Javascript must be enabled to continue!
Smart manufacturing towards cyber-physical resilience in 3D printing process monitoring and anomaly detection
View through CrossRef
Abstract
The digital threads of additive manufacturing (AM), originating from smart manufacturing, leverage Cyber-Physical Systems (CPS) that integrate interconnected cyber and physical domains, wherein the cyber domain encompasses product design processes (e.g., CAD modeling, .STL file creation, G-code generation, and cloud-based data sharing), while the physical domain employs the G-code to drive 3D printing and enable post-process monitoring. G-code modifications are a common vector for malicious cyberattacks on AM systems, enabling alterations to part designs and print parameters that disrupt the printing process and degrade the mechanical properties and functionality of mission-critical parts. To detect cyber-attacks in AM systems, this study employs National Institute of Standards and Technology (NIST) cybersecurity frameworks to systematically detect cyber-attacks in AM systems and uses a fused filament fabrication (FFF) 3D printer testbed to simulate raster angle-based alteration classification (RAAC) for sensitivity analysis. This work focuses on G-code alteration detection using Euclidean distances along the x, y, and z axes, and employs layer-by-layer in-situ video monitoring of the FFF process via a digital microscope camera mounted on the extruder head to identify fabrication defects and potential cyber-physical attacks. Thus, layer-wise image frames are processed using adaptive region-of-interests (ROIs) to adjust spatiotemporal image fames’ raster angle and RGB-to-grayscale conversion to extract rasterized surface texture features (STFs), which capture surface patterns at varying raster angles and are refined using principal component analysis (PCA) for dimensionality reduction and feature extraction. This study evaluates a multiclass support vector machine (SVM) to detect RAAC attacks on AM systems. The model’s effectiveness is measured by using confusion matrices to analyze classification accuracy. The RAAC approach proved more effective than benchmark methods like Independent Component Analysis (ICA) and Convolutional Neural Networks (CNNs).
Springer Science and Business Media LLC
Title: Smart manufacturing towards cyber-physical resilience in 3D printing process monitoring and anomaly detection
Description:
Abstract
The digital threads of additive manufacturing (AM), originating from smart manufacturing, leverage Cyber-Physical Systems (CPS) that integrate interconnected cyber and physical domains, wherein the cyber domain encompasses product design processes (e.
g.
, CAD modeling, .
STL file creation, G-code generation, and cloud-based data sharing), while the physical domain employs the G-code to drive 3D printing and enable post-process monitoring.
G-code modifications are a common vector for malicious cyberattacks on AM systems, enabling alterations to part designs and print parameters that disrupt the printing process and degrade the mechanical properties and functionality of mission-critical parts.
To detect cyber-attacks in AM systems, this study employs National Institute of Standards and Technology (NIST) cybersecurity frameworks to systematically detect cyber-attacks in AM systems and uses a fused filament fabrication (FFF) 3D printer testbed to simulate raster angle-based alteration classification (RAAC) for sensitivity analysis.
This work focuses on G-code alteration detection using Euclidean distances along the x, y, and z axes, and employs layer-by-layer in-situ video monitoring of the FFF process via a digital microscope camera mounted on the extruder head to identify fabrication defects and potential cyber-physical attacks.
Thus, layer-wise image frames are processed using adaptive region-of-interests (ROIs) to adjust spatiotemporal image fames’ raster angle and RGB-to-grayscale conversion to extract rasterized surface texture features (STFs), which capture surface patterns at varying raster angles and are refined using principal component analysis (PCA) for dimensionality reduction and feature extraction.
This study evaluates a multiclass support vector machine (SVM) to detect RAAC attacks on AM systems.
The model’s effectiveness is measured by using confusion matrices to analyze classification accuracy.
The RAAC approach proved more effective than benchmark methods like Independent Component Analysis (ICA) and Convolutional Neural Networks (CNNs).
Related Results
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Security Concerns in Smart Grid Cyber-Physical System
Security Concerns in Smart Grid Cyber-Physical System
A smart grid cyber physical system (SG-CPS) is an optimal fusion of a
power network infrastructure and cyber system based on a communicating network.
The SG-CPS employs advanced te...
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Abstract
Cyber-Manufacturing Systems (CMS) are vulnerable to cyber-manufacturing attacks ironically because of its very beneficial advance: seamless integration with...
Smart Manufacturing Application in Precision Manufacturing
Smart Manufacturing Application in Precision Manufacturing
Industry 4.0 presents an opportunity to gain a competitive advantage through productivity, flexibility, and speed. It also empowers the manufacturing sector to drive the sustainabi...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract
Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
The concept of resilience- the scientific adaptation for society health
The concept of resilience- the scientific adaptation for society health
The main idea of the paper to indicate the factors of resilience indicators. The task of the research - a theoretical analysis of the latest research resilience factors and resilie...


