Internet of nuclear things: Managing the proliferation risks of 3-D printing technology

ABSTRACT Over the next decade, the spread and maturation of additive manufacturing could challenge major control mechanisms for inhibiting nuclear proliferation. At the same time, the cyber-physical nature of this production technology creates the potential for the emergence of an Internet of Nuclear Things, which could be harnessed to increase the information visibility of dual-use activities in civil nuclear programs. This new capability could offer unique opportunities to mitigate proliferation risks and augment traditional methods of regulating and monitoring sensitive nuclear technologies. But barriers stand in the way of leveraging an Internet of Nuclear Things – notably, political issues related to information access and integrity. As additive manufacturing technology matures, government and industry stakeholders should adopt a strategic approach toward an evolving Internet of Nuclear Things – an approach that would include principles to encourage transparency within the Internet of Nuclear Things and ensure the integrity of the information it produces.

[1]  Jonathan B. Tucker,et al.  Innovation, Dual Use, and Security: Managing the Risks of Emerging Biological and Chemical Technologies , 2012 .

[2]  Aaron Arnold A Resilience Framework for Understanding Illicit Nuclear Procurement Networks , 2017 .

[3]  Jules White,et al.  Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects , 2017 .

[4]  Tristan A. Volpe Atomic Leverage: Compellence with Nuclear Latency , 2017 .

[5]  E. Fuchs,et al.  Global manufacturing and the future of technology , 2014, Science.

[6]  Mark Yampolskiya,et al.  Using 3 D printers as weapons , 2016 .

[7]  N. Miller Why Nuclear Energy Programs Rarely Lead to Proliferation , 2017, International Security.

[8]  S. Zielinski,et al.  International Court of Justice , 2002, International Organization.

[9]  Yuan Xue,et al.  A language for describing attacks on cyber-physical systems , 2015, Int. J. Crit. Infrastructure Prot..

[10]  P. W. Singer,et al.  Cybersecurity and Cyberwar: What Everyone Needs to Know® , 2013 .

[11]  John W. Sutherland,et al.  Framework for Identifying Cybersecurity Risks in Manufacturing , 2015 .

[12]  Mara Hvistendahl INDUSTRIAL ESPIONAGE. 3D printers vulnerable to spying. , 2016, Science.

[13]  Yuval Elovici,et al.  dr0wned - Cyber-Physical Attack with Additive Manufacturing , 2016, WOOT.

[14]  David Albright,et al.  Detecting and Disrupting Illicit Nuclear Trade after A.Q. Khan , 2010 .

[16]  David Albright,et al.  Detecting and Disrupting Illicit Nuclear Trade after , 2010 .

[17]  Thomas Rid Cyber War Will Not Take Place , 2012 .

[18]  Jaime A. Camelio,et al.  Cyber-physical Vulnerability Assessment in Manufacturing Systems , 2016 .

[19]  Vincenzo A. Sainato,et al.  Cyber War Will Not Take Place , 2012 .

[20]  Natasha Bajema,et al.  Peril and Promise: Emerging Technologies and WMD , 2017 .

[21]  Nektarios Georgios Tsoutsos,et al.  Manufacturing and Security Challenges in 3D Printing , 2016 .

[22]  Vipin Narang,et al.  Strategies of Nuclear Proliferation: How States Pursue the Bomb , 2017, International Security.

[23]  Feng-hua Liu,et al.  A systematic analysis , 2020 .

[24]  Jay Patel,et al.  Additive manufacturing , 2016, XRDS.

[25]  Celia Paulsen,et al.  Proceedings of the Cybersecurity for Direct Digital Manufacturing (DDM) Symposium , 2015 .

[26]  Matthew Kroenig,et al.  3-D Printing the Bomb? The Nuclear Nonproliferation Challenge , 2015 .

[27]  Anthony Skjellum,et al.  Using 3D printers as weapons , 2016, Int. J. Crit. Infrastructure Prot..

[28]  J. Tucker Innovation, Dual Use, and Security , 2012 .

[29]  Guha Manogharan,et al.  Making sense of 3-D printing: Creating a map of additive manufacturing products and services , 2014 .

[30]  Yuan Xue,et al.  Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach , 2012, 2012 5th International Symposium on Resilient Control Systems.

[31]  David Livingstone Mbe Dsc,et al.  Cyber Security at Civil Nuclear Facilities: Understanding the Risks , 2016 .

[32]  C. Kamath,et al.  Laser powder bed fusion additive manufacturing of metals; physics, computational, and materials challenges , 2015 .

[33]  Grant Christopher,et al.  3D Printing: A Challenge to Nuclear Export Controls , 2015 .

[34]  Marco Fey,et al.  3D printing and international security: risks and challenges of an emerging technology , 2017 .