Skip to main content
Taylor & Francis Group Logo
Advanced Search

Click here to search books using title name,author name and keywords.

  • Login
  • Hi, User  
    • Your Account
    • Logout
Advanced Search

Click here to search books using title name,author name and keywords.

Breadcrumbs Section. Click here to navigate to respective pages.

Chapter

Design Features to Address Security Challenges in Additive Manufacturing

Chapter

Design Features to Address Security Challenges in Additive Manufacturing

DOI link for Design Features to Address Security Challenges in Additive Manufacturing

Design Features to Address Security Challenges in Additive Manufacturing book

Design Features to Address Security Challenges in Additive Manufacturing

DOI link for Design Features to Address Security Challenges in Additive Manufacturing

Design Features to Address Security Challenges in Additive Manufacturing book

ByNikhil Gupta, Fei Chen, Khaled Shahin
BookManufacturing Techniques for Materials

Click here to navigate to parent product.

Edition 1st Edition
First Published 2018
Imprint CRC Press
Pages 28
eBook ISBN 9781315104133

ABSTRACT

Additive manufacturing (AM) is one the fastest-growing industrial fields in the past decade. Initially used for prototyping of parts, additive manufacturing was also referred to as rapid prototyping. Advancement in technologies has now changed this field into a mainstream production method. One of the main advantages of additive manufacturing is that the entire process chain can be completely digital, where a product is designed in computer-aided design (CAD) software and then the processed files are sent via the Internet to a 3D printer to print the object anywhere around the world. The digital nature of the additive manufacturing cyber-physical system makes it vulnerable to cybersecurity risks such as sabotage and intellectual property theft. A novel design methodology is presented in this chapter that describes the possibility of embedding design elements in CAD files as security features. In the presence of these features, the CAD files print as high-quality components only under a specific set of process flow conditions. Any other processing parameters result in embedded defects that reduce the product quality and make it possible to identify counterfeit products. Such security features can augment the network security tools deployed by cybersecurity experts in the additive manufacturing process chain and provide an additional layer of security.

T&F logoTaylor & Francis Group logo
  • Policies
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
  • Journals
    • Taylor & Francis Online
    • CogentOA
    • Taylor & Francis Online
    • CogentOA
  • Corporate
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
  • Help & Contact
    • Students/Researchers
    • Librarians/Institutions
    • Students/Researchers
    • Librarians/Institutions
  • Connect with us

Connect with us

Registered in England & Wales No. 3099067
5 Howick Place | London | SW1P 1WG © 2021 Informa UK Limited