Editor's Choice


Protecting manufacturers from cyberattacks using digital twins

29 March 2023 Editor's Choice

As more robots and other manufacturing equipment become remotely accessible, new entry points for malicious cyberattacks are created. To keep pace with the growing cyber threat, a team of researchers at the National Institute of Standards and Technology (NIST) and the University of Michigan devised a cybersecurity framework that brings digital twin technology together with machine learning (ML) and human expertise to flag indicators of cyberattacks.

The NIST and University of Michigan researchers demonstrated the feasibility of their strategy by detecting cyberattacks aimed at a 3D printer. It was also noted that the framework could be applied to a broad range of manufacturing technologies.

Cyberattacks can be incredibly subtle and thus difficult to detect, but operational data describing what is occurring within machines – sensor data, error signals, and digital commands being issued or executed – could support cyberattack detection. However, directly accessing this kind of data in near-real time from operational technology devices, such as a 3D printer, could put the performance and safety of the process on the factory floor at risk.

“Typically, I have observed that manufacturing cybersecurity strategies rely on copies of network traffic that do not always help us see what is occurring inside a piece of machinery or process,” said NIST mechanical engineer Michael Pease, a co-author of the study. “As a result, some operational technology cybersecurity strategies seem analogous to observing the operations from the outside through a window; however, adversaries might have found a way onto the floor.”

Without looking under the hood of the hardware, cybersecurity professionals may be leaving room for malicious actors to operate undetected.

The digital mirror

Digital twins are closely tied to their physical counterparts, from which they extract data and run alongside in near-real time. Therefore, when it’s not possible to inspect a physical machine while it’s in operation, its digital twin is the next best thing.

In recent years, digital twins of manufacturing machinery have armed engineers with an abundance of operational data, helping them accomplish a variety of feats, including predicting when parts will start to break down and require maintenance. In addition to spotting routine indicators of wear and tear, however, digital twins could help find something more within manufacturing data, stated the authors of the study.

“Because manufacturing processes produce such rich data sets – temperature, voltage, current – and they are so repetitive, there are opportunities to detect anomalies that stick out, including cyberattacks,” said Dawn Tilbury, a professor of mechanical engineering at the University of Michigan and study co-author.

To seize the opportunity presented by digital twins for tighter cybersecurity, the researchers developed a framework entailing a new strategy, which they tested out on an off-the-shelf 3D printer.

The team built a digital twin to emulate the 3D printing process and provided it with information from the real printer. As the printer built a part (a plastic hourglass in this case), computer programs monitored and analysed continuous data streams including both measured temperatures from the physical printing head and the simulated temperatures being computed in real time by the digital twin.

The researchers launched waves of disturbances at the printer. Some were innocent anomalies, such as an external fan causing the printer to cool, but others represented something more nefarious. Even with the wealth of information at hand, the team’s computer programs distinguish a cyberattack from something more routine by using a process of elimination.

The programs analysing both the real and digital printers were pattern-recognising machine learning models trained on normal operating data. Therefore, the models were adept at recognising what the printer looked like under normal conditions, which meant that they could tell when things were out of the ordinary.

If these models detected an irregularity, they passed the baton off to other computer models that checked whether the strange signals were consistent with anything in a library of known issues, such as the printer’s fan cooling its printing head more than expected. Then the system categorised the irregularity as an expected anomaly or a potential cyber threat.

In the last step, a human expert is meant to interpret the system’s finding and then make a decision. Generally speaking, the human would either confirm the cybersecurity system’s suspicions or teach it a new anomaly to store in the database. And then as time goes on, the models in the system would theoretically learn more and more, and the human expert would need to be less involved.

In the case of the 3D printer, the team checked its cybersecurity system’s work and found it was able to correctly sort the cyberattacks from normal anomalies by analysing physical and emulated data.

Despite the promising experiment, the researchers’ next plan is to study how the framework responds to more varied and aggressive attacks, ensuring the strategy is reliable and scalable. “With further research, this framework could potentially be a huge win-win for both maintenance and monitoring, for indications of compromised operational technology systems,” Pease said.




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Engineering in a world that cannot assume connectivity
Technews Publishing Editor's Choice News
Across industrial automation, networking, and defence systems, engineers are rediscovering the importance of resilience and autonomy in an increasingly connected world.

Read more...
Designing IoT devices for deterministic LPWAN environments
Editor's Choice Telecoms, Datacoms, Wireless, IoT
Built on Ultra Narrow Band communication technology, the Sigfox network focuses on low power, wide area M2M connectivity rather than maximising data throughput.

Read more...
Driving excellence in electronics manufacturing
Jemstech Editor's Choice Manufacturing / Production Technology, Hardware & Services
Jemstech’s reputation for disciplined execution and client-focused service has earned it strong loyalty from companies operating in demanding industries.

Read more...
In sync with the line
Testerion Editor's Choice Manufacturing / Production Technology, Hardware & Services
In modern SMT lines, stencil printing must meet two requirements at the same time: it has to ensure a reproducible solder paste volume, while adhering to the specified line cycle time.

Read more...
Resilient navigation in warfare: The role of non-GNSS
Etion Create Editor's Choice
Alternative navigation methods are essential for maintaining operational capability when satellite signals are unreliable or unavailable.

Read more...
Quectel’s RG255C-NA and RM255C-GL accelerate 5G RedCap adoption
iCorp Technologies Editor's Choice Telecoms, Datacoms, Wireless, IoT
Quectel’s RG255C-NA and RM255C-GL modules represent a strategic move into this fast-growing segment, delivering Sub-6 GHz 5G connectivity optimised for mid-tier IoT applications.

Read more...
SDRs – Which RF architecture should you choose?
RFiber Solutions Editor's Choice Telecoms, Datacoms, Wireless, IoT
There are several common methods of implementing SDR architectures. This paper discusses which is best when meeting a specific need.

Read more...
Surviving the extremes: Understanding shock and vibration in MEMS sensors
Altron Arrow Editor's Choice Test & Measurement
By considering factors such as mechanical headroom, damping, and system-level robustness, designers can ensure that the chosen sensor not only survives, but performs reliably over time.

Read more...
A two-stage approach to super-wide input voltage range DC-DC converters
RFiber Solutions Editor's Choice
Teaser: In addition to handling the various input voltage ranges required, the SynQor line of InQor DC-DC converters are fully encased and ruggedised to handle the harsh environments that often accompany systems that have such challenging technical requirements.

Read more...
From the editor's desk: Engineering the future
Technews Publishing Editor's Choice
As we welcome the first issue of Dataweek in a new year, it is an exciting time to be part of the electronics community, especially for our readers. The pace of change across our industry continues to accelerate, reshaping how we design, build, and interact with technology.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved