Modeling access control for cyber-physical systems using reputation

The emergence of Cyber-Physical Systems (CPSs) heralds the ubiquitous and autonomous globally interconnected networks of embedded devices with their own means of interaction with the physical environment. The complex interactions with the physical environment significantly increase security risks. Especially, for mission-critical CPSs, sensitive data are closely related to security issues and are accessed only by authorized users. Role based access control is an essential component for protecting CPSs from unauthorized access. However, existing mechanisms are inadequate. We argue that role assignment should not depend on the remaining energy of a node but its reputation. This paper proposes a role-based access control model, R2BAC, for CPSs using reputation. The definitions and evaluation metrics of trust and reputation are given in order to evaluate the behavior of the nodes. Then reputation evaluation scheme and role assignment scheme are presented, respectively. In addition, we give the proofs of correctness and complexity analysis for R2BAC. Eventually, a wide set of simulations are provided to evaluate its performance.

[1]  Indrajit Ray,et al.  TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.

[2]  Yuguang Fang,et al.  Access control in wireless sensor networks , 2007, Ad Hoc Networks.

[3]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[4]  Radha Poovendran,et al.  Cyber-Physical Systems: Close Encounters Between Two Parallel Worlds [Point of View] , 2010, Proc. IEEE.

[5]  Yan Lindsay Sun,et al.  Trust Establishment in Distributed Networks: Analysis and Modeling , 2007, 2007 IEEE International Conference on Communications.

[6]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[7]  David E. Culler,et al.  Extending IP to Low-Power, Wireless Personal Area Networks , 2008, IEEE Internet Computing.

[8]  Niki Pissinou,et al.  Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[9]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[10]  Isaac Woungang Wireless ad hoc, sensor and mesh networks , 2010, Comput. Electr. Eng..

[11]  Alagan Anpalagan,et al.  A detailed review of energy-efficient medium access control protocols for mobile sensor networks , 2010, Comput. Electr. Eng..

[12]  Inhyok Cha,et al.  Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.

[13]  Xu Li,et al.  An agent-based trust and reputation management scheme for wireless sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[14]  Bharat K. Bhargava,et al.  A role-based access in a hierarchical sensor network architecture to provide multilevel security , 2008, Comput. Commun..

[15]  Ma Jian-feng,et al.  An Access Control Scheme in Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[16]  Wayne H. Wolf,et al.  Cyber-physical Systems , 2009, Computer.

[17]  Nicolae Vizireanu,et al.  Generalizations of binary morphological shape decomposition , 2007, J. Electronic Imaging.

[18]  Wenjing Lou,et al.  FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.

[19]  Nicolae Vizireanu,et al.  Morphological shape decomposition interframe interpolation method , 2008, J. Electronic Imaging.

[20]  Radu Mihnea Udrea,et al.  Visual-oriented morphological foreground content grayscale frames interpolation method , 2009, J. Electronic Imaging.

[21]  Jiming Chen,et al.  An optimal control method for applications using wireless sensor/actuator networks , 2009, Comput. Electr. Eng..

[22]  Benjamin K. S. Khoo,et al.  RFID- from Tracking to the Internet of Things: A Review of Developments , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[23]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[24]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[25]  Zhu Han,et al.  Trust modeling and evaluation in ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[26]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[27]  Siu-Ming Yiu,et al.  Security Issues and Challenges for Cyber Physical System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[28]  Simona Halunga,et al.  Morphological skeleton decomposition interframe interpolation method , 2010, J. Electronic Imaging.

[29]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[30]  Radu Mihnea Udrea,et al.  Iterative generalization of morphological skeleton , 2007, J. Electronic Imaging.