M2M Security Technology of CPS Based on Blockchains

As the core of intelligent manufacturing, cyber-physical systems (CPS) have serious security issues, especially for the communication security of their terminal machine-to-machine (M2M) communications. In this paper, blockchain technology is introduced to address such a security problem of communications between different types of machines in the CPS. According to the principles of blockchain technology, we designed a blockchain for secure M2M communications. As a communication system, M2M consists of public network areas, device areas, and private areas, and we designed a sophisticated blockchain structure between the public area and private area. For validating our design, we took cotton spinning production as a case study to demonstrate our solution to M2M communication problems under the CPS framework. We have demonstrated that the blockchain technology can effectively solve the safety of expansion of machines in the production process and the communication data between the machines cannot be tampered with.

[1]  Gurkan Tuna,et al.  A survey on information security threats and solutions for Machine to Machine (M2M) communications , 2017, J. Parallel Distributed Comput..

[2]  Jiangtao Wen,et al.  The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.

[3]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[4]  Mohammad Abdollahi Azgomi,et al.  A game-theoretic approach to model and quantify the security of cyber-physical systems , 2017, Comput. Ind..

[5]  Qian Xu,et al.  Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions , 2017, IEEE Internet of Things Journal.

[6]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[7]  Wenbo Wang,et al.  Attacking OpenSSL Implementation of ECDSA with a Few Signatures , 2016, CCS.

[8]  Martin White,et al.  Internet of Things, Blockchain and Shared Economy Applications , 2016, EUSPN/ICTH.

[9]  Wei Jiang,et al.  Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.

[10]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[11]  Cesare Pautasso,et al.  The Blockchain as a Software Connector , 2016, 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA).

[12]  Andrew W. Appel,et al.  Verification of a Cryptographic Primitive: SHA-256 , 2015, TOPL.

[13]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[14]  Mohammad Shojafar,et al.  FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids , 2014, Int. J. Grid Util. Comput..

[15]  Maode Ma,et al.  A dynamic-encryption authentication scheme for M2M security in cyber-physical systems , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[16]  Rong Zheng,et al.  Cyber-physical systems: Milestones and research challenges , 2012, Comput. Commun..

[17]  Emmanouil Magkos,et al.  Modeling security in cyber-physical systems , 2012, Int. J. Crit. Infrastructure Prot..

[18]  Guiran Chang,et al.  A Survey on Security Issues of M2M Communications in Cyber-Physical Systems , 2012, KSII Trans. Internet Inf. Syst..

[19]  Mahdy Saedy,et al.  Ad Hoc M2M communications and security based on 4G cellular system , 2011, 2011 Wireless Telecommunications Symposium (WTS).

[20]  Myungsik Yoo,et al.  Application of M2M technology to manufacturing systems , 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC).

[21]  Siu-Ming Yiu,et al.  Security Issues and Challenges for Cyber Physical System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[22]  Inhyok Cha,et al.  Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.

[23]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[24]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[25]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[26]  Enzo Baccarelli,et al.  Energy-Efficient Adaptive Resource Management for Real-Time Vehicular Cloud Services , 2019, IEEE Transactions on Cloud Computing.

[27]  Chen Ming-ze Research of environment monitoring platform of mine area based on M2M , 2013 .

[28]  Liquan Chen,et al.  An Improved Direct Anonymous Attestation Scheme for M2 M Networks , 2011 .

[29]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[30]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[31]  Andreas Leicher,et al.  TRUST IN M 2 M COMMUNICATION The New Security Threats , 2009 .

[32]  S. Nakamoto,et al.  Bitcoin: A Peer-to-Peer Electronic Cash System , 2008 .

[33]  Insup Lee,et al.  Security Challenges in Next Generation Cyber Physical Systems , 2006 .