A Survey of Cybersecurity of Digital Manufacturing

The Industry 4.0 concept promotes a digital manufacturing (DM) paradigm that can enhance quality and productivity, that reduces inventory and the lead-time for delivering custom, batch-of-one products based on achieving convergence of Additive, Subtractive, and Hybrid manufacturing machines, Automation and Robotic Systems, Sensors, Computing, and Communication Networks, Artificial Intelligence, and Big Data. A DM system consists of embedded electronics, sensors, actuators, control software, and inter-connectivity to enable the machines and the components within them to exchange data with other machines, components therein, the plant operators, the inventory managers, and customers. This paper presents the cybersecurity risks in the emerging DM context, assesses the impact on manufacturing, and identifies approaches to secure DM.

[1]  Yuval Elovici,et al.  Digital Audio Signature for 3D Printing Integrity , 2019, IEEE Transactions on Information Forensics and Security.

[2]  M. A. Faruque Forensics of Thermal Side-Channel in Additive Manufacturing Systems , 2016 .

[3]  RenKui,et al.  My Smartphone Recognizes Genuine QR Codes , 2018 .

[4]  Satish T. S. Bukkapatnam,et al.  Implementing the Transformation of Discrete Part Manufacturing Systems Into Smart Manufacturing Platforms , 2018, Volume 3: Manufacturing Equipment and Systems.

[5]  Masahiko Mori,et al.  Innovative grid molding and cooling using an additive and subtractive hybrid CNC machine tool , 2017 .

[6]  Vijay Sivaraman,et al.  Characterizing and classifying IoT traffic in smart cities and campuses , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[7]  Arquimedes Canedo,et al.  Tool of Spies: Leaking your IP by Altering the 3D Printer Compiler , 2019 .

[8]  S. H. Mian,et al.  Additive manufacturing: Challenges, trends, and applications , 2019, Advances in Mechanical Engineering.

[9]  Christopher Saldana,et al.  Adaptive geometry transformation and repair for hybrid manufacturing , 2018 .

[10]  Wyatt Hoffman,et al.  Internet of nuclear things: Managing the proliferation risks of 3-D printing technology , 2018 .

[11]  Young B. Moon,et al.  Taxonomy of Cross-Domain Attacks on CyberManufacturing System , 2017 .

[12]  Mohammad Abdullah Al Faruque,et al.  Security trends and advances in manufacturing systems in the era of industry 4.0 , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[13]  Zhiyuan Zheng,et al.  Safeguarding Building Automation Networks: THE-Driven Anomaly Detector Based on Traffic Analysis , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[14]  Yang Gao,et al.  Watching and Safeguarding Your 3D Printer , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[15]  Nektarios Georgios Tsoutsos,et al.  ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting: Invited , 2017, DAC.

[16]  WangWei,et al.  Watching and Safeguarding Your 3D Printer , 2018 .

[17]  Satish T. S. Bukkapatnam,et al.  Towards rapid, in situ characterization for materials-on-demand manufacturing , 2020 .

[18]  Adam J. Brown,et al.  Security of additive manufacturing: Attack taxonomy and survey , 2018 .

[19]  Mark Mohammad Tehranipoor,et al.  Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.

[20]  Panganamala Ramana Kumar,et al.  Secure control of networked cyber-physical systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[21]  Carl E. Landwehr,et al.  A taxonomy of computer program security flaws , 1993, CSUR.

[22]  Wenyao Xu,et al.  My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers , 2016, CCS.

[23]  Arquimedes Canedo,et al.  Acoustic Side-Channel Attacks on Additive Manufacturing Systems , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[24]  Panganamala Ramana Kumar,et al.  Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[25]  Nektarios Georgios Tsoutsos,et al.  Embedding Tracking Codes in Additive Manufactured Parts for Product Authentication , 2018, Advanced Engineering Materials.

[26]  Kim-Kwang Raymond Choo,et al.  A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers , 2016, IEEE Transactions on Information Forensics and Security.

[27]  Satish T. S. Bukkapatnam,et al.  Smart manufacturing multiplex , 2020 .

[28]  Satish T. S. Bukkapatnam,et al.  Change Detection and Prognostics for Transient Real-World Processes Using Streaming Data , 2018, Recent Advances in Optimization and Modeling of Contemporary Problems.

[29]  Ray Y. Zhong,et al.  Intelligent Manufacturing in the Context of Industry 4.0: A Review , 2017 .

[30]  Douglas C. Schmidt,et al.  Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems , 2017, Int. J. Interact. Multim. Artif. Intell..

[31]  Arun R. Srinivasa,et al.  Towards Realizing Cybermanufacturing Kiosks: Quality Assurance Challenges and Opportunities , 2018 .

[32]  Bruce L. Tai,et al.  Acoustic Emission Characterization of Natural Fiber Reinforced Plastic Composite Machining Using a Random Forest Machine Learning Model , 2020 .

[33]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[34]  Fei Chen,et al.  Security features embedded in computer aided design (CAD) solid models for additive manufacturing , 2017 .

