Security Assessment of an LBP16-Protocol-Based Computer Numerical Control Machine

Yahya Forihat, Curtis Taylor, Rima Asmar Awad, Irfan Ahmed

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Subtractive manufacturing systems, specifically, computer numerical control machines, have revolutionized the manufacturing industry. Computer numerical control machining is the preferred method for producing finished parts due to its efficiency, speed and suitability for high-volume production. Securing computer numerical control machines is a priority. Compromises or disruptions of these machines can result in significant downtime, loss of productivity and financial loss. This study examines the vulnerabilities and risks associated with computer numerical control machines, in particular, systems utilizing the LBP16 protocol for controller-machine communications. The study reveals that an adversary can execute cyber-physical attacks such as sabotage and denial of service. The potential security threats emphasize the importance of implementing robust security measures to mitigate the cyber risks to computer numerical control machines.

Original languageEnglish
Title of host publicationCritical Infrastructure Protection XVIII - 18th IFIP WG 11.10 International Conference, ICCIP 2024, Proceedings
EditorsJason Staggs, Sujeet Shenoi
PublisherSpringer Science and Business Media Deutschland GmbH
Pages65-84
Number of pages20
ISBN (Print)9783031818875
DOIs
StatePublished - 2025
Event18th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2024 - Arlington, United States
Duration: Mar 18 2024Mar 19 2024

Publication series

NameIFIP Advances in Information and Communication Technology
Volume725 IFIPAICT
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Conference

Conference18th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2024
Country/TerritoryUnited States
CityArlington
Period03/18/2403/19/24

Funding

This research was supported by the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy under the Advanced Materials and Manufacturing Technologies Office (AMMTO) Award no. DE EE0009046.

Keywords

  • Computer Numerical Control Machine
  • Cyber-Physical Attacks
  • Denial of Service
  • Sabotage
  • Subtractive Manufacturing

Fingerprint

Dive into the research topics of 'Security Assessment of an LBP16-Protocol-Based Computer Numerical Control Machine'. Together they form a unique fingerprint.

Cite this