Skip to main content

Advertisement

Log in

An LSTM-autoencoder based online side channel monitoring approach for cyber-physical attack detection in additive manufacturing

  • Published:
Journal of Intelligent Manufacturing Aims and scope Submit manuscript

Abstract

Additive manufacturing (AM) has gained increasing popularity in a large variety of mission-critical fields, such as aerospace, medical, and transportation. The layer-by-layer fabrication scheme of the AM significantly enhances fabrication flexibility, resulting in the expanded vulnerability space of cyber-physical AM systems. This potentially leads to altered AM parts with compromised mechanical properties and functionalities. Furthermore, those internal alterations in the AM builds are very challenging to detect using the traditional geometric dimensioning and tolerancing (GD&T) features. Therefore, how to effectively monitor and accurately detect cyber-physical attacks becomes a critical barrier for the broader adoption of AM technology. To address this issue, this paper proposes a machine learning-driven online side channel monitoring approach for AM process authentication. A data-driven feature extraction approach based on the LSTM-autoencoder is developed to detect the unintended process/product alterations caused by cyber-physical attacks. Both supervised and unsupervised monitoring schemes are implemented based on the extracted features. To validate the effectiveness of the proposed method, real-world case studies were conducted using a fused filament fabrication (FFF) platform equipped with two accelerometers. In the case study, two different types of cyber-physical attacks are implemented to mimic the potential real-world process alterations. Experimental results demonstrate that the proposed method outperforms conventional process monitoring methods, and it can effectively detect part geometry and layer thickness alterations in a real-time manner.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G. S., Davis, A., Dean, J., & Devin, M. (2016). Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467.

  • Al Faruque, M. A., Chhetri, S. R., Canedo, A., & Wan, J. (2016). Forensics of thermal side-channel in additive manufacturing systems. University of California.

    Google Scholar 

  • Al Mamun, A., Liu, C., Kan, C., & Tian, W. (2021). Real-time process authentication for additive manufacturing processes based on in-situ video analysis. Procedia Manufacturing, 53, 697–704.

    Article  Google Scholar 

  • Belikovetsky, S., Solewicz, Y. A., Yampolskiy, M., Toh, J., & Elovici, Y. (2018). Digital audio signature for 3D printing integrity. IEEE Transactions on Information Forensics Security, 14(5), 1127–1141.

    Article  Google Scholar 

  • Beyer, C. (2014). Strategic implications of current trends in additive manufacturing. Journal of Manufacturing Science and Engineering, 136(6), 064701.

    Article  Google Scholar 

  • Bonnard, R., Hascoët, J.-Y., & Mognol, P. (2019a). Data model for additive manufacturing digital thread: State of the art and perspectives. International Journal of Computer Integrated Manufacturing, 32(12), 1170–1191.

    Article  Google Scholar 

  • Bonnard, R., Hascoët, J.-Y., Mognol, P., & Stroud, I. (2018). STEP-NC digital thread for additive manufacturing: Data model, implementation and validation. International Journal of Computer Integrated Manufacturing, 31(11), 1141–1160.

    Article  Google Scholar 

  • Bonnard, R., Hascoët, J.-Y., Mognol, P., Zancul, E., & Alvares, A. J. (2019b). Hierarchical object-oriented model (HOOM) for additive manufacturing digital thread. Journal of Manufacturing Systems, 50, 36–52.

    Article  Google Scholar 

  • Chen, Y., Li, H., Hou, L., Bu, X., Ye, S., & Chen, D. (2020). Chatter detection for milling using novel p-leader multifractal features. Journal of Intelligent Manufacturing, 1–15.

  • Chhetri, S. R., & Al Faruque, M. A. (2017). Side channels of cyber-physical systems: Case study in additive manufacturing. IEEE Design & Test, 34(4), 18–25.