[35]  Kuang-Ting Hsiao,et al.  Optimal Sabotage Attack on Composite Material Parts , 2019, Int. J. Crit. Infrastructure Prot..

[36]  Atul Prakash,et al.  Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? , 2017, IEEE Security & Privacy.

[37]  Satish T. S. Bukkapatnam,et al.  Process-machine interactions and a multi-sensor fusion approach to predict surface roughness in cylindrical plunge grinding process , 2018 .

[38]  Воробьев Антон Александрович Анализ уязвимостей вычислительных систем на основе алгебраических структур и потоков данных National Vulnerability Database , 2013 .

[39]  Arquimedes Canedo,et al.  KCAD: Kinetic Cyber-attack detection method for Cyber-physical additive manufacturing systems , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[40]  Taku Yamazaki,et al.  Development of A Hybrid Multi-tasking Machine Tool: Integration of Additive Manufacturing Technology with CNC Machining , 2016 .

[41]  Alec Yasinsac,et al.  Security Challenges of Additive Manufacturing with Metals and Alloys , 2015, Critical Infrastructure Protection.

[42]  Satish T. S. Bukkapatnam,et al.  Time series forecasting for nonlinear and non-stationary processes: a review and comparative study , 2015 .

[43]  Bharadwaj Satchidanandan,et al.  Control Systems Under Attack: The Securable and Unsecurable Subspaces of a Linear Stochastic System , 2018 .

[44]  Riccardo Bettati,et al.  IoTAegis: A Scalable Framework to Secure the Internet of Things , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).

[45]  Rajarshi Gupta,et al.  All Things Considered: An Analysis of IoT Devices on Home Networks , 2019, USENIX Security Symposium.

[46]  Nektarios Georgios Tsoutsos,et al.  Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering , 2017, CPSS@AsiaCCS.

[47]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.

[48]  Yuval Elovici,et al.  How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective , 2017, ARES.

[49]  Mohammad Abdullah Al Faruque,et al.  Side Channels of Cyber-Physical Systems: Case Study in Additive Manufacturing , 2017, IEEE Des. Test.

[50]  Yoel Raban,et al.  Foresight of cyber security threat drivers and affecting technologies , 2018, foresight.

[51]  Vijay Sivaraman,et al.  Systematically Evaluating Security and Privacy for Consumer IoT Devices , 2017, IoT S&P@CCS.

[52]  Swarup Bhunia,et al.  An Automated Framework for Board-level Trojan Benchmarking , 2020, ArXiv.

[53]  Frank W. Liou,et al.  Three Dimensional Die Repair Using a Hybrid Manufacturing System , 2006 .

[54]  Jing Zhang,et al.  Cybersecurity risks and mitigation strategies in additive manufacturing , 2018 .

[55]  Niraj K. Jha,et al.  Smart, Secure, Yet Energy-Efficient, Internet-of-Things Sensors , 2018, IEEE Transactions on Multi-Scale Computing Systems.

[56]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[57]  Riccardo Bettati,et al.  Securing cyber-physical systems with adaptive commensurate response , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[58]  Kaushik Yanamandra,et al.  Reverse engineering of additive manufactured composite part by toolpath reconstruction using imaging and machine learning , 2020, Composites Science and Technology.

[59]  Zhengyi Song,et al.  Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example , 2017 .

[60]  Anthony Skjellum,et al.  Using 3D printers as weapons , 2016, Int. J. Crit. Infrastructure Prot..

[61]  Ramesh Karri,et al.  A Primer on Hardware Security: Models, Methods, and Metrics , 2014, Proceedings of the IEEE.

[62]  Young B. Moon,et al.  Alert Correlation for Detecting Cyber-Manufacturing Attacks and Intrusions , 2020, J. Comput. Inf. Sci. Eng..

[63]  Jaime A. Camelio,et al.  Cyber-physical Vulnerability Assessment in Manufacturing Systems , 2016 .

[64]  Can Saygin,et al.  A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems , 2018 .

[65]  Sara J. Graves,et al.  Cyber Security for Additive Manufacturing , 2015, CISR.

[66]  Kim-Kwang Raymond Choo,et al.  Identifying 3D printer residual data via open-source documentation , 2018, Comput. Secur..

[67]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[68]  Can Saygin,et al.  Cybersecurity Analysis of Smart Manufacturing System Using Game Theory Approach and Quantal Response Equilibrium , 2018 .

[69]  Stephen Hailes,et al.  Security of smart manufacturing systems , 2018 .

[70]  Michael S. Hsiao,et al.  Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.

[71]  Mariano Jiménez,et al.  Additive Manufacturing Technologies: An Overview about 3D Printing Methods and Future Prospects , 2019, Complex..

[72]  R. Komanduri,et al.  Real-Time Identification of Incipient Surface Morphology Variations in Ultraprecision Machining Process , 2014 .

[73]  Yuval Elovici,et al.  dr0wned - Cyber-Physical Attack with Additive Manufacturing , 2016, WOOT.

[74]  Sujit Rokka Chhetri,et al.  Sabotage Attack Detection for Additive Manufacturing Systems , 2020, IEEE Access.

