption at all
the levels as the system will be made completely transparent, radical and robust.
The technologies used for the fuel rational solution:
RFIDs
RFID (radio frequency identification) is the latest technique to store information regarding solid parts, by
attaching a tag on them. RFID tags will be allotted to all the commercial vehicles for fuel ration
attachment [10]. It will carry all the information regarding the vehicle and its registration on the online
platform. The information will cover; name of the owner, the model and make of the vehicle, registration
number of the vehicle, the estimated miles the vehicle travels per day, last refill information, what date
does the next refill is due.
9
RFIDs can be thought of as a little chip attached to an antenna carrying non-volatile memory and a
replaceable memory. The information contained in the tag can be accessed wirelessly which allows
dynamic exchange of information. A reader transmits a certain encrypted signal, which when detected by
the tag sends a signal back with the information contained in it. The signal’s energy is used to charge a
capacitor on the tag.
Design of the RFID tag
The design appropriate for the desired application is that of Alien “Square” RFID tag which is currently
available in the market and is reliable [11], shown in figure 1.
Figure 1. The proposed design for the RFID tag to be used.
LAN Networks
These are local area networks that allow connection of many users in a work place internally [12]. It
allows them to share information on a single platform which can be accessed by any user in the network,
at any time. These networks will allow dynamic exchange of information and analysis which will allow
the monitory authority to keep a check and analyze the reports in real time from a single control unit.
Wide-area networking to connect different branches
10
Wide-area networking allows systems in different areas, far from each other to get connected through a
host and share information. It is feasible for businesses that have a wide spread of network across
different regions. This type of networking allows dynamic exchange of information, this information can
be accessed from a single control unit and all sorts of data analysis can be done.
Sensors
There are many different kinds of sensor systems that will be deployed in order to reduce human
intervention and in turn counterfeiting and forgery [13].
Sensors to count the entry of vehicles:
These sensors will be deployed at the entrance of each fueling station in order to measure
the number of vehicles entering into the station each day. The sensors will be directly
connected to the computer operated system and the information will be directly
accessible at the control unit without any changes. This will ensure a high level of
reliability for the data acquired for inspection and will reduce the chance of forgery and
corruption.
Sensors to check the amount of fuel in the storage tank of the fuelling station:
These sensors will be attached to the fuel reservoir of the fuelling stations, in order to get
accurate measurements of the fuel that has been consumed. This will also tremendously
reduce chances of corruption as the regulatory authority will instantly know when the
sheets will not balance and the fuelling station will be investigated for any ambiguities
present.
Card reader:
These readers will be given to each fuelling station so that the data of the private member
can be accessed and refilling can be done according to his credential and he might be
charged accordingly. Cards with chips on them are the most reliable way to check the
11
authenticity of a member as they are widely used everywhere in the world in all sorts of
financial institutions.
RFID reader:
These are wireless scanners that can detect an RFID and access its information from a
distance of around 1m. They emit radio frequencies, with an encrypted code, which when
detected by an RFID tag, activates it and allows the reader to access the stored memory.
This is the most reliable way of storing short term information for products.
The figure below (Fig 2) shows a flow diagram of how sensor networks can be utilized in systems
engineering, a summary of conceptual architecture for an autonomic sensor network for collaborative
information processing.
Fig 2. A flow diagram of how sensor networks
12
System Engineering Perspective to Constitute a Project Management Plan
The system of fuel rational is externally connected with regulatory authorities such as fuel price
controlling agencies, national highway authority and other governmental agencies to get access to the data
bases required and maintain coordination with the changing circumstances [14].
Some major interconnected elements within the system are:
The fuel station
The official website of transport authority
The software based platform to be used in fuel stations
The main control unit
The network of sensors integrated with the software
The Development Phase of Fuel Ration System:
The development phasing in a systems engineering planning is a very crucial phase. At this phase the
system engineers are supposed to plan the conceptual design baselines; by using hypothesis taking in the
capability analysis and the immaculate utilization of resources. It this phase focus is also on creating
check points for different levels of developments at different stages. Deployment of effective networks
can allow system engineers to generate data models enabling them to define fine lines for system
progress. Data mining can allow engineers to predict future inclination of the project, which can be used
to exploit solutions for better outcomes from a system.
Some major elements of development phasing for fuel rational are:
Devising a defined design baseline for the software to be used at the fuel stations.
Constituting the essential elements to be added to the official website.
Constituting a contingency plan for the system.
Defining the kinds of sensors to be deployed for different purposes.
13
Network systems are used to exchange information between experts from different fields involved in the
planning phase. The information required form the markets are also utilized using the smart market
analysis available at different platforms.
The System Engineering Process Phase:
This is the phase where the requirements from the stake holders, that are the minister in case of fuel ration
plan, are translated into the nodes of architecture of the system. System engineering process aims at
transforming requirements into specifications and architectures. One of the major challenges is to
translate the stakeholder requirements into specification for the engineers working in the system.
Networking can be used to form data models for interpretation of the requirements for each element.
One of the major obstacles in this phase is the decreasing of the complexity of the system. This can be
done by integrating all the teams such as construction, design and IT and bring them into agreement and
find a common ground for all to agree upon. Collaboration and collective meetings between the teams
will address this. In order for this strategy to be effective each problem should be disintegrated into small
pieces using a bottom up approach.
In this phase the major elements will be deployed as per the requirements decided in the system
development phase.
The computer network system is established at each fueling station.
Servers are deployed at the head office of transport authority.
Website is published with different publicity schemes in order to bring convey
the message to the masses.
Sensor networks are deployed at fueling station.
Experts are trained and attendants are appointed to operate the system.
All the cyber-attack protection schemes are deployed.
Special teams are trained to eliminate counterfeiting and, detect and mitigate any
malfunctioning in the system.
14
The Life Cycle Integration Phase:
Network systems can be most effectively utilized while doing life cycle integration in system engineering.
The basic aim of life cycle integration is to ensure that the design solution is viable throughout the system
life. It basically integrates multiple functional concerns into engineering processes [15].
The database is established and maintained
Regular security checks are undertaken in order to mitigate counterfeiting.
The manually maintained sheets are inspected in relevance to computer system
analysis to check if the system has any glitches of some sort.
Conclusion
In this high paced global world technology is changing every day. This requires a need for a constant
analysis of the durability and robustness of the system implemented and to transform it accordingly.
Utilizing technology to control fuel ration system is the best way to solve the complex problem of
regulating it on such a humungous level and tackling counterfeiting activities. But the task of cyber
security is to be dealt with a high preference as network security goes on to be one of the biggest
obstacles in appropriate operation of such a system. Furthermore networking technologies will allow
minimum human intervention in the process handling and record maintenance for fuel rational techniques.
This will reduce counterfeiting and corruption at all the levels as the system will be made completely
transparent, radical and robust. Smart networking systems allow effective data flow management where
the conditions and progress of the project can be constantly analyzed by transport authority officials.
Networking also potentiate the input of smart machines and robots, which can be programed to make
decisions on the basis of data acquired from different inputs to avoid much human involvement, thereby
reducing the risks of failures.
15
Bibliography
[1] M. Gover, Alternative road transport fuels, 1st ed. London: HMSO, 1996.
[2] W. Schäfer and P. Botella, Software engineering--ESEC '95, 1st ed. Berlin: Springer-Verlag,
1995.
[3] B. Trowbridge, Cloud sourcing the corporation, 1st ed. Austin, TX: Alsbridge, 2011.
[4] P. Kjellman, 'Fuel Rationing', 1982.
[5] J. Dean, 'Fuel Oil Rationing Protects Public Health*', American Journal of Public Health and
the Nations Health, vol 32, iss 12, pp. 1341--1344, 1942.
[6] H. Inose, Telecommunication technologies, 1st ed. Tokyo: Ohmsha, 1988.
[7] S. Shaffer and A. Simon, Network security, 1st ed. Boston: AP Professional, 1994.
[8] A. Tiwana, Web security, 1st ed. Boston: Digital Press, 1999.
[9] D. Minoli, Enterprise architecture A to Z, 1st ed. Boca Raton: CRC Press, 2008.
[10] F. Thornton, B. Haines, A. Das, H. Bhargava, A. Campbell and J. Kleinschmidt, RFID
security, 1st ed. Rockland, MA: Syngress Pub., 2006.
[11] F. Thornton, B. Haines, A. Das, H. Bhargava, A. Campbell and J. Kleinschmidt, RFID
security, 1st ed. Rockland, MA: Syngress Pub., 2006.
[12] J. Trulove, LAN wiring, 1st ed. New York: McGraw-Hill, 2000.
[13] R. Boll, Sensors, 1st ed. Weinheim: VCH, 1989.
[14] C. DAM, 'Project Management Plan', 2006.
[15] D. Serpanos and T. Wolf, Architecture of network systems, 1st ed. Burlington, MA: Morgan
Kaufmann, 2011.
16