Redirigiendo al acceso original de articulo en 16 segundos...
Inicio  /  Applied Sciences  /  Vol: 12 Par: 15 (2022)  /  Artículo
ARTÍCULO
TITULO

Using Blockchain to Protect 3D Printing from Unauthorized Model Tampering

Yajing Wang    
Yaodong Yang    
Shuaipeng Suo    
Mingyuan Wang and Weifeng Rao    

Resumen

As three-dimensional (3D) printing technology is widely used, security issues have arisen, especially in the terminal parts of automobiles, aircraft, and 3D-printed military equipment. If the original design models or the STL (stereolithography) files are hacked or tampered, severe consequences can be anticipated. In this paper, we propose a demonstration to use a high-throughput blockchain to store the ?fingerprints? of the 3D model and verify the ?fingerprints? before printing to prevent illegal tampering. Relying on the tamper-resistant features of blockchain, the security of the model and the credibility of the terminal components can be ensured. The combination of blockchain and 3D printing will help people to build a trusted manufacturing environment and realize a more flexible manufacturing for future industry.

 Artículos similares

       
 
Seyed Mohammad Hashemi, Seyed Ali Hashemi, Ruxandra Mihaela Botez and Georges Ghazi    
This paper presents a methodology for designing a highly reliable Air Traffic Management and Control (ATMC) methodology using Neural Networks and Peer-to-Peer (P2P) blockchain. A novel data-driven algorithm was designed for Aircraft Trajectory Prediction... ver más
Revista: Aerospace

 
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin    
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat... ver más
Revista: Computers

 
Urvashi Sugandh, Swati Nigam, Manju Khari and Sanjay Misra    
Regulatory authorities, consumers, and producers alike are alarmed by the issue of food safety, which is a matter of international concern. The conventional approaches utilized in food quality management demonstrate deficiencies in their capacity to suff... ver más
Revista: Information

 
Rabia Khan, Amjad Mehmood, Zeeshan Iqbal, Carsten Maple and Gregory Epiphaniou    
Security has been the most widely researched topic, particularly within IoT, and has been considered as the major hurdle in the adoption of different applications of IoT. When it comes to IoV, security is considered as the most inevitable component to en... ver más
Revista: Applied Sciences

 
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif    
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and... ver más
Revista: Information