    Article  Google Scholar 

  • Chhetri, S. R., Canedo, A., & Al Faruque, M. A. (2016). Kcad: kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD),

  • Colosimo, B. M., & Grasso, M. (2018). Spatially weighted PCA for monitoring video image data with application to additive manufacturing. Journal of Quality Technology, 50(4), 391–417.

    Article  Google Scholar 

  • Dastoorian, R., & Wells, L. J. (2021). A hybrid off-line/on-line quality control approach for real-time monitoring of high-density datasets. Journal of Intelligent Manufacturing, 1–14.

  • Feng, D.-C., Liu, Z.-T., Wang, X.-D., Chen, Y., Chang, J.-Q., Wei, D.-F., & Jiang, Z.-M. (2020). Machine learning-based compressive strength prediction for concrete: An adaptive boosting approach. Construction and Building Materials, 230, 117000.

    Article  Google Scholar 

  • Flank, S., Nassar, A. R., Simpson, T. W., Valentine, N., & Elburn, E. (2017). Fast authentication of metal additive manufacturing. 3D Printing and Additive Manufacturing, 4(3), 143–148.

    Article  Google Scholar 

  • Gao, Y., Li, B., Wang, W., Xu, W., Zhou, C., & Jin, Z. (2018). Watching and safeguarding your 3D printer: Online process monitoring against cyber-physical attacks. Proceedings of the ACM on Interactive, Mobile, Wearable Ubiquitous Technologies, 2(3), 108.

    Article  Google Scholar 

  • Gatlin, J., Belikovetsky, S., Moore, S. B., Solewicz, Y., Elovici, Y., & Yampolskiy, M. (2019). Detecting sabotage attacks in additive manufacturing using actuator power signatures. IEEE Access, 7, 133421–133432.

    Article  Google Scholar 

  • Gensler, A., Henze, J., Sick, B., & Raabe, N. (2016). Deep Learning for solar power forecasting—An approach using AutoEncoder and LSTM Neural Networks. 2016 IEEE international conference on systems, man, and cybernetics (SMC),

  • Hastie, T., Rosset, S., Zhu, J., & Zou, H. (2009). Multi-class adaboost. Statistics and Its Interface, 2(3), 349–360.

    Article  Google Scholar 

  • Hinton, G. E., & Salakhutdinov, R. R. (2006). Reducing the dimensionality of data with neural networks. Science, 313(5786), 504–507.

    Article  Google Scholar 

  • Hoang, T. M., Nguyen, N. M., & Duong, T. Q. (2019). Detection of eavesdropping attack in UAV-aided wireless systems: Unsupervised learning with one-class SVM and k-means clustering. IEEE Wireless Communications Letters, 9(2), 139–142.

    Article  Google Scholar 

  • Hochreiter, S., & Schmidhuber, J. (1997). Long short-term memory. Neural Computation, 9(8), 1735–1780.

    Article  Google Scholar 

  • Hospodar, G., Gierlichs, B., De Mulder, E., Verbauwhede, I., & Vandewalle, J. (2011). Machine learning in side-channel analysis: A first study. Journal of Cryptographic Engineering, 1(4), 293.

    Article  Google Scholar 

  • Huang, S., Kong, Z., & Huang, W. (2014). High-dimensional process monitoring and change point detection using embedding distributions in reproducing kernel Hilbert space. IIE Transactions, 46(10), 999–1016.

    Article  Google Scholar 

  • Huang, T., Wang, S., Yang, S., & Dai, W. (2020). Statistical process monitoring in a specified period for the image data of fused deposition modeling parts with consistent layers. Journal of Intelligent Manufacturing, 1–16.

  • Huang, W., & Kovacevic, R. (2011). A neural network and multiple regression method for the characterization of the depth of weld penetration in laser welding based on acoustic signatures. Journal of Intelligent Manufacturing, 22(2), 131–143.

    Article  Google Scholar 

  • Huang, Y., Leu, M. C., Mazumder, J., & Donmez, A. (2015). Additive manufacturing: Current state, future potential, gaps and needs, and recommendations. Journal of Manufacturing Science and Engineering, 137(1), 014001.

    Article  Google Scholar 

  • Imani, F., Yao, B., Chen, R., Rao, P., & Yang, H. (2019). Joint multifractal and lacunarity analysis of image profiles for manufacturing quality control. Journal of Manufacturing Science Engineering, 141(4), 044501.

    Article  Google Scholar 

  • Jiang, X., Scott, P., & Whitehouse, D. (2008). Wavelets and their applications for surface metrology. CIRP Annals, 57(1), 555–558.

    Article  Google Scholar 

  • Kantz, H., & Schreiber, T. (2004). Nonlinear time series analysis (7th ed.). Cambridge: Cambridge University Press.

    Google Scholar 

  • Khanzadeh, M., Chowdhury, S., Tschopp, M. A., Doude, H. R., Marufuzzaman, M., & Bian, L. (2019). In-situ monitoring of melt pool images for porosity prediction in directed energy deposition processes. IISE Transactions, 51(5), 437–455.

    Article  Google Scholar 

  • Khanzadeh, M., Tian, W., Yadollahi, A., Doude, H. R., Tschopp, M. A., & Bian, L. (2018). Dual process monitoring of metal-based additive manufacturing using tensor decomposition of thermal image streams. Additive Manufacturing, 23, 443–456.

    Article  Google Scholar 

  • Komolafe, T., Tian, W., Purdy, G. T., Albakri, M., Tarazaga, P., & Camelio, J. (2019). Repeatable part authentication using impedance based analysis for side-channel monitoring. Journal of Manufacturing Systems, 51, 42–51.

    Article  Google Scholar 

  • Kravchik, M., Biggio, B., & Shabtai, A. (2021). Poisoning attacks on cyber attack detectors for industrial control systems. Proceedings of the 36th Annual ACM Symposium on Applied Computing

  • Kwon, O., Kim, H. G., Ham, M. J., Kim, W., Kim, G.-H., Cho, J.-H., Kim, N. I., & Kim, K. (2020). A deep neural network for classification of melt-pool images in metal additive manufacturing. Journal of Intelligent Manufacturing, 31(2), 375–386.

    Article  Google Scholar 

  • Larsen, S., & Hooper, P. A. (2021). Deep semi-supervised learning of dynamics for anomaly detection in laser powder bed fusion. Journal of Intelligent Manufacturing, pp. 1–15.

  • Lee, J., Bagheri, B., & Jin, C. (2016). Introduction to Cyber Manufacturing. Manufacturing Letters, 8, 11–15.

    Article  Google Scholar 

  • Li, Y., Shi, Z., Liu, C., Tian, W., Kong, Z., & Williams, C. (2021). Augmented Time Regularized Generative Adversarial Network (ATR-GAN) for Data Augmentation in Online Process Anomaly Detection. IEEE Transactions on Automation Science and Engineering.

  • Liu, C., Kan, C., & Tian, W. (2020). An online side channel monitoring approach for cyber-physical attack detection of additive manufacturing. ASME 2020 15th International Manufacturing Science and Engineering Conference, Cincinnati, Ohio.

  • Liu, C., Kong, Z., Babu, S., Joslin, C., & Ferguson, J. (2021). An integrated manifold learning approach for high-dimensional data feature extractions and its applications to online process monitoring of additive manufacturing. IISE Transactions, 53(11), 1215–1230.

    Google Scholar 

  • Liu, C., Law, A. C. C., Roberson, D., & Kong, Z. J. (2019). Image analysis-based closed loop quality control for additive manufacturing with fused filament fabrication. Journal of Manufacturing Systems, 51, 75–86.

    Article  Google Scholar 

  • Mahato, V., Obeidi, M. A., Brabazon, D., & Cunningham, P. (2020). Detecting voids in 3D printing using melt pool time series data. Journal of Intelligent Manufacturing, pp. 1–8.

  • Manevitz, L. M., & Yousef, M. (2001). One-class SVMs for document classification. Journal of Machine Learning Research, 2(Dec), 139–154.

    Google Scholar 

  • Mativo, T., Fritz, C., & Fidan, I. (2018). Cyber acoustic analysis of additively manufactured objects. The International Journal of Advanced Manufacturing Technology, 96(1–4), 581–586.

    Article  Google Scholar 

  • Mironovova, M., & Bíla, J. (2015). Fast fourier transform for feature extraction and neural network for classification of electrocardiogram signals. 2015 Fourth International Conference on Future Generation Communication Technology (FGCT),

  • Montgomery, D. C. (2009). Statistical quality control 7. New York: Wiley.

    Google Scholar 

  • Moore, S. B., Gatlin, J., Belikovetsky, S., Yampolskiy, M., King, W. E., & Elovici, Y. (2017). Power consumption-based detection of sabotage attacks in additive manufacturing. arXiv preprint arXiv:.01822.

  • Nayfeh, A. H., & Balachandran, B. (2008). Applied nonlinear dynamics: Analytical, computational, and experimental methods. Wiley.

    Google Scholar 

  • Pittino, F., Puggl, M., Moldaschl, T., & Hirschl, C. (2020). Automatic anomaly detection on in-production manufacturing machines using statistical learning methods. Sensors, 20(8), 2344.

    Article  Google Scholar 

  • Powers, D. M. (2011). Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation.

  • Prakash, A., Kumar, S., Mahan, T., Williams, G., McComb, C., Menold, J., & Tucker, C. S. (2020). Detection of system compromise in additive manufacturing using video motion magnification. Journal of Mechanical Design, vol 142, no 3.

  • Proakis, J. G. (2001). Digital signal processing: principles algorithms and applications. Pearson Education India.

  • Rao, P. K., Liu, J. P., Roberson, D., Kong, Z. J., & Williams, C. (2015). Online real-time quality monitoring in additive manufacturing processes using heterogeneous sensors. Journal of Manufacturing Science and Engineering, vol 137, no 6.

  • Scrucca, L. (2004). qcc: An R package for quality control charting and statistical process control. Dim Pistonrings, 1(200), 3.

    Google Scholar 

  • Shi, Z., Kan, C., Tian, W., & Liu, C. (2021). A blockchain-based G-code protection approach for cyber-physical security in additive manufacturing. Journal of Computing and Information Science in Engineering, 21(4), 041007.

    Article  Google Scholar 

  • Slaughter, A., Yampolskiy, M., Matthews, M., King, W. E., Guss, G., & Elovici, Y. (2017). How to ensure bad quality in metal additive manufacturing: In-situ infrared thermography from the security perspective. In Proceedings of the 12th International Conference on Availability, Reliability and Security.

  • Sturm, L., Albakri, M., Williams, C. B., & Tarazaga, P. (2016). In-situ detection of build defects in additive manufacturing via impedance-based monitoring. 27th Annual International Solid Freeform Fabrication Symposium–An Additive Manufacturing Conference.

  • Sturm, L. D., Williams, C. B., Camelio, J. A., White, J., & Parker, R. (2017). Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the. STL file with human subjects. Journal of Manufacturing Systems, 44, 154–164.

    Article  Google Scholar 

  • Tenney, C., Albakri, M., Williams, C., & Tarazaga, P. (2019). NDE of additively manufactured parts via directly bonded and mechanically attached electromechanical impedance sensors. In Dynamics of Civil Structures, Volume 2 (pp. 263–271). Springer.

  • Tenney, C., Albakri, M. I., Kubalak, J., Sturm, L. D., Williams, C. B., & Tarazaga, P. A. (2017). Internal porosity detection in additively manufactured parts via electromechanical impedance measurements. In ASME 2017 Conference on Smart Materials, Adaptive Structures and Intelligent Systems.

