Abstract

As an emerging technology, additive manufacturing (AM) is able to fabricate products with complex geometries using various materials. In particular, cyber-enabled AM systems have recently become widely applied in many real-world applications. It significantly improves the flexibility and productivity of AM but poses the system under high risks of cyber-physical attacks. For example, cyber-physical attack could maliciously tamper the product design and process parameters, which, in turn, leads to significant alteration of the desired properties in AM products. Therefore, there is an urgent need in incorporating advanced technologies to improve the cyber-physical security for the cyber-enabled AM systems. In this study, two common types of cyber-physical attacks regarding the G-code security were investigated, namely, unintended design modifications and intellectual property theft. To effectively secure the G-code against these two attacks, a new methodology is developed in this study, which consists of a novel blockchain-based data storage approach and an effective asymmetry encryption technique. The proposed method was also applied to a real-world AM case for ensuring the cyber-physical security of the face shield fabrication, which is critical during the COVID-19 pandemic. Based on the proposed methodology, malicious tampering can be accurately detected in time, and meanwhile, the risk of unauthorized access of the G-code file is greatly eliminated as well.

References

1.
Li
,
Y.
,
Hu
,
Y.
,
Cong
,
W.
,
Zhi
,
L.
, and
Guo
,
Z.
,
2017
, “
Additive Manufacturing of Alumina Using Laser Engineered Net Shaping: Effects of Deposition Variables
,”
Ceram. Int.
,
43
(
10
), pp.
7768
7775
. 10.1016/j.ceramint.2017.03.085
2.
Bandyopadhyay
,
A.
,
Krishna
,
B. V.
,
Xue
,
W.
, and
Bose
,
S.
,
2009
, “
Application of Laser Engineered Net Shaping (LENS) to Manufacture Porous and Functionally Graded Structures for Load Bearing Implants
,”
J. Mater. Sci.: Mater. Med.
,
20
(
1
), pp.
29
34
. 10.1007/s10856-008-3478-2
3.
How Much Would a Data Breach Cost Your Business?
,” IBM, https://www.ibm.com/security/data-breach, Accessed August 16, 2020
4.
Harvey
,
C.
,
2018
, “
Symantec 2018 Internet Security Threat Report—Review
,” https://www.data3.com/knowledge-centre/blog/symantec-2018-internet-security-threat-report-review/, Accessed August 20, 2020.
5.
Cyber Risk in Advanced Manufacturing
,” Deloitte, https://www2.deloitte.com/us/en/pages/manufacturing/articles/cyber-risk-in-advanced-manufacturing.html, Accessed May 24, 2020.
6.
Sturm
,
L. D.
,
Williams
,
C. B.
,
Camelio
,
J. A.
,
White
,
J.
, and
Parker
,
R.
,
2017
, “
Cyber-physical Vulnerabilities in Additive Manufacturing Systems: A Case Study Attack on the. STL File With Human Subjects
,”
J. Manuf. Syst.
,
44
, pp.
154
164
. 10.1016/j.jmsy.2017.05.007
7.
Wells
,
L. J.
,
Camelio
,
J. A.
,
Williams
,
C. B.
, and
White
,
J.
,
2014
, “
Cyber-physical Security Challenges in Manufacturing Systems
,”
Manuf. Lett.
,
2
(
2
), pp.
74
77
. 10.1016/j.mfglet.2014.01.005
8.
Liu
,
C.
,
2019
, “
Smart Additive Manufacturing Using Advanced Data Analytics and Closed Loop Control
,”
Ph.D. dissertation
,
Virginia Tech
,
Blacksburg, VA
.
9.
Abeyratne
,
S. A.
, and
Monfared
,
R. P.
,
2016
, “
Blockchain Ready Manufacturing Supply Chain Using Distributed Ledger
,”
Int. J. Res. Eng. Technol.
,
5
(
9
), pp.
1
10
. 10.15623/ijret.2016.0509001
10.
Yampolskiy
,
M.
,
Schutzle
,
L.
,
Vaidya
,
U.
, and
Yasinsac
,
A.
, “
Security Challenges of Additive Manufacturing With Metals and Alloys
,”
Proceedings of International Conference on Critical Infrastructure Protection
,
Arlington, VA
,
Mar. 16–18
, Springer, pp.
169
183
.
11.
Zeltmann
,
S. E.
,
Gupta
,
N.
,
Tsoutsos
,
N. G.
,
Maniatakos
,
M.
,
Rajendran
,
J.
