Identifying Cyber-Physical Vulnerabilities in Additive Manufacturing Systems using a Systems Approach

被引:0
|
作者
Krishnan, Rahul [1 ]
Bhada, Shamsnaz Virani [1 ]
机构
[1] Worcester Polytech Inst WPI, Elect & Comp Engn ECE, Worcester, MA 01609 USA
关键词
Cyber-physical security; Additive Manufacturing; Vulnerability Assessment and Mitigation (VAM) methodology; Systems Engineering;
D O I
10.1109/smc42975.2020.9283127
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing influence and adoption of Additive Manufacturing (AM) technology across manufacturing sectors has made it a target for cyber-physical attacks. While several techniques have been developed to mitigate specific AM related threats, there is little research aimed at assessing cyber-physical threats or vulnerabilities that extend across the entire AM workflow. Such an assessment requires a holistic approach that systematically analyzes all components of the AM workflow for cyber-physical vulnerabilities. Several methodologies have been successfully applied towards identifying such vulnerabilities in other domains like Information Technology (IT) systems. In response, this paper provides a systems approach towards identifying cyber-physical vulnerabilities in AM systems using the Vulnerability Assessment and Mitigation (VAM) methodology. This approach characterizes the different vulnerabilities that arise from specific AM threats by identifying the quality attributes of the AM system that introduces it. The security techniques developed to mitigate these threats are reduced to a combination of fundamental mitigation techniques, that have been compiled based on its success in other domains. Using the resources from the VAM methodology, fundamental mitigation techniques that are best suited towards mitigating specific vulnerability attributes are identified. Comparing the combination of fundamental mitigation techniques associated with an AM security technique and the list of fundamental mitigation techniques suggested by the VAM methodology provides insight into how an AM security technique can be improved. Finally, the paper provides a case study of the proposed adapted VAM methodology to demonstrate its application.
引用
收藏
页码:2113 / 2118
页数:6
相关论文
共 50 条
  • [41] A PetriNet-Based Approach for Supporting Traceability in Cyber-Physical Manufacturing Systems
    Huang, Jiwei
    Zhu, Yeping
    Cheng, Bo
    Lin, Chuang
    Chen, Junliang
    SENSORS, 2016, 16 (03):
  • [42] A Descriptive Engineering Approach for Cyber-Physical Systems
    Henning, Steffen
    Niggemann, Oliver
    Otto, Jens
    Schriegel, Sebastian
    2014 IEEE EMERGING TECHNOLOGY AND FACTORY AUTOMATION (ETFA), 2014,
  • [43] Interdisciplinary Approach to Cyber-physical Systems Training
    Iureva, Radda A.
    Kremlev, Artem S.
    Margun, Alexey A.
    Vlasov, Sergey M.
    Vasilkov, Sergey D.
    Penskoi, Alexandr, V
    Konovalov, Dmitry E.
    Korepanov, Pavel Y.
    ICINCO: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS, VOL 2, 2019, : 623 - 626
  • [44] A Hybrid Approach to Cyber-Physical Systems Verification
    Kumar, Pratyush
    Goswami, Dip
    Chakraborty, Samarjit
    Annaswamy, Anuradha
    Lampka, Kai
    Thiele, Lothar
    2012 49TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2012, : 688 - 696
  • [45] An Analysis and prototyping approach for Cyber-Physical Systems
    Deniaud, Samuel
    Descamps, Philippe
    Hilaire, Vincent
    Lamotte, Olivier
    Rodriguez, Sebastian
    10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS, 2015, 56 : 520 - 525
  • [46] The Behavioral Approach to Diagnostics of Cyber-Physical Systems
    Skormin, Victor
    Dolgikh, Andrey
    Birnbaum, Zachary
    2014 IEEE AUTOTESTCON, 2014,
  • [47] A Rapid Review on Software Vulnerabilities and Embedded, Cyber-Physical, and IoT Systems
    Marchetto, Alessandro
    Scanniello, Giuseppe
    PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROFES 2023, PT I, 2024, 14483 : 468 - 477
  • [48] An approach to model dependability of cyber-physical systems
    Sanislav, Teodora
    Mois, George
    Miclea, Liviu
    MICROPROCESSORS AND MICROSYSTEMS, 2016, 41 : 67 - 76
  • [49] Optimally Scheduled Interventions in the Presence of Vulnerabilities for Modern Cyber-Physical Systems
    Sandor, Hunor
    Haller, Piroska
    Genge, Bela
    Katai, Zoltan
    2017 IEEE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2017, : 115 - 120
  • [50] Securing cyber-physical additive manufacturing systems by in-situ process authentication using streamline video analysis
    Al Mamun, Abdullah
    Liu, Chenang
    Kan, Chen
    Tian, Wenmeng
    JOURNAL OF MANUFACTURING SYSTEMS, 2022, 62 : 429 - 440