Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems

TitleTaxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems
Publication TypeJournal Article
Year of Publication2017
AuthorsPan, Y., J. White, D. C. Schmidt, A. Elhabashy, L. Sturm, J. Camelio, and C. Williams
JournalInternational Journal of Interactive Multimedia and Artificial Intelligence
IssueSpecial Issue on Advances and Applications in the Internet of Things and Cloud Computing
Date Published03/2017

The Internet of Things (IoT) has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.

KeywordsComputer aided design, Cybersecurity, Internet of things
ijimai20174_3_7.pdf1.57 MB