Security Vulnerabilities Affecting on Addititve Manufacturing Systems in the Era of Industry 4.0: An Extensive Review

S. Rambabu, N. Rao, M. Ramakotaiah, J. Raju, J. Venumurali
{"title":"Security Vulnerabilities Affecting on Addititve Manufacturing Systems in the Era of Industry 4.0: An Extensive Review","authors":"S. Rambabu, N. Rao, M. Ramakotaiah, J. Raju, J. Venumurali","doi":"10.1109/ETI4.051663.2021.9619291","DOIUrl":null,"url":null,"abstract":"The Industry 4.0 concept refers to the integration of the smart manufacturing systems with the developed information technologies such as machine learning, internet of things (IoT), big data, augmented reality, additive manufacturing/3D printing, and cyber security technologies. This paper presents the potential vulnerabilities and their affects on the additive manufacturing systems at various stages including design phase, manufacturing phase, post-processing and testing phase. It was found that the malicious modification of 3D CAD file, .STL file, toolpath or G-code file affects on the quality and functional performance of the additive manufactured parts by means of introducing the internal voids, modify the external surface geometry, or alter the printer firmware to change the laser power intensity, scanning strategy, and layer thickness. Furthermore, the side-channel leakage of information from the vibration, acoustic, thermal, magnetic and power emissions data could be used to reconstruct the original product design and manufacturing conditions. Finally, the paper concludes the importance of cybersecurity of additive manufacturing systems in order to achieve the desired quality and productivity.","PeriodicalId":129682,"journal":{"name":"2021 Emerging Trends in Industry 4.0 (ETI 4.0)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Emerging Trends in Industry 4.0 (ETI 4.0)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETI4.051663.2021.9619291","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Industry 4.0 concept refers to the integration of the smart manufacturing systems with the developed information technologies such as machine learning, internet of things (IoT), big data, augmented reality, additive manufacturing/3D printing, and cyber security technologies. This paper presents the potential vulnerabilities and their affects on the additive manufacturing systems at various stages including design phase, manufacturing phase, post-processing and testing phase. It was found that the malicious modification of 3D CAD file, .STL file, toolpath or G-code file affects on the quality and functional performance of the additive manufactured parts by means of introducing the internal voids, modify the external surface geometry, or alter the printer firmware to change the laser power intensity, scanning strategy, and layer thickness. Furthermore, the side-channel leakage of information from the vibration, acoustic, thermal, magnetic and power emissions data could be used to reconstruct the original product design and manufacturing conditions. Finally, the paper concludes the importance of cybersecurity of additive manufacturing systems in order to achieve the desired quality and productivity.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
工业4.0时代影响增材制造系统的安全漏洞:综述
工业4.0概念是指智能制造系统与机器学习、物联网(IoT)、大数据、增强现实、增材制造/3D打印和网络安全技术等发达信息技术的融合。本文介绍了增材制造系统在设计阶段、制造阶段、后处理阶段和测试阶段的潜在漏洞及其影响。研究发现,恶意修改3D CAD文件、。stl文件、刀具路径或G-code文件,可以通过引入内部空洞、修改外表面几何形状或改变打印机固件来改变激光功率强度、扫描策略和层厚,从而影响增材制造零件的质量和功能性能。此外,从振动、声学、热、磁和功率发射数据中获得的侧通道泄漏信息可以用来重建原始产品的设计和制造条件。最后,本文总结了增材制造系统网络安全对于实现预期质量和生产率的重要性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Detecting Sybil Attack, Black Hole Attack and DoS Attack in VANET Using RSA Algorithm Real Time Servo Analysis of Non-Linear Conical Tank Level Control using Root Locus Technique Apply Blockchain Technology for Security of IoT Devices A Highly Efficient Intrusion Detection and Packet Tracking Based on Game Theory Approach Logistic Regression Model for Loan Prediction: A Machine Learning Approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1