Technology Innovations Model of Artificial Intelligence to Stop Industrial Espionage in Manufacturing Establishments

Authors

  • Biswaranjan Senapati, Bharat S Rawal, Awad Bin Naeem, Prasanna Chandran Melnatami Krishnaram, Sunilkumar Guduru, Sachin Sharma, Prasenjit Banerjee, Sudhakar Tiwari

Keywords:

Industrial Espionage, AI, Quantum Computing, Manufacturing, and ERP-SAP HANA Zero trusts

Abstract

In the digital age and at smart manufacturing sites, the production units have been facing a lot of challenges concerning industrial espionage and are vulnerable, critical, and under a growing threat that needs cybersecurity practices, policies, and cryptography in place. Most manufacturing firms have been facing the biggest challenge, as they have been facing critical issues concerning security, confidentiality, availability, and accessibility of the confidential manufacturing process, formulas, and core research and development credentials. In the United States, there have been a high number of cybersecurity data breach and industrial espionage cases reported, with manufacturing and other industries being the most heavily affected; of the 1579 data breach cases reported, 620 were related to manufacturing. Most industrial sites must protect their intellectual property and maintain confidentiality while also securing operational and manufacturing transactions across multiple sites. Key critical data, day-to-day operational master data, corporate key data, and data governances, as well as formulas, key production compositions, and valuable intellectual property (IP), are stored in secure locations and accessible to authorized users in the organization. However, there have been a few cases of data theft by hackers and other people who shouldn't have access to it on real-world systems, as this could happen due to access to virtual reality. This could include potential risks and critical losses to industrial manufacturing segments that must bear the loss of business due to an inability to meet global trade compliance requirements, as well as data losses at the enterprise level. In operational planning, industrial espionage is one of the most critical cases that could potentially harm the reputation of individual manufacturing sectors and render them unable to fulfill customer orders (MTS or MTO). Several major cases of industrial espionage and trade secret theft have been reported and published in academic journals. In 2012, the NSA director and commander of US Cyber Command reported that industrial espionage and cyber espionage exclusive to industrial manufacturing sites could result in a loss of $ 338 billion per year, which is a significant amount of money and data. Some technology innovations models (AI, ML, and quantum computing, ERP-SAP, and Zero-trust) AI, ML, or quantum cyber security models could potentially save data and prevent IP and other credentials from being stolen, as well as update the robust security and cybersecurity platform to protect against potential industrial espionage or future threats within the manufacturing sites. Most industrial manufacturing sites, such as defense production, airship production, pharmaceuticals, or even a high-tech manufacturing company where technologies and innovations are crucial to performance, see intellectual property (IP) as the most important and valuable thing that needs to be secured and protected. Only authorized employees or vendors should be able to access IP, and an audit and log trial should be kept. Per KPMG research studies, industrial espionage could be easily targeted concerning accessing back-office systems, like ERP, production control systems, manufacturing execution, and inventory databases, to steal the critical product formulas and credentials to manage to copy the most sensitive trade secrets, which could be potential IE.

Downloads

Download data is not yet available.

References

W.-K. Chen, Linear Networks and Systems. Belmont, CA, USA: Wadsworth, 1993, pp. 123–135.

J. U. Duncombe, “Infrared navigation—Part I: An assessment of feasibility,” IEEE Trans. Electron Devices, vol. ED-11, no. 1, pp. 34–39, Jan. 1959, 10.1109/TED.2016.2628402.

[E. P. Wigner, “Theory of traveling-wave optical laser,” Phys. Rev., vol. 134, pp. A635–A646, Dec. 1965.

B. Senapati, J. R. Talburt, Naeem, A., and V. J. R. Batthula, " Transfer Learning Based Models for Food Detection Using ResNet-50," 2023 IEEE International Conference on Electro Information Technology (eIT), Romeoville, IL, USA, 2023, pp. 224-229, doi: 10.1109/eIT57321.2023.10187288.

Noh, H., S. Hong, and B. Han. Learning deconvolution network for semantic segmentation. in Proceedings of the IEEE international conference on computer vision. 2015.

Naeem, A.B.; Senapati, B.; Islam Sudman, M.S.; Bashir, K.; Ahmed, A.E.M. Intelligent Road Management System for Autonomous, Non-Autonomous, and VIP Vehicles. World Electr. Veh. J. 2023, 14, 238.https://doi.org/10.3390/wevj14090238.

Zhu, L. et al. (2023). Make-A-Volume: Leveraging Latent Diffusion Models for Cross-Modality 3D Brain MRI Synthesis. In: Greenspan, H., et al. Medical Image Computing and Computer-Assisted Intervention – MICCAI 2023. MICCAI 2023. Lecture Notes in Computer Science, vol 14229. Springer, Cham. https://doi.org/10.1007/978-3-031-43999-5_56.

