A light-weight secure information transmission and device control scheme in integration of CPS and cloud computing

Abstract Recently, cloud computing and cyber-physical system (CPS) are definitely basic elements in real industrial field. In particular, security is a mandatory factor for communications and operations in these environments. However, the existing CPS security mechanism is not suitable to the telecommunication framework provided by the standards. In addition, random number function of high entropy must be used to enhance security with encrypted communications and must support perfect secrecy. Random number functions supported by the devices instead of servers do not have sufficient entropy. Entropy injection and seed replacement are also impractical. In this paper, we propose a security scheme which provides light-weight secure CPS information transmission and device control scheme in integration of CPS and cloud computing. In this scheme, a light-weight security scheme can multicast event information to users who have heterogeneous device information access authorities based on oneM2M standards, and also be able to manage the control devices. This paper provides performance analysis of proposed scheme and confirms its security and efficiency.

[1]  Bart Preneel,et al.  Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[2]  Kwang-il Hwang,et al.  Ultra Low Power Data Aggregation for Request Oriented Sensor Networks , 2014, J. Inf. Process. Syst..

[3]  Daqiang Zhang,et al.  VCMIA: A Novel Architecture for Integrating Vehicular Cyber-Physical Systems and Mobile Cloud Computing , 2014, Mobile Networks and Applications.

[4]  Guohong Cao,et al.  Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[5]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[6]  Dae Wook Bang,et al.  An Unified Representation of Context Knowledge Base for Mobile Context-Aware System , 2014, J. Inf. Process. Syst..

[7]  Eui-Nam Huh,et al.  An Efficient Key Management for Secure Multicast in Sensor-Cloud , 2011, 2011 First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering.

[8]  Radek Martinek,et al.  Development and testing of a visualization application software, implemented with wireless control system in smart home care , 2014, Human-centric Computing and Information Sciences.

[9]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[10]  Shi-Kyu Bae Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks , 2014, J. Inf. Process. Syst..

[11]  Biao Song,et al.  A framework of sensor-cloud integration opportunities and challenges , 2009, ICUIMC '09.

[12]  D. K. Lobiyal,et al.  Performance evaluation of data aggregation for cluster-based wireless sensor network , 2013, Human-centric Computing and Information Sciences.

[13]  Anuradha Pughat,et al.  A review on stochastic approach for dynamic power management in wireless sensor networks , 2015, Human-centric Computing and Information Sciences.