Using Blockchain to Protect 3D Printing from Unauthorized Model Tampering

نویسندگان

چکیده

As three-dimensional (3D) printing technology is widely used, security issues have arisen, especially in the terminal parts of automobiles, aircraft, and 3D-printed military equipment. If original design models or STL (stereolithography) files are hacked tampered, severe consequences can be anticipated. In this paper, we propose a demonstration to use high-throughput blockchain store “fingerprints” 3D model verify before prevent illegal tampering. Relying on tamper-resistant features blockchain, credibility components ensured. The combination will help people build trusted manufacturing environment realize more flexible for future industry.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trusted Detection of Unauthorized Filesystem Modifications to Combat Insider Tampering †

An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tamperingpoint introduces vulnerabilities, especially from knowledgeable insiders capable of ...

متن کامل

From 3D Printing to Spy Cats

Published by the IEEE CS n 1536-1268/14/$31.00 © 2014 IEEE W elcome to the latest column of Notes from the Community. We start by thanking Jason Hong for his past authorship of this column and introducing Justin Manweiler as the new department coeditor. Members of our Reddit community submitted many fascinating items this quarter. This issue’s topics include the various ways we try to translate...

متن کامل

From Microscale Devices to 3D Printing

At the intersection of stem cell biology and tissue engineering resides enormous potential for patient-specific drug screening, disease modeling, and tissue equivalents that offer hope to treat some of the most devastating cardiovascular diseases. Tissue engineering comprises the optimization of 3 primary components: (1) the type or types of cells being implanted such as somatic cells, induced ...

متن کامل

A Novel Temporal Bone Simulation Model Using 3D Printing Techniques.

HYPOTHESIS An inexpensive temporal bone model for use in a temporal bone dissection laboratory setting can be made using a commercially available, consumer-grade 3D printer. BACKGROUND Several models for a simulated temporal bone have been described but use commercial-grade printers and materials to produce these models. The goal of this project was to produce a plastic simulated temporal bon...

متن کامل

Self-encrypting Code to Protect Against Analysis and Tampering

Confidentiality and data authenticity are two basic concepts in security. The first guarantees secrecy of a message, while the latter protects its integrity. This paper examines the use of encryption to secure software static analysis and tampering attacks. We present the concept of code encryption, which offers confidentiality, and a method to create code dependencies that implicitly protect i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2022

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app12157947