Withdraw
Loading…
Manufacturing espionage: from the front office to the factory floor
Adhikari, Anku
Loading…
Permalink
https://hdl.handle.net/2142/117807
Description
- Title
- Manufacturing espionage: from the front office to the factory floor
- Author(s)
- Adhikari, Anku
- Issue Date
- 2022-11-30
- Director of Research (if dissertation) or Advisor (if thesis)
- Winslett, Marianne S
- Doctoral Committee Chair(s)
- Winslett, Marianne S
- Committee Member(s)
- Gunter, Carl A
- Smaragdis, Paris
- Sumei, Sun
- Department of Study
- Computer Science
- Discipline
- Computer Science
- Degree Granting Institution
- University of Illinois at Urbana-Champaign
- Degree Name
- Ph.D.
- Degree Level
- Dissertation
- Keyword(s)
- Security
- Privacy
- Manufacturing
- Data Architecture
- Industry 4.0
- Digital Threads
- Big Data
- IoT
- Blockchain
- WORM
- Side Channel
- Data Exfiltration
- Covert channel
- Acoustic
- Vibrations
- Vulnerabilities
- Countermeasures
- Abstract
- This dissertation identifies and addresses new data security problems for manufacturing environments and their associated commercial office spaces. The work includes novel attacks and defenses for the factory floor and front office, as well as an architecture for securely sharing data all along the manufacturing supply chain. Security needs for storing and sharing manufacturing data. Even back in 2015 when digitization was in its infancy, manufacturers already produced more data than any other sector of industry. The subsequent push toward Manufacturing 4.0, with its smart factories driven by big data, has intensified the need to extract value from manufacturing data that can drive innovation and efficiency improvements. One crucial component of this is the ability to share data securely, starting at the factory floor, continuing on up throughout the supply chain and across all the enterprises in a manufacturing federation. Any weak link in this chain of organizations constitutes a threat that can have a major negative impact for organizations all along the chain. This dissertation explains the reasons for the move towards integration of information about high-value manufactured products, and investigates how data can be retrieved securely from machines on the factory floor and converted into snapshots of data packets called “digital threads” that give fine-grained insight into the processes happening on the factory floor at any point of time. The challenge is to support secure extraction, processing, storage and secure sharing for huge amounts of manufacturing data in a trustless environment with multiple players. The dissertation outlines several key threats to digital threads that have not been fully addressed in previous work on securing provenance information, and proposes digital-threads-as-a-service (DTaaS) as a potential way to ameliorate several of the open issues. The dissertation proposes a hybrid data architecture framework to provide integrity and immutability support for managing digital threads as they are generated, stored and appropriately shared all along the supply chain, from factory floor to end user. Side-channel vulnerabilities on factory floors. Even before the data leaves the factory floor for intended sharing and storage, the sounds made by machines on a factory floor can leak data that gives away manufacturing secrets. This dissertation explores pathways for intellectual property theft during the design and machining process of a product, and demonstrates the vulnerability through acoustic and electromagnetic side-channel attacks that can reconstruct the product design and manufacturing process for simple objects with high accuracy and precision. Novel eavesdropping pathways in office spaces. A front office that is air-gapped and secured against traditional attacks can still be vulnerable to data exfiltration attacks. This dissertation demonstrates vulnerabilities that exist in almost all commercial buildings today as a side effect of building code requirements. In particular, the dissertation exposes a novel covert channel attack that exploits the building’s own physical infrastructure to leak data throughout the building and beyond. Based on acoustic transducers, this novel audio attack supports wide bandwidth eavesdropping channels. The dissertation also proposes and experimentally evaluates several methods to defend against such an attack.
- Graduation Semester
- 2022-12
- Type of Resource
- Thesis
- Copyright and License Information
- Copyright 2022 Anku Adhikari
Owning Collections
Graduate Dissertations and Theses at Illinois PRIMARY
Graduate Theses and Dissertations at IllinoisManage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…