4.6 Article

Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks

期刊

IEEE ACCESS
卷 8, 期 -, 页码 47322-47333

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.2978815

关键词

Supply chains; Printers; Solid modeling; Three-dimensional printing; Security; Three-dimensional displays; Manufacturing technology; supply chain management; risk analysis; production engineering

资金

  1. NSF CPS [CMMI-1932264]
  2. Texas AM University
  3. Rockwell International Professorship

向作者/读者索取更多资源

Additive Manufacturing (AM) methods have become increasingly efficient and industrially viable in the past ten years. These methods offer the freedom of complexity to the designers and choices of localized and pull-based production system to the managers. These propositions of AM have been enabling custom manufacturing and are catalysts for rapid growth of additive manufacturing (AM). This paper analyzes the general characteristics of AM supply chain and proposes three AM supply chain models based on the specific nature of the industry. Our description of the models emphasizes on adopting an holistic view of the AM supply chain and therefore includes raw material, printer hardware and the virtual supply chain. Throughout the product life cycle of additively manufactured products, the interlacing of the virtual supply chain (digital thread) with the physical supply chain and their operations fundamentally make the AM process a cyber-physical system (CPS). Therefore, the technology brings along with it benefits of a CPS as well as a new class of attack vectors. We discuss the possible attacks (printer, raw material and design level), risks (reverse engineering, counterfeiting and theft) and provide an enhanced risk classification scheme. We contend that the traditional cybersecurity methods need to evolve to address the new class of attack vectors that threaten the AM supply chain and also discuss the nature of existing solutions that help in addressing the risks and attack threats. In providing an holistic view of the AM supply chain the interdependencies of the processes in the AM supply chain are presented and we elucidate the effects of local attack vectors on the entire supply chain. Further, we discuss the existing security measures to mitigate the risk and identify the existing gap in AM security that needs to be bridged.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据