[75]  Hoda Ghadeer,et al.  Cybersecurity Issues in Internet of Things and Countermeasures , 2018, 2018 IEEE International Conference on Industrial Internet (ICII).

[76]  Yunhao Liu,et al.  Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud , 2019, MobiSys.

[77]  Zhengyi Song,et al.  Establishment of intrusion detection testbed for CyberManufacturing systems , 2018 .

[78]  Fei Chen,et al.  Obfuscation of Embedded Codes in Additive Manufactured Components for Product Authentication , 2019, Advanced engineering materials.

[79]  Mikhail J. Atallah,et al.  Security in Cyber-Enabled Design and Manufacturing: A Survey , 2018, J. Comput. Inf. Sci. Eng..

[80]  Prahalada Rao,et al.  Thermal Modeling in Metal Additive Manufacturing Using Graph Theory , 2019, Journal of Manufacturing Science and Engineering.

[81]  K. Xiao,et al.  Hardware Trojans , 2016, ACM Trans. Design Autom. Electr. Syst..

[82]  Swaroop Ghosh,et al.  How Secure Are Printed Circuit Boards Against Trojan Attacks? , 2015, IEEE Design & Test.

[83]  chao wei,et al.  Embedding anti-counterfeiting features in metallic components via multiple material additive manufacturing , 2018, Additive Manufacturing.

[84]  Marco Fey,et al.  3D printing and international security: risks and challenges of an emerging technology , 2017 .

[85]  Arquimedes Canedo,et al.  Confidentiality Breach Through Acoustic Side-Channel in Cyber-Physical Additive Manufacturing Systems , 2017, ACM Trans. Cyber Phys. Syst..

[86]  Panganamala Ramana Kumar,et al.  On minimal tests of sensor veracity for dynamic watermarking-based defense of cyber-physical systems , 2017, 2017 9th International Conference on Communication Systems and Networks (COMSNETS).

[87]  Arquimedes Canedo,et al.  Poster Abstract: Thermal Side-Channel Forensics in Additive Manufacturing Systems , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[88]  William Bradley Glisson,et al.  Implications of Malicious 3D Printer Firmware , 2017, HICSS.

[89]  Ashutosh Tiwari,et al.  The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).

[90]  Yuval Elovici,et al.  Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing , 2017, ArXiv.

[91]  Panganamala Ramana Kumar,et al.  Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems , 2016, Proceedings of the IEEE.

[92]  Ramesh Karri,et al.  Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks , 2020, IEEE Access.

[93]  D. Roller,et al.  Additive Manufacturing , Cloud-Based 3 D Printing and Associated Services — Overview , 2017 .

[94]  Jaime A. Camelio,et al.  Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems , 2015 .

[95]  Christian Kreiner,et al.  Integrated design for tackling safety and security challenges of smart products and digital manufacturing , 2017 .

[96]  Saurabh Sinha,et al.  A Review of Industry 4.0 Manufacturing Process Security Risks , 2019, Applied Sciences.

[97]  Jaime A. Camelio,et al.  Cyber-Physical Security Research Efforts in Manufacturing – A Literature Review , 2019, Procedia Manufacturing.

[98]  Joshua Lubell,et al.  Characteristic Aspects of Additive Manufacturing Security From Security Awareness Perspectives , 2019, IEEE Access.

[99]  Thomas A. Campbell,et al.  Unclonable security features for additive manufacturing , 2014 .

[100]  Satish T. S. Bukkapatnam,et al.  The internet of things for smart manufacturing: A review , 2019, IISE Trans..

[101]  Jules White,et al.  Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the .STL file with human subjects , 2017 .

[102]  Jaime A. Camelio,et al.  A cyber-physical attack taxonomy for production systems: a quality control perspective , 2019, J. Intell. Manuf..

[103]  Yuval Elovici,et al.  Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing , 2017, ArXiv.

[104]  Xing Liu,et al.  Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities , 2019, IEEE Access.

[105]  Dazhong Wu,et al.  Cyber security in smart manufacturing: Survey and challenges , 2017 .

[106]  Sujit Rokka Chhetri,et al.  Information Leakage-Aware Computer-Aided Cyber-Physical Manufacturing , 2018, IEEE Transactions on Information Forensics and Security.

[107]  Dazhong Wu,et al.  Cybersecurity for digital manufacturing , 2018, Journal of Manufacturing Systems.

[108]  Nektarios Georgios Tsoutsos,et al.  INVITED: ObfusCADe: Obfuscating additive manufacturing CAD models against counterfeiting , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).

[109]  Satish T. S. Bukkapatnam,et al.  Machine learning and AI for long-term fault prognosis in complex manufacturing systems , 2019, CIRP Annals.

[110]  Satish T. S. Bukkapatnam,et al.  Model-Based Tampering for Improved Process Performance—An Application to Grinding of Shafts , 2003 .

[111]  Todd R. Andel,et al.  Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing , 2014, PPREW@ACSAC.

[112]  Young B. Moon,et al.  Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods , 2017, Journal of Intelligent Manufacturing.