Hsu, Yu ShanYu ShanHsuYang, Ming HourMing HourYangLin, I. AnI. AnLinYAO-YANG TSAI2023-11-152023-11-152023-01-019798350324174https://scholars.lib.ntu.edu.tw/handle/123456789/637153Intelligent manufacturing practice fields often have poor information security; common security flaws in industrial control networks include messages are sending in plaintext, lack of source authentication, and lack of message integrity verification. In this study, methods for secure NC program updating, two-factor user authentication, and secure messages transmission module were proposed to improve the security of industrial control systems. Attacks were performed on a CNC machine to demonstrate that attackers could control the unprotected machines. We also verify the performance of the proposed M2M authentication scheme, which ensure message freshness, in preventing man-in-the-middle, impersonation attack, and replay attack.Impersonation attack | Intelligent manufacturing | Message authentication | Replay attack[SDGs]SDG9Smart Manufacturing Security Challenges and Solutionsconference paper10.1109/ICCE-Taiwan58799.2023.102268882-s2.0-85174952431https://api.elsevier.com/content/abstract/scopus_id/85174952431