Review Article

Security in Cyber-Enabled Design and Manufacturing: A Survey

[+] Author and Article Information
Siva Chaitanya Chaduvula

School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907

Adam Dachowicz

School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907

Mikhail Atallah

Department of Computer Science, Purdue University, West Lafayette, IN, USA-47907

Jitesh H. Panchal

School of Mechanical Engineering, Purdue University, West Lafayette, IN, USA-47907

1Corresponding author.

ASME doi:10.1115/1.4040341 History: Received February 09, 2018; Revised May 08, 2018


Developments in digital technology and manufacturing processes have expanded the horizon of designer innovation in creating products. In addition to this, real-time collaborative platforms help designers shorten the product development cycle by enabling collaborations with domain experts from concept generation to product realization and after-market. These collaborations are extending beyond enterprise and national boundaries, contributing to a growing concern among designers regarding the security of their sensitive information such as intellectual property (IP) and trade secrets. The source of such sensitive information leaks could be external (e.g., hacker) or internal (e.g., disgruntled employee) to the collaboration. From a designer's perspective, this fear can inhibit participation in a collaboration even though it might result in better products/services. In this paper, we aim to contextualize this evolving security space by discussing various security practices in digital domains, such as encryption and secret sharing, as well as manufacturing domains, such as physically unclonable function (PUF) and physical part watermarking for anti-counterfeiting and tamper evidence purposes. Further, we classify these practices with respect to their performance against different adversarial models for different stages in product development. Such a classification can help designers to make informed decisions regarding security practices during the product realization process.

Copyright (c) 2018 by ASME
Your Session has timed out. Please sign back in to continue.






Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging and repositioning the boxes below.

Related Journal Articles
Related eBook Content
Topic Collections

Sorry! You do not have access to this content. For assistance or to subscribe, please contact us:

  • TELEPHONE: 1-800-843-2763 (Toll-free in the USA)
  • EMAIL: asmedigitalcollection@asme.org
Sign In