{"title":"智能制造安全挑战与解决方案","authors":"Yu-Shan Hsu, Ming-Hour Yang, I-An Lin, Yao-Yang Tsai","doi":"10.1109/ICCE-Taiwan58799.2023.10226888","DOIUrl":null,"url":null,"abstract":"Intelligent manufacturing practice fields often have poor information security; common security flaws in industrial control networks include messages are sending in plaintext, lack of source authentication, and lack of message integrity verification. In this study, methods for secure NC program updating, two-factor user authentication, and secure messages transmission module were proposed to improve the security of industrial control systems. Attacks were performed on a CNC machine to demonstrate that attackers could control the unprotected machines. We also verify the performance of the proposed M2M authentication scheme, which ensure message freshness, in preventing man-in-the-middle, impersonation attack, and replay attack.","PeriodicalId":112903,"journal":{"name":"2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Smart Manufacturing Security Challenges and Solutions\",\"authors\":\"Yu-Shan Hsu, Ming-Hour Yang, I-An Lin, Yao-Yang Tsai\",\"doi\":\"10.1109/ICCE-Taiwan58799.2023.10226888\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intelligent manufacturing practice fields often have poor information security; common security flaws in industrial control networks include messages are sending in plaintext, lack of source authentication, and lack of message integrity verification. In this study, methods for secure NC program updating, two-factor user authentication, and secure messages transmission module were proposed to improve the security of industrial control systems. Attacks were performed on a CNC machine to demonstrate that attackers could control the unprotected machines. We also verify the performance of the proposed M2M authentication scheme, which ensure message freshness, in preventing man-in-the-middle, impersonation attack, and replay attack.\",\"PeriodicalId\":112903,\"journal\":{\"name\":\"2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)\",\"volume\":\"321 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCE-Taiwan58799.2023.10226888\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE-Taiwan58799.2023.10226888","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Smart Manufacturing Security Challenges and Solutions
Intelligent manufacturing practice fields often have poor information security; common security flaws in industrial control networks include messages are sending in plaintext, lack of source authentication, and lack of message integrity verification. In this study, methods for secure NC program updating, two-factor user authentication, and secure messages transmission module were proposed to improve the security of industrial control systems. Attacks were performed on a CNC machine to demonstrate that attackers could control the unprotected machines. We also verify the performance of the proposed M2M authentication scheme, which ensure message freshness, in preventing man-in-the-middle, impersonation attack, and replay attack.