A Privacy-Level Model of User-Centric Cyber-Physical Systems

In an interconnected cyber-world, Cyber-Physical Systems (CPSs) appear to play an increasingly important role in smart ecosystems. A variety of resource-constrained thin clients, such as sensors, RFIDs, actuators and smart devices, are included in the list of CPS. These devices can be used in a number of medical, vehicular, aviation, military and smart cities applications. A plethora of sensitive data is transmitted in insecure wireless or wired environments whilst adversaries are eager to eavesdrop, modify or destroy sensed data invading the privacy of user-centric CPSs. This work presents an overview and analysis of the most effective attacks, privacy challenges and mitigation techniques for preserving the privacy of users and their interconnected devices. In order to preserve privacy, a privacy-level model is proposed in which users have the capability of assigning different privacy levels based on the variety and severity of privacy challenges and devices’ capabilities. Finally, we evaluate the performance of specific CPSs at different privacy-levels in terms of time and consumed energy in an experimental test-bed that we have developed.

[1]  Dr. Clifford Neuman Challenges in Security for Cyber-Physical Systems , 2009 .

[2]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[3]  Heejo Lee,et al.  Achieving Network Level Privacy in Wireless Sensor Networks† , 2010, Sensors.

[4]  马华东 Internet of Things: Objectives and Scientific Challenges , 2011 .

[5]  Theodore Tryfonas,et al.  Life-logging in smart environments: Challenges and security threats , 2012, 2012 IEEE International Conference on Communications (ICC).

[6]  Xu Ji,et al.  Location Privacy against Traffic Analysis Attacks in Wireless Sensor Networks , 2010, 2010 International Conference on Information Science and Applications.

[7]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[8]  Wayne H. Wolf,et al.  Cyber-physical Systems , 2009, Computer.

[9]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[10]  Helen J. Wang,et al.  A Framework for Location Privacy in Wireless Networks , 2005 .

[11]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[12]  Elias Z. Tragos,et al.  An experimental investigation on energy consumption for secure life-logging in smart environments , 2012, 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[13]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[14]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[15]  Chunming Qiao,et al.  Human factors-aware service scheduling in Vehicular Cyber-Physical systems , 2011, 2011 Proceedings IEEE INFOCOM.

[16]  Jiang Li,et al.  Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .

[17]  Alexandros G. Fragkiadakis,et al.  A lightweight framework for secure life-logging in smart environments , 2013, Inf. Secur. Tech. Rep..

[18]  Marco Gruteser,et al.  Privacy-Aware Location Sensor Networks , 2003, HotOS.