M2M Security Technology of CPS Based on Blockchains

被引:41
|
作者
Yin, Shiyong [1 ]
Bao, Jinsong [1 ]
Zhang, Yiming [2 ]
Huang, Xiaodi [3 ]
机构
[1] Donghua Univ, Coll Mech Engn, Shanghai 201620, Peoples R China
[2] Univ Michigan, Coll Literature Sci & Arts, Ann Arbor, MI 48109 USA
[3] Charles Sturt Univ, Sch Comp & Math, Albury, NSW 2640, Australia
来源
SYMMETRY-BASEL | 2017年 / 9卷 / 09期
基金
中国国家自然科学基金;
关键词
blockchain; machine-to-machine (M2M); cyber-physical system (CPS); cotton spinning production; MODEL;
D O I
10.3390/sym9090193
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
As the core of intelligent manufacturing, cyber-physical systems (CPS) have serious security issues, especially for the communication security of their terminal machine-to-machine (M2M) communications. In this paper, blockchain technology is introduced to address such a security problem of communications between different types of machines in the CPS. According to the principles of blockchain technology, we designed a blockchain for secure M2M communications. As a communication system, M2M consists of public network areas, device areas, and private areas, and we designed a sophisticated blockchain structure between the public area and private area. For validating our design, we took cotton spinning production as a case study to demonstrate our solution to M2M communication problems under the CPS framework. We have demonstrated that the blockchain technology can effectively solve the safety of expansion of machines in the production process and the communication data between the machines cannot be tampered with.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] M2M Security: Challenges and Solutions
    Barki, Amira
    Bouabdallah, Abdelmadjid
    Gharout, Said
    Traore, Jacques
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1241 - 1254
  • [2] M2M Security Threat and Security Mechanism Research
    Nie, Xiao
    Zhai, Xiaobing
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 906 - 909
  • [3] SEAMLESS COMMUNICATION IN SUPPLY CHAINS BASED ON M2M TECHNOLOGY
    Moneimne, Walid
    Hajdul, Marcin
    Mikolajczak, Szymon
    LOGFORUM, 2016, 12 (04) : 213 - 226
  • [4] Security Challenges and Attacks in M2M Communications
    Imani, Amirhosein
    Keshavarz-Haddad, Alireza
    Eslami, Mohsen
    Haghighat, Javad
    2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 264 - 269
  • [5] Security Analysis Based on Trusted Environment (TRE) of M2M/IoT
    Urunov, Khamdamboy
    Namgung, Jung-Il
    Park, Soo-Hyun
    2015 17TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM APNOMS, 2015, : 554 - 557
  • [6] Research on the Key Technology of M2M Gateway
    Liu, Lianru
    Gu, Minxia
    Ma, Yan
    HUMAN CENTERED COMPUTING, HCC 2014, 2015, 8944 : 837 - 843
  • [7] Smart M2M Gateway based Architecture for M2M Device and Endpoint Management
    Datta, Soumya Kanti
    Bonnet, Christian
    2014 IEEE INTERNATIONAL CONFERENCE (ITHINGS) - 2014 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) - 2014 IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL-SOCIAL COMPUTING (CPS), 2014, : 61 - 68
  • [8] Weightless: The Technology to Finally Realise the M2M Vision
    Webb, William
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2012, 4 (02) : 30 - 37
  • [9] M2M (Machine-to-machine) technology trend
    Tsuji, Hidekazu
    Sawamoto, Jun
    Seo, Katsuhiko
    Kitagami, Shinji
    IEEJ Transactions on Electronics, Information and Systems, 2013, 133 (03) : 520 - 531
  • [10] Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security
    Doh, Inshil
    Chae, Kijoon
    Lim, Jiyoung
    Chung, Min Young
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2015, 21 (04): : 543 - 558