, and
Karri
,
R.
,
2016
, “
Manufacturing and Security Challenges in 3D Printing
,”
JOM
,
68
(
7
), pp.
1872
1881
. 10.1007/s11837-016-1937-7
12.
Hospodar
,
G.
,
Gierlichs
,
B.
,
De Mulder
,
E.
,
Verbauwhede
,
I.
, and
Vandewalle
,
J.
,
2011
, “
Machine Learning in Side-Channel Analysis: A First Study
,”
J. Cryptogr. Eng.
,
1
(
4
), p.
293
. 10.1007/s13389-011-0023-x
13.
Narasimhan
,
S.
,
Du
,
D.
,
Chakraborty
,
R. S.
,
Paul
,
S.
,
Wolff
,
F.
,
Papachristou
,
C.
,
Roy
,
K.
, and
Bhunia
,
S.
,
2010
, “
Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach
,”
Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
,
Anaheim, CA
,
June 13–14
, IEEE, pp.
13
18
.
14.
Komolafe
,
T.
,
Tian
,
W.
,
Purdy
,
G. T.
,
Albakri
,
M.
,
Tarazaga
,
P.
, and
Camelio
,
J.
,
2019
, “
Repeatable Part Authentication Using Impedance Based Analysis for Side-Channel Monitoring
,”
J. Manuf. Syst.
,
51
, pp.
42
51
. 10.1016/j.jmsy.2019.01.007
15.
Tenney
,
C.
,
Albakri
,
M.
,
Williams
,
C.
, and
Tarazaga
,
P.
,
2019
, “NDE of Additively Manufactured Parts via Directly Bonded and Mechanically Attached Electromechanical Impedance Sensors,”
Dynamics of Civil Structures
, 2nd ed.,
S.
Pakzad
, ed.,
Springer
,
New York
, pp.
263
271
.
16.
Tenney
,
C.
,
Albakri
,
M. I.
,
Kubalak
,
J.
,
Sturm
,
L. D.
,
Williams
,
C. B.
, and
Tarazaga
,
P. A.
, “
Internal Porosity Detection in Additively Manufactured Parts via Electromechanical Impedance Measurements
,”
Proceedings of Smart Materials, Adaptive Structures and Intelligent Systems
,
American Society of Mechanical Engineers
,
New York
, p.
V001T008A009
.
17.
Flank
,
S.
,
Nassar
,
A. R.
,
Simpson
,
T. W.
,
Valentine
,
N.
, and
Elburn
,
E.
,
2017
, “
Fast Authentication of Metal Additive Manufacturing
,”
3D Print. Addit. Manuf.
,
4
(
3
), pp.
143
148
. 10.1089/3dp.2017.0018
18.
Ivanova
,
O.
,
Elliott
,
A.
,
Campbell
,
T.
, and
Williams
,
C.
,
2014
, “
Unclonable Security Features for Additive Manufacturing
,”
Addit. Manuf.
,
1
, pp.
24
31
.
19.
Chen
,
F.
,
Mac
,
G.
, and
Gupta
,
N.
,
2017
, “
Security Features Embedded in Computer Aided Design (CAD) Solid Models for Additive Manufacturing
,”
Mater. Des.
,
128
, pp.
182
194
. 10.1016/j.matdes.2017.04.078
20.
Gupta
,
N.
,
Chen
,
F.
,
Tsoutsos
,
N. G.
, and
Maniatakos
,
M.
,
2017
, “
ObfusCADe: Obfuscating Additive Manufacturing CAD Models Against Counterfeiting
,”
Proceedings of the 54th Annual Design Automation Conference
,
Austin, TX
,
June 18–22
, pp.
1
6
.
21.
Wei
,
C.
,
Sun
,
Z.
,
Huang
,
Y.
, and
Li
,
L.
,
2018
, “
Embedding Anti-counterfeiting Features in Metallic Components via Multiple Material Additive Manufacturing
,”
Addit. Manuf.
,
24
, pp.
1
12
.
22.
Chen
,
F.
,
Yu
,
J. H.
, and
Gupta
,
N.
,
2019
, “
Obfuscation of Embedded Codes in Additive Manufactured Components for Product Authentication
,”
Adv. Eng. Mater.
,
21
(
8
), p.
1900146
. 10.1002/adem.201900146
23.
Chen
,
F.
,
Luo
,
Y.
,
Tsoutsos
,
N. G.
,
Maniatakos
,
M.
,
Shahin
,
K.
, and
Gupta
,
N.
,
2019
, “
Embedding Tracking Codes in Additive Manufactured Parts for Product Authentication
,”
Adv. Eng. Mater.
,
21
(
4
), p.
1800495
. 10.1002/adem.201800495
24.
Gültekin
,
S.
,
Ural
,
A.
, and
Yaman
,
U.
,
2019
, “
Embedding QR Codes on the Interior Surfaces of FFF Fabricated Parts
,”
Procedia Manuf.
,
39
, pp.
519
525
. 10.1016/j.promfg.2020.01.411
25.
Trenfield
,
S. J.
,
Tan
,
H. X.
,
Awad
,
A.
,
Buanz
,
A.
,
Gaisford
,
S.
,
Basit
,
A. W.
, and
Goyanes
,
A.
,
2019
, “
Track-and-Trace: Novel Anti-counterfeit Measures for 3D Printed Personalized Drug Products Using Smart Material Inks
,”
Int. J. Pharm.
,
567
, p.
118443
. 10.1016/j.ijpharm.2019.06.034
26.
Yang
,
J.
,
Peng
,
H.
,
Liu
,
L.
, and
Lu
,
L.
,
2019
, “
3D Printed Perforated QR Codes
,”
Comput. Graph.
,
81
, pp.
117
124
. 10.1016/j.cag.2019.04.005
27.
Brandman
,
J.
,
Sturm
,
L.
,
White
,
J.
, and
Williams
,
C.
,
2020
, “
A Physical Hash for Preventing and Detecting Cyber-Physical Attacks in Additive Manufacturing Systems
,”
J. Manuf. Syst.
,
56
, pp.
202
212
. 10.1016/j.jmsy.2020.05.014
28.
Tsoutsos
,
N. G.
,
Gamil
,
H.
, and
Maniatakos
,
M.
, “
Secure 3D Printing: Reconstructing and Validating Solid Geometries Using Toolpath Reverse Engineering
,”
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security
,
Abu Dhabi, UAE
,
Apr. 2
, pp.
15
20
.
29.
Zhang
,
Y.
,
Xu
,
X.
,
Liu
,
A.
,
Lu
,
Q.
,
Xu
,
L.
, and
Tao
,
F.
,
2019
, “
Blockchain-Based Trust Mechanism for IoT-Based Smart Manufacturing System
,”
IEEE Trans. Comput. Social Syst.
,
6
(
6
), pp.
1386
1394
. 10.1109/TCSS.2019.2918467
30.
Yu
,
C.
,
Zhang
,
L.
,
Zhao
,
W.
, and
Zhang
,
S.
,
2019
, “
A Blockchain-Based Service Composition Architecture in Cloud Manufacturing
,”
Int. J. Comput. Integr. Manuf.
,
33
(
7
), pp.
701
715
.
31.
Lee
,
J.
,
Azamfar
,
M.
, and
Singh
,
J.
,
2019
, “
A Blockchain Enabled Cyber-physical System Architecture for Industry 4.0 Manufacturing Systems
,”
Manufac. Lett.
,
20
, pp.
34
39
. 10.1016/j.mfglet.2019.05.003
32.
Mandolla
,
C.
,
Petruzzelli
,
A. M.
,
Percoco
,
G.
, and
Urbinati
,
A.
,
2019
, “
Building a Digital Twin for Additive Manufacturing Through the Exploitation of Blockchain: A Case Analysis of the Aircraft Industry
,”
Comput. Ind.
,
109
, pp.
134
152
. 10.1016/j.compind.2019.04.011
33.
Angrish
,
A.
,
Craver
,
B.
,
Hasan
,
M.
, and
Starly
,
B.
,
2018
, “
A Case Study for Blockchain in Manufacturing:“FabRec”: A Prototype for Peer-to-Peer Network of Manufacturing Nodes
,”
Procedia Manuf.
,
26
, pp.
1180
1192
. 10.1016/j.promfg.2018.07.154
34.
Kennedy
,
Z. C.
,
Stephenson
,
D. E.
,
Christ
,
J. F.
,
Pope
,
T. R.
,
Arey
,
B. W.
,
Barrett
,
C. A.
, and
Warner
,
M. G.
,
2017
, “
Enhanced Anti-counterfeiting Measures for Additive Manufacturing: Coupling Lanthanide Nanomaterial Chemical Signatures with Blockchain Technology
,”
J. Mater. Chem. C
,
5
(
37
), pp.
9570
9578
. 10.1039/C7TC03348F
35.
Yu
,
C.
,
Jiang
,
X.
,
Yu
,
S.
, and
Yang
,
C.
,
2020
, “
Blockchain-Based Shared Manufacturing in Support of Cyber Physical Systems: Concept, Framework, and Operation
,”
Robot. Comput. Integr. Manuf.
,
64
, p.
101931
. 10.1016/j.rcim.2019.101931
36.
Zhu
,
X.
,
Shi
,
J.
,
Huang
,
S.
, and
Zhang
,
B.
,
2020
, “
Consensus-Oriented Cloud Manufacturing Based on Blockchain Technology: An Exploratory Study
,”
Pervasive Mob. Comput.
,
62
, p.
101113
. 10.1016/j.pmcj.2020.101113
37.
Leng
,
J.
,
Ruan
,
G.
,
Jiang
,
P.
,
Xu
,
K.
,
Liu
,
Q.
,
Zhou
,
X.
, and
Liu
,
C.
,
2020
, “
Blockchain-Empowered Sustainable Manufacturing and Product Lifecycle Management in Industry 4.0: A Survey
,”
Renewable Sustainable Energy Rev.
,
132
, p.
110112
. 10.1016/j.rser.2020.110112
38.
Chhetri
,
S. R.
,
Canedo
,
A.
, and
Al Faruque
,
M. A.
,
2016
, “
Kcad: Kinetic Cyber-attack Detection Method for Cyber-physical Additive Manufacturing Systems
,”
Proceedings of IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
,
Austin, TX
,
Nov. 7–10
, IEEE, pp.
1
8
.
39.
Moore
,
S. B.
,
Gatlin
,
J.
,
Belikovetsky
,
S.
,
Yampolskiy
,
M.
,
King
,
W. E.
, and
Elovici
,
Y.
,
2017
, “
Power consumption-based detection of sabotage attacks in additive manufacturing
,”
arXiv preprint arXiv:1709.01822
.
40.
Everton
,
S. K.
,
Hirsch
,
M.
,
Stravroulakis
,
P.
,
Leach
,
R. K.
, and
Clare
,
A. T.
,
2016
, “
Review of In-situ Process Monitoring and In-situ Metrology for Metal Additive Manufacturing
,”
Mater. Des.
,
95
, pp.
431
445
. 10.1016/j.matdes.2016.01.099
41.
Peterson
,
K.
,
Deeduvanu
,
R.
,
Kanjamala
,
P.
, and
Boles
,
K.
,
2016
, “
A Blockchain-Based Approach to Health Information Exchange Networks
,”
Proceedings of NIST Workshop Blockchain Healthcare
,
Washington, DC
,
Sept. 1
, pp.
1
10
.
42.
Merkle
,
R. C.
,
1989
, “
One Way Hash Functions and DES
,”
Proceedings of Conference on the Theory and Application of Cryptology
,
Santa Barbara, CA
,
Aug. 20–24
, Springer, pp.
428
446
.
43.
Di Pierro
,
M.
,
2017
, “
What Is the Blockchain?
,”
Comput. Sci. Eng.
,
19
(
5
), pp.
92
95
. 10.1109/MCSE.2017.3421554
44.
Yaga
,
D.
,
Mell
,
P.
,
Roby
,
N.
, and
Scarfone
,
K.
,
2019
, “
Blockchain Technology Overview
,”
arXiv preprint arXiv:1906.11078
.
45.
Zheng
,
Z.
,
Xie
,
S.
,
Dai
,
H.
,
Chen
,
X.
, and
Wang
,
H.
,
2017
, “
An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends
,”
Proceedings of IEEE International Congress on big Data (BigData Congress)
,
Honolulu, HI
,
June 25–30
, IEEE, pp.
557
564
.
46.
Buterin
,
V.
,
2014
, “
A Next-Generation Smart Contract and Decentralized Application Platform
,” https://blockchainlab.com/pdf/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf,
Accessed June 16, 2020
.
47.
Liang
,
X.
,
Zhao
,
J.
,
Shetty
,
S.
,
Liu
,
J.
, and
Li
,
D.
,
2017
, “
Integrating Blockchain for Data Sharing and Collaboration in Mobile Healthcare Applications
,”
Proceedings of IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
,
Montreal, Canada
,
Oct. 8–13
, IEEE, pp.
1
5
.
48.
Dinh
,
T. T. A.
,
Liu
,
R.
