Integrated Functional Safety and Security Diagnosis Mechanism of CPS Based on Blockchain

This paper proposes a functional safety and information security protection mechanism based on blockchain technology. The design of the basic level and integration level blockchain structure of CPS distributed architecture and related functional safety and information security measures are introduced. An effective communication judgment mechanism based on functional safety error threshold is proposed, which is stored and judged by smart contract. And a refund transaction with a clock is proposed to ensure the effective execution of the functional safety error threshold mechanism. The article takes cyber physical machine tool system as an example to describe the SIL judgment method of CPS physical equipment and functional safety loop and combines SIL with fault diagnosis and risk protection. Finally, the rationality of our proposed mechanism is proved by information security, functional security, real-time and maintainability.

[1]  Jun Liu,et al.  A Method of Distributed State Estimation in Dispatch Central Based on Ripe Data and Topology Model of Substation , 2013 .

[2]  Jinsong Bao,et al.  M2M Security Technology of CPS Based on Blockchains , 2017, Symmetry.

[3]  Jay Lee,et al.  A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .

[4]  Richard F. Paige,et al.  Fault trees for security system design and analysis , 2003, Comput. Secur..

[5]  Xiaochun Cheng,et al.  Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices , 2019, Applied Sciences.

[6]  Wenbo Wang,et al.  Attacking OpenSSL Implementation of ECDSA with a Few Signatures , 2016, CCS.

[7]  M. Śliwiński,et al.  Integrated functional safety and cyber security analysis , 2018 .

[8]  Abdulmotaleb El Saddik,et al.  C2PS: A Digital Twin Architecture Reference Model for the Cloud-Based Cyber-Physical Systems , 2017, IEEE Access.

[9]  Marco Caccamo,et al.  Preserving Physical Safety Under Cyber Attacks , 2019, IEEE Internet of Things Journal.

[10]  Kehua Guo,et al.  Relevant Feedback Based Accurate and Intelligent Retrieval on Capturing User Intention for Personalized Websites , 2018, IEEE Access.

[11]  Hong Wen,et al.  A Novel Error Correction Mechanism for Energy-Efficient Cyber-Physical Systems in Smart Building , 2018, IEEE Access.

[12]  Rune Winther,et al.  Security Assessments of Safety Critical Systems Using HAZOPs , 2001, SAFECOMP.

[13]  Y. F. Khalil,et al.  New statistical formulations for determination of qualification test plans of safety instrumented systems (SIS) subject to low/high operational demands , 2019, Reliab. Eng. Syst. Saf..

[14]  Yaling Zhang,et al.  A Secure Cloud Storage Framework With Access Control Based on Blockchain , 2019, IEEE Access.

[15]  Jean-Yves Choley,et al.  Topology-based Safety Analysis for Safety Critical CPS , 2016 .

[16]  Xiaohong Zhang,et al.  Blockchain-Based Secure Equipment Diagnosis Mechanism of Smart Grid , 2018, IEEE Access.

[17]  Krishna K. Venkatasubramanian,et al.  Security solutions for cyber-physical systems , 2009 .

[18]  Zhou Chun-jie Development of industrial ethernet security protocol stack based on Cortex-A8 , 2013 .

[19]  Sungwoon Choi Establishment of Extended Model for Determining and Evaluating ASIL in the ISO 26262 Automotive Functional Safety System , 2017 .

[20]  Vasant Honavar,et al.  A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System , 2002, Requirements Engineering.

[21]  Sang Do Noh,et al.  Smart manufacturing: Past research, present findings, and future directions , 2016, International Journal of Precision Engineering and Manufacturing-Green Technology.

[22]  Chuan Xu,et al.  Modelling the impact of interference on the energy efficiency of WLANs , 2019, Concurr. Comput. Pract. Exp..

[23]  Sandeep K. S. Gupta,et al.  Cyber Physical Security Solutions for Pervasive Health Monitoring Systems , 2012 .

[24]  Jin Li,et al.  CDPS: A cryptographic data publishing system , 2017, J. Comput. Syst. Sci..

[25]  Jiankun Hu,et al.  A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems , 2018, IEEE Access.

[26]  Kyung-Joon Park,et al.  Cyber-Physical Vulnerability Analysis of Communication-Based Train Control , 2019, IEEE Internet of Things Journal.

[27]  Wayne H. Wolf,et al.  Cyber-physical Systems , 2009, Computer.

[28]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[29]  Siu-Ming Yiu,et al.  Security Issues and Challenges for Cyber Physical System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[30]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.

[31]  Vallipuram Muthukkumarasamy,et al.  Securing Smart Cities Using Blockchain Technology , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[32]  Enrico Zio,et al.  Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks , 2019, Risk analysis : an official publication of the Society for Risk Analysis.

[33]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[34]  Christoph Schmittner,et al.  Security Application of Failure Mode and Effect Analysis (FMEA) , 2014, SAFECOMP.

[35]  Hong Wang,et al.  New considerations for SIL verification of functional safety fieldbus communication , 2016 .