skip to main content
10.1145/3462223.3485620acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Protection against Counterfeiting Attacks in 3D Printing by Streaming Signature-embedded Manufacturing Process Instructions

Published: 15 November 2021 Publication History

Abstract

The emerging Manufacturing-as-a-Service (MaaS) paradigm democratizes manufacturing by connecting people and businesses with manufacturing requests to those with manufacturing resources, via a digital thread. However, the digital thread can be vulnerable to attacks such as counterfeiting, IP theft and sabotage. An approach based on embedding custom anti-counterfeiting signatures in the design files, on-the-fly, is presented to protect against counterfeiting attacks. An experimental study of the effect of geometric and dimensional variations of the signatures in printed components, as well as the effect of the variations on the read rates of the codes are reported. We conduct experiments using a polyjet printer with veroclear material to study the positional and dimensional variations introduced in the embedded signature and the resulting effect on the readability of the design. The results suggest that signatures with spherical units of size φ0.25 mm embedded within 20 mm cubic components can be printed with location precision of ~5% (about 0.1 mm), and dimensional deviation of the order of 0.01 mm. A statistical model is developed to show that these variations pose minimum interference on the readability of the signatures. Embedding of randomized signatures offers security by serving as anti-counterfeit marks in the final part, and makes it harder to reverse engineer and produce counterfeited parts.

Supplementary Material

MP4 File (AMSec21_amsec04.mp4)
Manufacturing-as-a-Service platforms coordinate the workflow between customer, manufacturers and designers. Counterfeit attacks are possible in this setting. Embedded signatures within 3D printed parts can serve as anti-counterfeit marks. However, several challenges arise - for effective use of these signatures - due to manufacturing variations and measurment system uncertainties in embedding these signatures and scanning these signatures. The video gives a short presentation of the paper discussing the aspects of manufacturing variations and presents a statstical model for the scanning accuracies.

