亚洲AV

Secure manufacturing saves energy and protects businesses

In This Story

People Mentioned in This Story
Paulo Costa and team
Paulo Costa (on right) with his team in the RARE Lab.
Body

Cybersecurity experts from are playing an important role in protecting American manufacturing automation and supply chains from cyber threats and designing better security into advanced manufacturing plants.

Through its membership with the (CyManII, pronounced s墨-man-膿), researchers will focus on developing an integrated cybersecurity architecture and achieving significant energy efficiencies in manufacturing.

The institute is led by the University of Texas at San Antonio and has an initial 5-year budget of $111 million, including $70 million from the U.S. Department of Energy. The remaining budget is comprised of cost-sharing, member contributions, and other factors that together will ensure the self-sustainability of CyManII after this initial period.

As a managing member, Mason is overseeing and operating CyManII鈥檚 East Coast headquarters on the Arlington Campus. The headquarters will house the institute鈥檚 primary offices, meeting space, and training facilities for the National Capital Region.

鈥淭he Arlington facility will house lab space and equipment to demonstrate, test, and validate CyManII鈥檚 emerging cybersecurity and advanced manufacturing technologies and products,鈥 says Associate Professor and Vice President for Securing Automation and Supply Chain Paulo Costa. 鈥淥ur proximity to the Department of Energy and Washington, D.C. will be useful to visitors when we return to in-person meetings and events.鈥

The 13,000-square-foot facility supports robotic platforms that evaluate security vulnerabilities, the impact of 5G on autonomous vehicles, the power grid, smart buildings and cities, and smart manufacturing.听The space will also host a robotic smart manufacturing testbed and provide meeting and temporary office space for visiting researchers and staff.

Other benefits of filling the role of managing partner include representation on the governance board for leadership on strategic directions, planning, prioritization, and key programming.

Mason will participate in road mapping efforts and strategic decisions about investments, technical focus, and projects. Mason faculty will also gain complimentary access to CyManII events, tech showcases and meetings, and participate in annual RFP competition with extensive outreach promoting completed projects/technologies.

Mason researchers from the College of Engineering and Computing, who are setting up the lab, are playing key roles in CyManII鈥檚 first-year projects, finding ways to protect manufacturing automation and supply chains from cyber threats, and designing better security into advanced manufacturing plants.

In one of the projects, Professor Duminda Wijesekera, CyManII鈥檚 Coordinated Vulnerability Awareness Lead,is working with Bo Yu, research assistant professor, and Matt Jablonski, a PhD candidate and research assistant, to study Smart Manufacturing Architecture (SMA).

SMA has the potential to make American manufacturing more productive, more energy-efficient, more competitive, and verifiably correct. 鈥淲e hope our research in Smart Manufacturing Architecture provides the backbone for modeling that will speed up the adoption of these technologies and processes and help companies to create new, secure, integrated systems,鈥 says Jablonski. 鈥淲e know that the sooner we can identify risks, the better we can help manufacturers mitigate the risks.鈥

The team鈥檚 work addresses potential methods for formally analyzing safety and security risks in Automated Manufacturing Systems. They emphasize how to identify components and the communication interfaces and components that can be modeled using formal methods.

Recently the team used an automated manufacturing system that produces aluminum cans to show how these processes are modeled using a suite of formal methods that included Linear Time propositional Temporal Logic, Architecture Analysis, and Design Language, as well as fault and attack tree analysis.

鈥淭his work is some of the most exciting work I鈥檝e ever done,鈥 says Yu. 鈥淭he real-world application of this knowledge has tremendous impact. This modeling and what it does can protect the reputation of a business by finding weaknesses early on.鈥

As CyManII鈥檚 work becomes more established, the research enterprise will expand and grow into additional areas, such as other cyber-physical systems that directly control physical processes such as machinery, vehicles, cranes, and other movable infrastructure.

鈥淔ormal guarantees are needed in secure manufacturing automation because, in their absence, there is no acceptable way to guarantee against failures that occur due to malice and natural faults,鈥 says Wijesekera. 鈥淭hese failures can affect the operational safety of machinery, operators, and the equipment that uses manufactured parts, resulting in wasted material and energy.鈥