2021
DOI: 10.1002/qre.2953
|View full text |Cite
|
Sign up to set email alerts
|

Online detection of cyber‐incidents in additive manufacturing systems via analyzing multimedia signals

Abstract: Additive manufacturing (AM) or 3D printing is an emerging manufacturing technology that plays a growing role in both industrial and consumer settings. However, security concerns of AM systems have been raised among researchers. In this paper, we present an online detection mechanism for the malicious attempts on AM systems, which taps into both audio and video signals collected during the printing process. For audio signals, we propose to monitor the shift of patterns in the spectrogram and dominant frequencie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Let  ∈ ℝ 𝐼 1 ×𝐼 2 ×𝐼 3 ×𝐼 4 ×𝑁 denote the tensor of 𝑁 in-control samples  𝑘 ; 𝑘 = 1, 2, … , 𝑁. Using proposition 1, we can argue that the basis matrices Â, B, Ĉ, and D obtained through Tucker decomposition of  provide the same solutions to Equation ( 8) 5 and columnwise orthogonality for 𝑨, 𝑩, 𝑪, 𝑫, 𝑬 where 𝑬 is the basis matrix corresponding to the last dimension (sample) of tensor ,  is the extracted core tensor and 𝑡 𝑝𝑞𝑟𝑙ℎ is the (𝑝, 𝑞, 𝑟, 𝑙, ℎ)th element of core tensor  . Using proposition 1, given  and Ê the core tensor (𝑘) in Equation ( 8) can be obtained by…”
Section: Between-sample Monitoringmentioning
confidence: 99%
See 1 more Smart Citation
“…Let  ∈ ℝ 𝐼 1 ×𝐼 2 ×𝐼 3 ×𝐼 4 ×𝑁 denote the tensor of 𝑁 in-control samples  𝑘 ; 𝑘 = 1, 2, … , 𝑁. Using proposition 1, we can argue that the basis matrices Â, B, Ĉ, and D obtained through Tucker decomposition of  provide the same solutions to Equation ( 8) 5 and columnwise orthogonality for 𝑨, 𝑩, 𝑪, 𝑫, 𝑬 where 𝑬 is the basis matrix corresponding to the last dimension (sample) of tensor ,  is the extracted core tensor and 𝑡 𝑝𝑞𝑟𝑙ℎ is the (𝑝, 𝑞, 𝑟, 𝑙, ℎ)th element of core tensor  . Using proposition 1, given  and Ê the core tensor (𝑘) in Equation ( 8) can be obtained by…”
Section: Between-sample Monitoringmentioning
confidence: 99%
“…A major field of research regards the use of in‐line data coming from in situ sensors to automatically detect process anomalies and the onsets of defects in the part. Methods in this field are commonly referred to as “in situ process monitoring.” 3–6 A key driver for in situ monitoring in AM is the ability to anticipate unstable and out‐of‐control states during the process rather than relying on costly and time‐consuming post‐process nondestructive tests. Combining this ability with reactive, adaptive, or corrective actions could help one mitigate undesired part‐to‐part variations and keep defect rates compliant with stringent quality requirements.…”
Section: Introductionmentioning
confidence: 99%
“…As a rule, in these investigations exteroceptive sensors were used to compare the commanded with the executed trajectory. For example, two approaches based on the analysis of multimedia signals for the detection of cyber-attacks in additive manufacturing are proposed in [25]. One method recognizes cyber-incident using spectral analysis of audio signal and the other carries out the comparison of the path reconstructed from video with the commanded path.…”
Section: Cybersecurity Challenges In Distributed Motion Controlmentioning
confidence: 99%