References

[1]
Ron Miller Alex Wilhelm. 2021. Xometry is taking its excess manufacturing capac- ity business public. Retrieved June 22, 2021 from https://techcrunch.com/2021/ 06/04/xometry-is-taking-its-excess-manufacturing-capacity-business-public/
[2]
Josh Brandman, Logan Sturm, Jules White, and Chris Williams. 2020. A physical hash for preventing and detecting cyber-physical attacks in additive manufacturing systems. Journal of Manufacturing Systems 56 (2020), 202--212. https://doi.org/10.1016/j.jmsy.2020.05.014
[3]
Fei Chen, Yuxi Luo, Nektarios Georgios Tsoutsos, Michail Maniatakos, Khaled Shahin, and Nikhil Gupta. 2019. Embedding Tracking Codes in Additive Manufactured Parts for Product Authentication. Advanced Engineering Materials 21, 4 (2019), 1800495. https://doi.org/10.1002/adem.201800495 arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1002/adem.201800495
[4]
Fei Chen, Gary Mac, and Nikhil Gupta. 2017. Security features embedded in computer aided design (CAD) solid models for additive manufacturing. Materials and Design 128 (2017), 182--194. https://doi.org/10.1016/j.matdes.2017.04.078
[5]
Fei Chen, Jian H. Yu, and Nikhil Gupta. 2019. Obfuscation of Embedded Codes in Additive Manufactured Components for Product Authentication. Advanced Engineering Materials 21, 8 (2019), 1900146. https://doi.org/10.1002/adem.201900146 arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1002/adem.201900146
[6]
Fei Chen, Jaime Zabalza, Paul Murray, Stephen Marshall, Jian Yu, and Nikhil Gupta. 2020. Embedded product authentication codes in additive manufactured parts: Imaging and image processing for improved scan ability. Additive Manufacturing 35 (2020), 101319. https://doi.org/10.1016/j.addma.2020.101319
[7]
Nikhil Gupta, Akash Tiwari, Satish T. S. Bukkapatnam, and Ramesh Karri. 2020. Additive Manufacturing Cyber-Physical System: Supply Chain Cybersecurity and Risks. IEEE Access 8 (2020), 47322--47333. https://doi.org/10.1109/ACCESS. 2020.2978815
[8]
Brian Heater. 2021. 3D-printing marketplace Shapeways set for SPAC. Retrieved June 24, 2021 from https://techcrunch.com/2021/04/28/3d-printing-marketplace-shapeways-set-for-spac/
[9]
Ashif Sikandar Iquebal, Zimo Wang, Woo-Hyun Ko, Zhujiang Wang, PR Kumar, Arun Srinivasa, and Satish TS Bukkapatnam. 2018. Towards realizing cyber- manufacturing Kiosks: quality assurance challenges and opportunities. Procedia Manufacturing 26 (2018), 1296--1306.
[10]
Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala R. Kumar, A. L. Narasimha Reddy, Satish T.S. Bukkapatanam, Nikhil Gupta, and Ramesh Karri. 2020. A Survey of Cybersecurity and Resilience of Digital Manufacturing. Proc. IEEE (2020).
[11]
Fei Peng, Jing Yang, Zi-Xing Lin, and Min Long. 2019. Source identification of 3D printed objects based on inherent equipment distortion. Computers and Security 82 (2019), 173--183. https://doi.org/10.1016/j.cose.2018.12.015
[12]
Fei Peng, Jing Yang, and Min Long. 2019. 3-D Printed Object Authentication Based on Printing Noise and Digital Signature. IEEE Transactions on Reliability 68, 1 (2019), 342--353. https://doi.org/10.1109/TR.2018.2869303
[13]
C. Bane Sullivan and Alexander A. Kaszynski. 2019. PyVista: 3D plotting and mesh analysis through a streamlined interface for the Visualization Toolkit (VTK). Journal of Open Source Software 4, 37 (2019), 1450. https://doi.org/10.21105/joss. 01450
[14]
Akash Tiwari, A. L. Narasimha Reddy, and Satish T.S. Bukkapatanam. 2020. Cybersecurity Assurance in the Emerging Manufacturing-as-a-Service (MaaS) Paradigm: A Lesson from the Video Streaming Industry. Smart and Sustainable Manufacturing Systems (2020).
[15]
Chao Wei, Zhe Sun, Yihe Huang, and Lin Li. 2018. Embedding anti-counterfeiting features in metallic components via multiple material additive manufacturing. Additive Manufacturing 24 (2018), 1--12. https://doi.org/10.1016/j.addma.2018.09. 003
[16]
Derek Abbott Yansong Gao, Said F. Al-Sarawi. 2020. Physical unclonable func- tions. Nature Electronics 3 (2020), 81--91. https://doi.org/10.1038/s41928-020-0372-5

Cited By

View all

Index Terms

  1. Protection against Counterfeiting Attacks in 3D Printing by Streaming Signature-embedded Manufacturing Process Instructions

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security
      November 2021
      72 pages
      ISBN:9781450384803
      DOI:10.1145/3462223
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 November 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. additive manufacturing
      2. signature embedding

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CCS '21
      Sponsor:

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)471
      • Downloads (Last 6 weeks)50
      Reflects downloads up to 15 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)DisplayFab: The State of the Art and a Roadmap in the Personal Fabrication of Free-Form Displays Using Active Materials and Additive Manufacturing.Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642708(1-24)Online publication date: 11-May-2024
      • (2023)Material-level countermeasures for securing microfluidic biochipsLab on a Chip10.1039/D3LC00335C23:19(4213-4231)Online publication date: 2023
      • (2022)Structural Attacks and Defenses for Flow-Based Microfluidic BiochipsIEEE Transactions on Biomedical Circuits and Systems10.1109/TBCAS.2022.322075816:6(1261-1275)Online publication date: Dec-2022
      • (2022)Identifying the influence of surface texture waveforms on colors of polished surfaces using an explainable AI approachIISE Transactions10.1080/24725854.2022.210005055:7(731-745)Online publication date: 15-Aug-2022
      • (2022)When AI meets additive manufacturing: Challenges and emerging opportunities for human-centered products developmentJournal of Manufacturing Systems10.1016/j.jmsy.2022.04.01064(648-656)Online publication date: Jul-2022

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media