2021
DOI: 10.1115/1.4048966
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based G-Code Protection Approach for Cyber-Physical Security in Additive Manufacturing

Abstract: As an emerging technology, additive manufacturing (AM) is able to fabricate products with complex geometries using various materials. In particular, cyber-enabled AM systems have recently become widely applied in many real-world applications. It significantly improves the flexibility and productivity of AM but poses the system under high risks of cyber-physical attacks. For example, cyber-physical attack could maliciously tamper the product design and process parameters, which, in turn, leads to significant al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 32 publications
0
11
0
Order By: Relevance
“…How to reduce the dependence of the method on the amount of data requires a lot of research. For the future, integrate DT, physical model-based method, and virtual model-based method to establish an integrated learning prediction model to achieve complementary advantages, of course, this is a more complex modeling process, but [240,241] has also tried. It cannot be ignored that DT has shown a strong advantage in gear RUL forecast and performance degradation assessment, the dots of buds have already grown, and the moment it blooms, it will attract the world's attention.…”
Section: Discussionmentioning
confidence: 99%
“…How to reduce the dependence of the method on the amount of data requires a lot of research. For the future, integrate DT, physical model-based method, and virtual model-based method to establish an integrated learning prediction model to achieve complementary advantages, of course, this is a more complex modeling process, but [240,241] has also tried. It cannot be ignored that DT has shown a strong advantage in gear RUL forecast and performance degradation assessment, the dots of buds have already grown, and the moment it blooms, it will attract the world's attention.…”
Section: Discussionmentioning
confidence: 99%
“…However, a potential shortcoming of deterministic marks is that they must be integrated into the part at the CAD level and, therefore, they are not able to avoid counterfeiting in case the digital design file is copied or stolen, unless additional measures are put in place to protect the file itself [ 21 , 22 , 30 ]. This is a critical issue for AM that is often defined as “digital manufacturing”, because it relies on a workflow that is mostly digital until printing [ 13 ].…”
Section: Discussion and Critical Considerationsmentioning
confidence: 99%
“…In this regard, the establishment of a secure strategy to ensuring provenance, quality compliance and intellectual property protection in AM largely depends on existing knowledge and new achievements in materials science and technology. However, as already happens for diamonds and fashion products [ 67 ], emerging trends in the literature suggest that, in the future, traceability in AM will also benefit from digital platforms and especially from blockchain-based solutions, where the virtual twin of the physical object is safely stored in the blockchain and the tagging feature becomes the hyperlink between the physical and cyber worlds [ 20 , 23 , 30 , 51 , 68 , 69 ]. To this aim, materials engineers will be asked to integrate manufacturing technology and information systems.…”
Section: Discussion and Critical Considerationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally, there are several challenges to G-code protection, these challenges include (Shi et al , 2021): G-code commands have a simple and fixed structure that easily can be modified through a cyberattack; due to the layer-by-layer style, a small, targeted (site specific and temporal) attack can impact the fabrication process significantly; and code file needs to be updated periodically thereby resulting in high maintenance costs. …”
Section: Key Vulnerabilities Associated With Cybersecurity Of Additiv...mentioning
confidence: 99%