  • Tenney, C. M., Albakri, M. A., Williams, C. B., & Tarazaga, P. A. (2020). Clamping force effects on the performance of mechanically attached piezoelectric transducers for impedance-based NDE. In Sensors and Instrumentation, Aircraft/Aerospace, Energy Harvesting & Dynamic Environments Testing, Volume 7 (pp. 355–363). Springer.

  • Tootooni, M. S., Rao, P. K., Chou, C.-A., & Kong, Z. J. (2016). A spectral graph theoretic approach for monitoring multivariate time series data from complex dynamical processes. IEEE Transactions on Automation Science and Engineering, 15(1), 127–144.

    Article  Google Scholar 

  • Tschannen, M., Bachem, O., & Lucic, M. (2018). Recent advances in autoencoder-based representation learning. arXiv preprint arXiv:.05069.

  • Villalobos, K., Suykens, J., & Illarramendi, A. (2021). A flexible alarm prediction system for smart manufacturing scenarios following a forecaster–analyzer approach. Journal of Intelligent Manufacturing, 32(5), 1323–1344.

    Article  Google Scholar 

  • Vincent, H., Wells, L., Tarazaga, P., & Camelio, J. (2015). Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing, 1, 77–85.

    Article  Google Scholar 

  • Waller, J., Parker, B., Hodges, K., & Walker, J. (2014). Nondestructive evaluation of additive manufacturing.

  • Wang, L., Chen, X., Henkel, D., & Jin, R. (2021). Pyramid ensemble convolutional neural network for virtual computed tomography image prediction in a selective laser melting process. Journal of Manufacturing Science and Engineering, 143(12), 121003.

    Article  Google Scholar 

  • Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), 74–77.

    Article  Google Scholar 

  • Wu, D., Ren, A., Zhang, W., Fan, F., Liu, P., Fu, X., & Terpenny, J. J. J. (2018). Cybersecurity for digital manufacturing. Journal of Manufacturing Systems, 48, 3–12.

    Article  Google Scholar 

  • Wu, M., Song, Z., & Moon, Y. B. (2019). Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. Journal of Intelligent Manufacturing, 30(3), 1111–1123.

    Article  Google Scholar 

  • Xiao, K., Forte, D., & Tehranipoor, M. M. (2015). Efficient and secure split manufacturing via obfuscated built-in self-authentication. 2015 IEEE International symposium on hardware oriented security and trust (HOST).

  • Xu, X., & Yoneda, M. (2019). Multitask air-quality prediction based on LSTM-autoencoder model. IEEE Transactions on Cybernetics.

  • Yampolskiy, M., Andel, T. R., McDonald, J. T., Glisson, W. B., & Yasinsac, A. (2014). Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop.

  • Ye, Z., Liu, C., Tian, W., & Kan, C. (2021). In-situ point cloud fusion for layer-wise monitoring of additive manufacturing. Journal of Manufacturing Systems, 61, 210–222.

    Article  Google Scholar 

  • Yılmaz, E. N., & Gönen, S. (2018). Attack detection/prevention system against cyber attack in industrial control systems. Computers & Security, 77, 94–105.

    Article  Google Scholar 

  • Zeltmann, S. E., Gupta, N., Tsoutsos, N. G., Maniatakos, M., Rajendran, J., & Karri, R. (2016). Manufacturing and security challenges in 3D printing. JOM Journal of the Minerals Metals and Materials Society, 68(7), 1872–1881.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chenang Liu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shi, Z., Mamun, A.A., Kan, C. et al. An LSTM-autoencoder based online side channel monitoring approach for cyber-physical attack detection in additive manufacturing. J Intell Manuf 34, 1815–1831 (2023). https://doi.org/10.1007/s10845-021-01879-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10845-021-01879-9

Keywords

Navigation