M2M Security Technology of CPS Based on Blockchains

As the core of intelligent manufacturing, cyber-physical systems (CPS) have serious security issues, especially for the communication security of their terminal machine-to-machine (M2M) communications. In this paper, blockchain technology is introduced to address such a security problem of communications between different types of machines in the CPS. According to the principles of blockchain technology, we designed a blockchain for secure M2M communications. As a communication system, M2M consists of public network areas, device areas, and private areas, and we designed a sophisticated blockchain structure between the public area and private area. For validating our design, we took cotton spinning production as a case study to demonstrate our solution to M2M communication problems under the CPS framework. We have demonstrated that the blockchain technology can effectively solve the safety of expansion of machines in the production process and the communication data between the machines cannot be tampered with.

[1]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[2]  Emmanouil Magkos,et al.  Modeling security in cyber-physical systems , 2012, Int. J. Crit. Infrastructure Prot..

[3]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[4]  Martin White,et al.  Internet of Things, Blockchain and Shared Economy Applications , 2016, EUSPN/ICTH.

[5]  Wenbo Wang,et al.  Attacking OpenSSL Implementation of ECDSA with a Few Signatures , 2016, CCS.

[6]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[7]  Mahdy Saedy,et al.  Ad Hoc M2M communications and security based on 4G cellular system , 2011, 2011 Wireless Telecommunications Symposium (WTS).

[8]  Maode Ma,et al.  A dynamic-encryption authentication scheme for M2M security in cyber-physical systems , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[9]  Houbing Song,et al.  Security Enhancement via Dynamic Fountain Code for Wireless Multicast , 2017, WASA.

[10]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[11]  Mohammad Abdollahi Azgomi,et al.  A game-theoretic approach to model and quantify the security of cyber-physical systems , 2017, Comput. Ind..

[12]  Cesare Pautasso,et al.  The Blockchain as a Software Connector , 2016, 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA).

[13]  Enzo Baccarelli,et al.  Energy-Efficient Adaptive Resource Management for Real-Time Vehicular Cloud Services , 2019, IEEE Transactions on Cloud Computing.

[14]  Qian Xu,et al.  Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions , 2017, IEEE Internet of Things Journal.

[15]  Mohammad Shojafar,et al.  FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids , 2014, Int. J. Grid Util. Comput..

[16]  Chen Ming-ze Research of environment monitoring platform of mine area based on M2M , 2013 .

[17]  Gurkan Tuna,et al.  A survey on information security threats and solutions for Machine to Machine (M2M) communications , 2017, J. Parallel Distributed Comput..

[18]  Guiran Chang,et al.  A Survey on Security Issues of M2M Communications in Cyber-Physical Systems , 2012, KSII Trans. Internet Inf. Syst..

[19]  Megan Kline,et al.  Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting , 2017, IoTBDS.

[20]  Myungsik Yoo,et al.  Application of M2M technology to manufacturing systems , 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC).

[21]  Andrew W. Appel,et al.  Verification of a Cryptographic Primitive: SHA-256 , 2015, TOPL.

[22]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[23]  Rong Zheng,et al.  Cyber-physical systems: Milestones and research challenges , 2012, Comput. Commun..

[24]  Jiangtao Wen,et al.  The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.

[25]  Liquan Chen,et al.  An Improved Direct Anonymous Attestation Scheme for M2 M Networks , 2011 .

[26]  Insup Lee,et al.  Security Challenges in Next Generation Cyber Physical Systems , 2006 .

[27]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[28]  Wei Jiang,et al.  Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.

[29]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[30]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[31]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[32]  Siu-Ming Yiu,et al.  Security Issues and Challenges for Cyber Physical System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[33]  Andreas Leicher,et al.  TRUST IN M 2 M COMMUNICATION The New Security Threats , 2009 .

[34]  Inhyok Cha,et al.  Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.