Soomro, A.M.; Naeem, A.B.; Senapati, B.; Bashir, K.; Pradhan, S.; Maaliw, R.R.; Sakr, H.A. Constructor Development: Predicting Object Communication Errors. In Proceedings of the 2023 IEEE International Conference on Emerging Trends in Engineering, Sciences and Technology (ICES& T), Bahawalpur, Pakistan, 9–11 January 2023; pp. 1–7.

Zikic, D., et al., Segmentation of brain tumor tissues with convolutional neural networks. Proceedings MICCAI-BRATS, 2014: p. 36-39.

Naeem, A. B., Soomro, A. M., Saim, H. M., & amp; Malik, H. (2023). Smart Road Management System for prioritized autonomous vehicles under vehicle-to-everything (V2X) communication. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-023-16950-1.

A. B. Naeem et al., "Heart Disease Detection Using Feature Extraction and Artificial Neural Networks: A Sensor-Based Approach," in IEEE Access, vol. 12, pp. 37349-37362, 2024, doi: 10.1109/ACCESS.2024.3373646.

E. E. Reber, R. L. Michell, and C. J. Carter, “Oxygen absorption in the earth’s atmosphere,” Aerospace Corp., Los Angeles, CA, USA, Tech. Rep. TR-0200 (4230-46)-3, Nov. 1988.

J. H. Davis and J. R. Cogdell, “Calibration program for the 16-foot antenna,” Elect. Eng. Res. Lab., Univ. Texas, Austin, TX, USA, Tech. Memo. NGL-006-69-3, Nov. 15, 1987.

Naeem, A. B. ., Senapati, B. ., Mahadin, G. A. ., Ghulaxe, V. ., Almeida, F. ., Sudman, S. I. ., & Ghafoor, M. I. . (2024). Determine the Prevalence of Hepatitis B and C During Pregnancy by Using a Machine Learning Algorithm. International Journal of Intelligent Systems and Applications in Engineering, 12(13s), 744–751. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/4704

Transmission Systems for Communications, 3rd ed., Western Electric Co., Winston-Salem, NC, USA, 1985, pp. 44–60.

Motorola Semiconductor Data Manual, Motorola Semiconductor Products Inc., Phoenix, AZ, USA, 1989.

G. O. Young, “Synthetic structure of industrial plastics,” in Plastics, vol. 3, Polymers of Hexadromicon, J. Peters, Ed., 2nd ed. New York, NY, USA: McGraw-Hill, 1964, pp. 15-64. [Online]. Available: http://www.bookref.com.

Senapati, B. et al. (2024). Wrist Crack Classification Using Deep Learning and X-Ray Imaging. In: Daimi, K., Al Sadoon, A. (eds) Proceedings of the Second International Conference on Advances in Computing Research (ACR’24). ACR 2024. Lecture Notes in Networks and Systems, vol 956. Springer, Cham. https://doi.org/10.1007/978-3-031-56950-0_6

The Founders’ Constitution, Philip B. Kurland and Ralph Lerner, eds., Chicago, IL, USA: Univ. Chicago Press, 1987. [Online]. Available: http://press-pubs.uchicago.edu/founders/

The Terahertz Wave eBook. ZOmega Terahertz Corp., 2014. [Online]. Available: http://dl.z-thz.com/eBook/zomega_ebook_pdf_1206_sr.pdf. Accessed on: May 19, 2014.

Naeem, Awad Bin, Biswaranjan Senapati, Md. Sakiul Islam Sudman, Kashif Bashir, and Ayman E. M. Ahmed. 2023. "Intelligent Road Management System for Autonomous, Non-Autonomous, and VIP Vehicles" World Electric Vehicle Journal 14, no. 9: 238. https://doi.org/10.3390/wevj14090238.

Philip B. Kurland and Ralph Lerner, eds., The Founders’ Constitution. Chicago, IL, USA: Univ. of Chicago Press, 1987, Accessed on: Feb. 28, 2010, [Online] Available: http://press-pubs.uchicago.edu/founders/

J. S. Turner, “New directions in communications,” IEEE J. Sel. Areas Commun., vol. 13, no. 1, pp. 11-23, Jan. 1995.

W. P. Risk, G. S. Kino, and H. J. Shaw, “Fiber-optic frequency shifter using a surface acoustic wave incident at an oblique angle,” Opt. Lett., vol. 11, no. 2, pp. 115–117, Feb. 1986.

P. Kopyt et al., “Electric properties of graphene-based conductive layers from DC up to terahertz range,” IEEE THz Sci. Technol., to be published. DOI: 10.1109/TTHZ.2016.2544142.

Downloads

Published

24.03.2024

How to Cite

Biswaranjan Senapati. (2024). Technology Innovations Model of Artificial Intelligence to Stop Industrial Espionage in Manufacturing Establishments. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 2814–2826. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5791

Issue

Section

Research Article