TY - JOUR
T1 - Physics-based detection of cyber-attacks in manufacturing systems
T2 - A machining case study
AU - Rahman, Md Habibor
AU - Shafae, Mohammed
N1 - Funding Information:
The authors would like to thank the anonymous reviewers for their valuable comments. This research was partially funded by Arizona’s Technology and Research Initiative Fund under the National Security Systems Initiative.
Funding Information:
The authors would like to thank the anonymous reviewers for their valuable comments. This research was partially funded by Arizona's Technology and Research Initiative Fund under the National Security Systems Initiative.
Publisher Copyright:
© 2022 The Society of Manufacturing Engineers
PY - 2022
Y1 - 2022
N2 - The overlap between operational technologies and information technology has resulted in profound improvements in the manufacturing ecosystem, but it increases the risk of a non-conventional class of cyber-attacks capable of inflicting physical damages on manufacturing processes and/or products. If successful in penetrating traditional cyber-only defenses, such attacks may not be detected timely, leading to financial losses, and potentially endangering human safety. However, malicious alterations of products and/or processes intended by these attacks can be manifested as anomalous changes in process dynamics. Hence, monitoring physical process variables such as vibration and power consumption (known as side-channels in cybersecurity literature) can provide a physical-domain defense layer to detect such attacks. Focusing on product-oriented attacks, we propose a method to connect the product design, process design, and in situ monitoring to identify the physical manifestations of these attacks. The proposed approach can verify the geometric integrity of a machined part by observing cutting power signals during machining. We utilize the process and product knowledge to segment the power signal into the cutting cycles corresponding to specific geometrical features and extract process-related information accordingly. This work primarily focuses on extracting machining times for individual geometric features in parts. Next, we use the extracted information to construct quality control charts to use in detecting geometric integrity deviations of machined parts. Finally, we demonstrate our proposed method using a case study of cyber-physical attacks on machining processes aiming to tamper with different product's dimensional and geometrical features.
AB - The overlap between operational technologies and information technology has resulted in profound improvements in the manufacturing ecosystem, but it increases the risk of a non-conventional class of cyber-attacks capable of inflicting physical damages on manufacturing processes and/or products. If successful in penetrating traditional cyber-only defenses, such attacks may not be detected timely, leading to financial losses, and potentially endangering human safety. However, malicious alterations of products and/or processes intended by these attacks can be manifested as anomalous changes in process dynamics. Hence, monitoring physical process variables such as vibration and power consumption (known as side-channels in cybersecurity literature) can provide a physical-domain defense layer to detect such attacks. Focusing on product-oriented attacks, we propose a method to connect the product design, process design, and in situ monitoring to identify the physical manifestations of these attacks. The proposed approach can verify the geometric integrity of a machined part by observing cutting power signals during machining. We utilize the process and product knowledge to segment the power signal into the cutting cycles corresponding to specific geometrical features and extract process-related information accordingly. This work primarily focuses on extracting machining times for individual geometric features in parts. Next, we use the extracted information to construct quality control charts to use in detecting geometric integrity deviations of machined parts. Finally, we demonstrate our proposed method using a case study of cyber-physical attacks on machining processes aiming to tamper with different product's dimensional and geometrical features.
KW - Cyber attack detection
KW - Cyber-physical systems
KW - Machining
KW - Process monitoring
KW - Smart manufacturing systems
UR - http://www.scopus.com/inward/record.url?scp=85132669717&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85132669717&partnerID=8YFLogxK
U2 - 10.1016/j.jmsy.2022.04.012
DO - 10.1016/j.jmsy.2022.04.012
M3 - Article
AN - SCOPUS:85132669717
SN - 0278-6125
JO - Journal of Manufacturing Systems
JF - Journal of Manufacturing Systems
ER -