Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
                                            Some full text articles may not yet be available without a charge during the embargo (administrative interval).
                                        
                                        
                                        
                                            
                                                
                                             What is a DOI Number?
                                        
                                    
                                
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
- 
            Abstract Cyber-enabled manufacturing systems are becoming increasingly data-rich, generating vast amounts of real-time sensor data for quality control and process optimization. However, this proliferation of data also exposes these systems to significant cyber-physical security threats. For instance, malicious attackers may delete, change, or replace original data, leading to defective products, damaged equipment, or operational safety hazards. False data injection attacks can compromise machine learning models, resulting in erroneous predictions and decisions. To mitigate these risks, it is crucial to employ robust data processing techniques that can adapt to varying process conditions and detect anomalies in real-time. In this context, the incremental machine learning (IML) approaches can be valuable, allowing models to be updated incrementally with newly collected data without retraining from scratch. Moreover, although recent studies have demonstrated the potential of blockchain in enhancing data security within manufacturing systems, most existing security frameworks are primarily based on cryptography, which does not sufficiently address data quality issues. Thus, this study proposes a gatekeeper mechanism to integrate IML with blockchain and discusses how this integration could potentially increase the data integrity of cyber-enabled manufacturing systems. The proposed IML-integrated blockchain can address the data security concerns from both intentional alterations (e.g., malicious tampering) and unintentional alterations (e.g., process anomalies and outliers). The real-world case study results show that the proposed gatekeeper integration algorithm can successfully filter out over 80% of malicious data entries while maintaining comparable classification performance to standard IML models. Furthermore, the integration of blockchain enables effective detection of tampering attempts, ensuring the trustworthiness of the stored information.more » « lessFree, publicly-accessible full text available April 1, 2026
- 
            Abstract The advancement of sensing technology enables efficient data collection from manufacturing systems for monitoring and control. Furthermore, with the rapid development of the Internet of Things (IoT) and information technologies, more and more manufacturing systems become cyber-enabled, facilitating real-time data sharing and information exchange, which significantly improves the flexibility and efficiency of manufacturing systems. However, the cyber-enabled environment may pose the collected sensor data under high risks of cyber-physical attacks during the data and information sharing. Specifically, cyber-physical attacks could target the manufacturing process and/or the data transmission process to maliciously tamper the sensor data, resulting in false alarms or failures in anomaly detection in monitoring. In addition, the cyber-physical attacks may also enable illegal data access without authorization and cause the leakage of key product/process information. Therefore, it becomes critical to develop an effective approach to protect data from these attacks so that the cyber-physical security of the manufacturing systems could be assured in the cyber-enabled environment. To achieve this goal, this paper proposes an integrative blockchain-enabled data protection method by leveraging camouflaged asymmetry encryption. A real-world case study that protects cyber-physical security of collected sensor data in additive manufacturing is presented to demonstrate the effectiveness of the proposed method. The results demonstrate that malicious tampering could be detected in a relatively short time (less than 0.05ms) and the risk of unauthorized data access is significantly reduced as well.more » « less
 An official website of the United States government
An official website of the United States government 
				
			 
					 
					
