
Project MCSecurity – cybersecurity of motion control systems in Industry 4.0
March 24, 2025
We increasingly receive information through public media or directly from our acquaintances about certain companies, institutions, or individuals becoming victims of cyber attacks. These incidents often result in harmful consequences, including identity theft and the demand for financial resources to recover stolen data. Imagine, on the other hand, what consequences a cyberattack on manufacturing technologies within various plants or machines could have, such as a cyber-attack on the camera or distance sensors on your car that would cause these sensors to give you incorrect information when parking or an attack on an industrial plant where the control system receives incorrect information about the temperature level in a pressure vessel. Thus, the MCSecurity project focuses on developing a system to protect operational technologies from cyberattacks in industrial control systems.
The project examines cyberattacks on motion control in manufacturing systems, focusing on two specific types of attacks. The first refers to attacks on signals used to visually control the motion of mobile robots based on information from a camera, while the second relates to attacks on communication links between controllers, which are responsible for controlling the motion of numerically controlled machines. If successful, a cyberattack on these systems can lead to the realization of an incorrect trajectory of a mobile robot or a machine end device and to economic consequences reflected in missed deadlines or the production of non-conforming products. In the worst-case scenario, these attacks can also cause a collision between equipment within a production facility or a mutual collision of machine elements, which can have not only negative economic consequences but also catastrophic consequences for the environment and human safety, and in the worst case, can even lead to the loss of human lives. The MCSecurity project aims to address the problem of cyber-attack detection and adaptation of the production system in case the attack is detected.