A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems

Abstract Smart manufacturing systems can be considered within the Cyber-Physical Systems (CPS) domain, where currently, there is a major concern regarding cybersecurity. This paper introduces a simulation-based model to assess the repercussions on manufacturing systems’ performance under the potential presence of cyber-threats. The applicability of the assessment model has been validated through the implementation of a case study for the manufacturing sector. Different scenarios have been developed in order to apply an experimental design analysis, where several factors on the model will permit to elucidate the combination of controllable defense policies and uncontrollable security-based parameters that will reduce the negative impact on the manufacturing system’s performance. Results have revealed that the impact of cyber-attacks on manufacturing physical operations can be reduced by different defense policies such as increasing capacity of resources at the shop floor and applying more conservative reorder policies for certain situations. Levels among recovery times did not yield the same magnitude of effect. As far as the uncontrollable factors for companies are concerned, it was revealed that the mean time between attacks and the number of potential threat sources have a significant influence on the performance metrics of the system.

[1]  Jaime A. Camelio,et al.  Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems , 2015 .

[2]  Jaime A. Camelio,et al.  An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems , 2017 .

[3]  Robert K. Abercrombie,et al.  Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC) , 2015, J. Artif. Intell. Soft Comput. Res..

[4]  C. Hauert,et al.  Game theory and physics , 2005 .

[5]  Jules White,et al.  Cyber-physical security challenges in manufacturing systems , 2014 .

[6]  Bradley Reaves,et al.  Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems , 2012, Int. J. Crit. Infrastructure Prot..

[7]  Jay Lee,et al.  A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .

[8]  Sherif Abdelwahed,et al.  Model-based autonomic security management for cyber-physical infrastructures , 2016, Int. J. Crit. Infrastructures.

[9]  Banu Yetkin Ekren,et al.  A simulation based experimental design to analyze factors affecting production flow time , 2008, Simul. Model. Pract. Theory.

[10]  Przemyslaw Korytkowski,et al.  Simulation-based efficiency analysis of an in-plant milk-run operator under disturbances , 2015, The International Journal of Advanced Manufacturing Technology.

[11]  Kathryn E. Stecke,et al.  Evaluation of the impact of information delays on flexible manufacturing systems performance in dynamic scheduling environments , 2013 .

[12]  Amir H.D. Markazi,et al.  Networked control of industrial automation systems—a new predictive method , 2012 .

[13]  Jules White,et al.  Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects , 2017 .

[14]  Mohammad Abdollahi Azgomi,et al.  A game-theoretic approach to model and quantify the security of cyber-physical systems , 2017, Comput. Ind..

[15]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[16]  Sherif Abdelwahed,et al.  A Model-based Approach to Self-Protection in SCADA Systems , 2014, Feedback Computing.

[17]  David Hutchison,et al.  A survey of cyber security management in industrial control systems , 2015, Int. J. Crit. Infrastructure Prot..

[18]  Lin Chen,et al.  A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.

[19]  H. Pierreval *,et al.  A simulation-based optimization approach to size manufacturing systems , 2005 .

[20]  Mason Rice,et al.  Improving the cyber resilience of industrial control systems , 2017, Int. J. Crit. Infrastructure Prot..

[21]  Yang Xiao,et al.  Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.

[22]  Nektarios Georgios Tsoutsos,et al.  Manufacturing and Security Challenges in 3D Printing , 2016 .