Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems
Journal Title: International Journal of Interactive Multimedia and Artificial Intelligence - Year 2017, Vol 4, Issue 3
Abstract
The Internet of Things (IoT) has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.
Authors and Affiliations
Yao Pan, Jules White, Douglas Schmidt, Ahmad Elhabashy, Logan Sturm, Jaime Camelio, Christopher Williams
A Solution Generator Algorithm for Decision Making based Automated Negotiation in the Construction Domain
In this paper, we present our work-in-progress of a proposed framework for automated negotiation in the construction domain. The proposed framework enables software agents to conduct negotiations and autonomously make va...
Heuristics Considering UX and Quality Criteria for Heuristics
Heuristic evaluation is a cheap tool with which one can take qualitative measures of a product’s usability. However, since the methodology was first presented, the User Experience (UX) has become more popular but the heu...
Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This syst...
Contour Detection of Mammogram Masses Using ChanVese Model and B-Spline Approximation
ChanVese model segmentation has been applied for contour detection of mass region in mammogram in our previous work. Available information of the desired object contour is used, in this paper, for B-spline approximation....
Modified Three-Step Search Block Matching Motion Estimation and Weighted Finite Automata based Fractal Video Compression
The major challenge with fractal image/video coding technique is that, it requires more encoding time. Therefore, how to reduce the encoding time is the research component remains in the fractal coding. Block matching mo...