1 Independent Researcher, Ohio, USA.
2 Independent Researcher, Texas, USA.
International Journal of Science and Research Archive, 2025, 14(02), 638-645
Article DOI: 10.30574/ijsra.2025.14.2.0414
Received on 02 January 2024; revised on 04 February 2025; accepted on 07 February 2025
The impending threat of Intellectual Property (IP) in design and manufacturing from mechanical engineering is increasingly furthering concerns on using digitized production and globalized supply chains. In conjunction with the greater adoption of CAD, PLM, and AM, the risk now is greater with respect to cyberattacks, unauthorized access, and industrial espionage. The paper analyzes certain cybersecurity challenges in mechanical engineering, like: secure design, encrypted manufacturing workflows, and best practices for preventing IP theft. It analyzes the threats ranging from cyberattacks on the CAD, engineering files, weaknesses in the supply chain, reverse engineering, and insider threats. The paper puts forward security frameworks, encryption schemes, blockchain-based authentication, and ZTA to protect the design and production data. In addition, the case studies from the aerospace, automotive, and industrial automation domains showcase the real incidents of IP theft and countermeasures used to curb access to such practices. Finally, the paper towards the end introduces the developments in the future of cybersecurity concerning mechanical engineering, centering on the role of AI-enabled real-time suspicious behavior detection and secure cloud collaboration platforms. Providing robust cybersecurity ensures that manufacturers will be able to protect their proprietary designs while retaining competitiveness and mechanical systems' immunity to cyber threats.
Computer Aided Design (CAD); IP; Cybersecurity; Industrial; Manufacturing
Preview Article PDF
Shubham Bhaskar Thakare and Sanjay Poddar. Secure mechanical design and manufacturing: Preventing IP theft via cybersecurity. International Journal of Science and Research Archive, 2025, 14(02), 638-645. Article DOI: https://doi.org/10.30574/ijsra.2025.14.2.0414.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0