On the Analysis of a Compromised Additive Manufacturing System Using Spatio-Temporal Decomposition

Sakthi Kumar Arul Prakash, Tobias Mahan, Glen Williams, Christopher McComb, Jessica Menold, Conrad S. Tucker
{"title":"On the Analysis of a Compromised Additive Manufacturing System Using Spatio-Temporal Decomposition","authors":"Sakthi Kumar Arul Prakash, Tobias Mahan, Glen Williams, Christopher McComb, Jessica Menold, Conrad S. Tucker","doi":"10.1115/detc2019-97732","DOIUrl":null,"url":null,"abstract":"\n 3D printing systems have expanded the access to low cost, rapid methods for attaining physical prototypes or products. However, a cyber attack, system error, or operator error on a 3D printing system may result in catastrophic situations, ranging from complete product failure, to small types of defects which weaken the structural integrity of the product, making it unreliable for its intended use. Such defects can be introduced early-on via solid models or through G-codes for printer movements at a later stage. Previous works have studied the use of image classifiers to predict defects in real-time as a print is in progress and also by studying the printed entity once the print is complete. However, a major restriction in the functionality of these methods is the availability of a dataset capturing diverse attacks on printed entities or the printing process. This paper introduces a visual inspection technique that analyzes the amplitude and phase variations of the print head platform arising through induced system manipulations. The method uses an image sequence of a 3D printing process captured via an off the shelf camera to perform an offline multi-scale, multi-orientation decomposition to amplify imperceptible system movements attributable to a change in system parameters. The authors hypothesize that a change in the amplitude envelope and instantaneous phase response as a result of a change in the end effector translational instructions, to be correlated with an AM system compromise. A case study is presented that tests the hypothesis and provides statistical validity in support of the method. The method has the potential to enhance the robustness of cyber-physical systems such as 3D printers that rely on secure, high quality hardware and software to perform optimally.","PeriodicalId":198662,"journal":{"name":"Volume 2B: 45th Design Automation Conference","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Volume 2B: 45th Design Automation Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1115/detc2019-97732","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

3D printing systems have expanded the access to low cost, rapid methods for attaining physical prototypes or products. However, a cyber attack, system error, or operator error on a 3D printing system may result in catastrophic situations, ranging from complete product failure, to small types of defects which weaken the structural integrity of the product, making it unreliable for its intended use. Such defects can be introduced early-on via solid models or through G-codes for printer movements at a later stage. Previous works have studied the use of image classifiers to predict defects in real-time as a print is in progress and also by studying the printed entity once the print is complete. However, a major restriction in the functionality of these methods is the availability of a dataset capturing diverse attacks on printed entities or the printing process. This paper introduces a visual inspection technique that analyzes the amplitude and phase variations of the print head platform arising through induced system manipulations. The method uses an image sequence of a 3D printing process captured via an off the shelf camera to perform an offline multi-scale, multi-orientation decomposition to amplify imperceptible system movements attributable to a change in system parameters. The authors hypothesize that a change in the amplitude envelope and instantaneous phase response as a result of a change in the end effector translational instructions, to be correlated with an AM system compromise. A case study is presented that tests the hypothesis and provides statistical validity in support of the method. The method has the potential to enhance the robustness of cyber-physical systems such as 3D printers that rely on secure, high quality hardware and software to perform optimally.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于时空分解的受损增材制造系统分析
3D打印系统已经扩展了获得物理原型或产品的低成本,快速方法。然而,3D打印系统上的网络攻击、系统错误或操作错误可能导致灾难性的情况,从完全的产品故障到削弱产品结构完整性的小型缺陷,使其无法正常使用。这些缺陷可以在早期通过实体模型引入,或者在后期通过打印机运动的g代码引入。以前的工作研究了使用图像分类器在打印过程中实时预测缺陷,以及在打印完成后研究打印实体。然而,这些方法在功能上的一个主要限制是数据集的可用性,这些数据集捕获了对打印实体或打印过程的各种攻击。本文介绍了一种视觉检测技术,该技术分析了打印头平台由诱导系统操作引起的幅度和相位变化。该方法使用通过现成的相机捕获的3D打印过程的图像序列来执行离线多尺度,多方向分解,以放大由于系统参数变化而引起的难以察觉的系统运动。作者假设,由于末端执行器平移指令的变化,振幅包络线和瞬时相位响应的变化与AM系统的折衷有关。提出了一个案例研究来检验假设,并提供了支持该方法的统计有效性。该方法有可能增强网络物理系统(如3D打印机)的稳健性,这些系统依赖于安全、高质量的硬件和软件来实现最佳性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Goal-Oriented, Inverse Decision-Based Method for an American Football Helmet System Reliability Analysis With Second Order Saddlepoint Approximation A Literature Review: Solving Constrained Non-Linear Bi-Level Optimization Problems With Classical Methods Confidence-Based Design Optimization Under Data Uncertainty Using Most Probable Point-Based Approach An Agent-Based Modeling Approach for Clean Technologies Adoption Using Theory of Planned Behavior Based Decision-Making
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1