,
Zhang
,
M.
,
Chen
,
G.
,
Ooi
,
B. C.
, and
Wang
,
J.
,
2018
, “
Untangling Blockchain: A Data Processing View of Blockchain Systems
,”
IEEE Trans. Knowl. Data Eng.
,
30
(
7
), pp.
1366
1385
. 10.1109/TKDE.2017.2781227
49.
Holland
,
M.
,
Stjepandić
,
J.
, and
Nigischer
,
C.
,
2018
, “
Intellectual Property Protection of 3D Print Supply Chain with Blockchain Technology
,”
Proceedings of IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC)
,
Stuttgart, Germany
,
June 17–20
, IEEE, pp.
1
8
.
50.
Androulaki
,
E.
,
Barger
,
A.
,
Bortnikov
,
V.
,
Cachin
,
C.
,
Christidis
,
K.
,
De Caro
,
A.
,
Enyeart
,
D.
,
Ferris
,
C.
,
Laventman
,
G.
, and
Manevich
,
Y.
, “
Hyperledger Fabric: a Distributed Operating System for Permissioned Blockchains
,”
Proceedings of the Thirteenth EuroSys Conference
,
Porto, Portugal
,
Apr. 23–26
, pp.
1
15
.
51.
Kumar
,
Y.
,
Munjal
,
R.
, and
Sharma
,
H.
,
2011
, “
Comparison of Symmetric and Asymmetric Cryptography With Existing Vulnerabilities and Countermeasures
,”
Int. J. Comput. Sci. Manag. Stud.
,
11
(
03
), pp.
60
63
.
52.
Gaubatz
,
G.
,
Kaps
,
J.-P.
, and
Sunar
,
B.
, “
Public key Cryptography in Sensor Networks—Revisited
,”
Proceedings of European Workshop on Security in Ad-Hoc and Sensor Networks
,
Heidelberg, Germany
,
Aug. 6
, Springer, pp.
2
18
.
53.
Khalifa
,
A.
,
2013
, “
LSBase: A Key Encapsulation Scheme to Improve Hybrid Crypto-Systems Using DNA Steganography
,”
Proceedings of 8th International Conference on Computer Engineering & Systems (ICCES)
,
Cairo, Egypt
,
Nov. 26–28
, IEEE, pp.
105
110
.
54.
Zhou
,
X.
, and
Tang
,
X.
,
2011
, “
Research and Implementation of RSA Algorithm for Encryption and Decryption
,”
Proceedings of 6th International Forum on Strategic Technology
,
Harbin, China
,
Aug. 22–24
, IEEE, pp.
1118
1121
.
55.
Al Hasib
,
A.
, and
Haque
,
A. A. M. M.
,
2008
, “
A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography
,”
Proceeding of Third International Conference on Convergence and Hybrid Information Technology
,
Busan, South Korea
,
Nov. 11–13
, IEEE, pp.
505
510
.
56.
Rivest
,
R. L.
,
Shamir
,
A.
, and
Adleman
,
L.
,
1978
, “
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
,”
Commun. ACM
,
21
(
2
), pp.
120
126
. 10.1145/359340.359342
57.
Zheng
,
Z.
,
Xie
,
S.
,
Dai
,
H.-N.
,
Chen
,
X.
, and
Wang
,
H.
,
2018
, “
Blockchain Challenges and Opportunities: A Survey
,”
Int. J. Web Grid Serv.
,
14
(
4
), pp.
352
375
. 10.1504/IJWGS.2018.095647
58.
Boneh
,
D.
, and
Shacham
,
H.
,
2002
, “
Fast Variants of RSA
,”
CryptoBytes
,
5
(
1
), pp.
1
9
.
59.
Manero
,
A.
,
Smith
,
P.
,
Koontz
,
A.
,
Dombrowski
,
M.
,
Sparkman
,
J.
,
Courbin
,
D.
, and
Chi
,
A.
,
2020
, “
Leveraging 3D Printing Capacity in Times of Crisis: Recommendations for COVID-19 Distributed Manufacturing for Medical Equipment Rapid Response
,”
Int. J. Environ. Res. Public Health
,
17
(
13
), p.
4634
. 10.3390/ijerph17134634
60.
Exchange, N. D. P.
,
2020
, “
DtM-v3.1 Face Shield PPE, 3D Printable Headband NO LOGO
,” https://3dprint.nih.gov/discover/3dpx-013359,
Accessed August 16, 2020
.
You do not currently have access to this content.