Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks

被引:78
作者
Gupta, Nikhil [1 ]
Tiwari, Akash [2 ,3 ]
Bukkapatnam, Satish T. S. [2 ,3 ]
Karri, Ramesh [1 ]
机构
[1] NYU, Ctr Cybersecur, Tandon Sch Engn, Brooklyn, NY 11201 USA
[2] Texas A&M Univ, TEES Inst Mfg Syst, College Stn, TX 77843 USA
[3] Texas A&M Univ, Dept Ind & Syst Engn, College Stn, TX 77843 USA
关键词
Supply chains; Printers; Solid modeling; Three-dimensional printing; Security; Three-dimensional displays; Manufacturing technology; supply chain management; risk analysis; production engineering; SECURITY CHALLENGES; DIGITAL TWIN; DESIGN;
D O I
10.1109/ACCESS.2020.2978815
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Additive Manufacturing (AM) methods have become increasingly efficient and industrially viable in the past ten years. These methods offer the freedom of complexity to the designers and choices of localized and pull-based production system to the managers. These propositions of AM have been enabling custom manufacturing and are catalysts for rapid growth of additive manufacturing (AM). This paper analyzes the general characteristics of AM supply chain and proposes three AM supply chain models based on the specific nature of the industry. Our description of the models emphasizes on adopting an holistic view of the AM supply chain and therefore includes raw material, printer hardware and the virtual supply chain. Throughout the product life cycle of additively manufactured products, the interlacing of the virtual supply chain (digital thread) with the physical supply chain and their operations fundamentally make the AM process a cyber-physical system (CPS). Therefore, the technology brings along with it benefits of a CPS as well as a new class of attack vectors. We discuss the possible attacks (printer, raw material and design level), risks (reverse engineering, counterfeiting and theft) and provide an enhanced risk classification scheme. We contend that the traditional cybersecurity methods need to evolve to address the new class of attack vectors that threaten the AM supply chain and also discuss the nature of existing solutions that help in addressing the risks and attack threats. In providing an holistic view of the AM supply chain the interdependencies of the processes in the AM supply chain are presented and we elucidate the effects of local attack vectors on the entire supply chain. Further, we discuss the existing security measures to mitigate the risk and identify the existing gap in AM security that needs to be bridged.
引用
收藏
页码:47322 / 47333
页数:12
相关论文
共 34 条
[1]  
[Anonymous], [No title captured]
[2]  
[Anonymous], [No title captured]
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], [No title captured]
[5]  
Bahga A., 2016, J Softw Eng Appl, V9, P533, DOI DOI 10.4236/JSEA.2016.910036
[6]   CAD-Base: An Attack Vector into the Electronics Supply Chain [J].
Basu, Kanad ;
Saeed, Samah Mohamed ;
Pilato, Christian ;
Ashraf, Mohammed ;
Nabeel, Mohammed Thari ;
Chakrabarty, Krishnendu ;
Karri, Ramesh .
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2019, 24 (04)
[7]   Digital Audio Signature for 3D Printing Integrity [J].
Belikovetsky, Sofia ;
Solewicz, Yosef A. ;
Yampolskiy, Mark ;
Toh, Jinghui ;
Elovici, Yuval .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1127-1141
[8]   Obfuscation of Embedded Codes in Additive Manufactured Components for Product Authentication [J].
Chen, Fei ;
Yu, Jian H. ;
Gupta, Nikhil .
ADVANCED ENGINEERING MATERIALS, 2019, 21 (08)
[9]   Embedding Tracking Codes in Additive Manufactured Parts for Product Authentication [J].
Chen, Fei ;
Luo, Yuxi ;
Tsoutsos, Nektarios Georgios ;
Maniatakos, Michail ;
Shahin, Khaled ;
Gupta, Nikhil .
ADVANCED ENGINEERING MATERIALS, 2019, 21 (04)
[10]   Security features embedded in computer aided design (CAD) solid models for additive manufacturing [J].
Chen, Fei ;
Mac, Gary ;
Gupta, Nikhil .
MATERIALS & DESIGN, 2017, 128 :182-194