Skip to main content
Top
Published in: Progress in Additive Manufacturing 1-2/2018

11-01-2018 | Review Article

Cybersecurity risks and mitigation strategies in additive manufacturing

Authors: Anudeep Padmanabhan, Jing Zhang

Published in: Progress in Additive Manufacturing | Issue 1-2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cybersecurity is a critical issue in additive manufacturing (AM), since AM relies on digital files and network connectivity. In this work, we first review several major cybersecurity risks and mitigation strategies in AM industry. Based on the review, we propose a new framework to detect threats and assess vulnerabilities in AM process. We also suggest a new technique of encrypting 3D model information using 2D images which may provide enhanced cybersecurity in AM process.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference X Yao, Z-T Lian, Y Yang, Jin H (2014) Wisdom manufacturing:new humans-computers-things collaborative manufacturing model. Comp Int Manuf Syst 20:1490–1498 X Yao, Z-T Lian, Y Yang, Jin H (2014) Wisdom manufacturing:new humans-computers-things collaborative manufacturing model. Comp Int Manuf Syst 20:1490–1498
6.
go back to reference LF Cómbita, J Giraldo, AA Cárdenas, Quijano N (2015) Response and reconfiguration of cyber-physical control systems: A survey. In: 2015 IEEE 2nd Colombian Conference on Automatic Control (CCAC). pp 1–6 LF Cómbita, J Giraldo, AA Cárdenas, Quijano N (2015) Response and reconfiguration of cyber-physical control systems: A survey. In: 2015 IEEE 2nd Colombian Conference on Automatic Control (CCAC). pp 1–6
7.
go back to reference Z DeSmit, AE Elhabashy, LJ Wells, Camelio JA (2016) Cyber-physical vulnerability assessment in manufacturing systems. Procedia Manuf 5:1060–1074 /01/01/ 2016.CrossRef Z DeSmit, AE Elhabashy, LJ Wells, Camelio JA (2016) Cyber-physical vulnerability assessment in manufacturing systems. Procedia Manuf 5:1060–1074 /01/01/ 2016.CrossRef
8.
go back to reference LD Sturm, CB Williams, JA Camelio, J White, Parker R (2017) Cyber-physical vulnerabilities in additive manufacturing systems: a case study attack on the.STL file with human subjects. J Manuf Syst 44:154–164 /07/01/ 2017.CrossRef LD Sturm, CB Williams, JA Camelio, J White, Parker R (2017) Cyber-physical vulnerabilities in additive manufacturing systems: a case study attack on the.STL file with human subjects. J Manuf Syst 44:154–164 /07/01/ 2017.CrossRef
10.
go back to reference SB Moore, WB Glisson, Yampolskiy M (2017) Implications of malicious 3D printer firmware. In: Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS), pp. 6089–6098 SB Moore, WB Glisson, Yampolskiy M (2017) Implications of malicious 3D printer firmware. In: Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS), pp. 6089–6098
11.
go back to reference S Moore, P Armstrong, T McDonald, Yampolskiy M, (2016) Vulnerability analysis of desktop 3D printer software. In: 2016 resilience week (RWS), pp 46–51 S Moore, P Armstrong, T McDonald, Yampolskiy M, (2016) Vulnerability analysis of desktop 3D printer software. In: 2016 resilience week (RWS), pp 46–51
12.
go back to reference E Zeltmann, N Gupta, NG Tsoutsos, M Maniatakos, J Rajendran, Karri R (2016) Manufacturing and Security Challenges in 3D Printing JOM 68, pp 1872–1881CrossRef E Zeltmann, N Gupta, NG Tsoutsos, M Maniatakos, J Rajendran, Karri R (2016) Manufacturing and Security Challenges in 3D Printing JOM 68, pp 1872–1881CrossRef
14.
go back to reference M Yampolskiy, A Skjellum, M Kretzschmar, RA Overfelt, KR Sloan, Yasinsac A (2016) Using 3D printers as weapons. Int J Crit Infrastruct Prot 14:58–71 /09/01/ 2016.CrossRef M Yampolskiy, A Skjellum, M Kretzschmar, RA Overfelt, KR Sloan, Yasinsac A (2016) Using 3D printers as weapons. Int J Crit Infrastruct Prot 14:58–71 /09/01/ 2016.CrossRef
15.
go back to reference SR Chhetri, A Canedo, Faruque MAA (2016) KCAD: kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. In: 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1–8 SR Chhetri, A Canedo, Faruque MAA (2016) KCAD: kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. In: 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 1–8
16.
go back to reference A Sinha, A Unmesh, Q Huang, Ramani K (2017) SurfNet: Generating 3D shape surfaces using deep residual networks (arXiv170304079S) A Sinha, A Unmesh, Q Huang, Ramani K (2017) SurfNet: Generating 3D shape surfaces using deep residual networks (arXiv170304079S)
Metadata
Title
Cybersecurity risks and mitigation strategies in additive manufacturing
Authors
Anudeep Padmanabhan
Jing Zhang
Publication date
11-01-2018
Publisher
Springer International Publishing
Published in
Progress in Additive Manufacturing / Issue 1-2/2018
Print ISSN: 2363-9512
Electronic ISSN: 2363-9520
DOI
https://doi.org/10.1007/s40964-017-0036-9

Other articles of this Issue 1-2/2018

Progress in Additive Manufacturing 1-2/2018 Go to the issue

Premium Partners