Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems

TitleTaxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems
Publication TypeJournal Article
Year of Publication2017
AuthorsPan, Y., J. White, D. C. Schmidt, A. Elhabashy, L. Sturm, J. Camelio, and C. Williams
JournalInternational Journal of Interactive Multimedia and Artificial Intelligence
ISSN1989-1660
IssueSpecial Issue on Advances and Applications in the Internet of Things and Cloud Computing
Volume4
Number3
Date Published03/2017
Pagination45-54
Abstract

The Internet of Things (IoT) has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.

KeywordsComputer aided design, Cybersecurity, Internet of things
DOI10.9781/ijimai.2017.437
URLhttp://www.ijimai.org/journal/sites/default/files/files/2016/08/ijimai20174_3_7_pdf_53997.pdf
AttachmentSize
ijimai20174_3_7.pdf1.57 MB