M2M Security Technology of CPS Based on Blockchains

被引:41
|
作者
Yin, Shiyong [1 ]
Bao, Jinsong [1 ]
Zhang, Yiming [2 ]
Huang, Xiaodi [3 ]
机构
[1] Donghua Univ, Coll Mech Engn, Shanghai 201620, Peoples R China
[2] Univ Michigan, Coll Literature Sci & Arts, Ann Arbor, MI 48109 USA
[3] Charles Sturt Univ, Sch Comp & Math, Albury, NSW 2640, Australia
来源
SYMMETRY-BASEL | 2017年 / 9卷 / 09期
基金
中国国家自然科学基金;
关键词
blockchain; machine-to-machine (M2M); cyber-physical system (CPS); cotton spinning production; MODEL;
D O I
10.3390/sym9090193
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
As the core of intelligent manufacturing, cyber-physical systems (CPS) have serious security issues, especially for the communication security of their terminal machine-to-machine (M2M) communications. In this paper, blockchain technology is introduced to address such a security problem of communications between different types of machines in the CPS. According to the principles of blockchain technology, we designed a blockchain for secure M2M communications. As a communication system, M2M consists of public network areas, device areas, and private areas, and we designed a sophisticated blockchain structure between the public area and private area. For validating our design, we took cotton spinning production as a case study to demonstrate our solution to M2M communication problems under the CPS framework. We have demonstrated that the blockchain technology can effectively solve the safety of expansion of machines in the production process and the communication data between the machines cannot be tampered with.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] IoT Based Comprehensive Autonomous Home Automation and Security System Using M2M Communication
    Ejigu, Mesele W.
    Santhosh, Jayagopalan
    Recent Advances in Computer Science and Communications, 2021, 14 (07) : 2234 - 2246
  • [22] M2M Communications Based on the M-Bus Protocol
    Schneppe, M. A. Schneps
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2012, 46 (02) : 83 - 89
  • [23] Ad Hoc M2M Communications and security based on 4G cellular system
    Saedy, Mahdy
    Mojtahed, Vahideh
    2011 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2011,
  • [24] M2M Communication
    Malleck, H.
    Mecklenbruker, C.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2014, 131 (01): : 1 - 2
  • [25] M2M Communication
    Helmut Malleck
    Christoph Mecklenbräuker
    e & i Elektrotechnik und Informationstechnik, 2014, 131 (1) : 1 - 2
  • [26] A Mobile Device-Based Virtualization Technique for M2M Communication in Cloud Computing Security
    Cagalaban, Giovanni
    Kim, Seoksoo
    Kim, Minho
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 160 - 167
  • [27] The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment
    Hu, Liang
    Chi, Ling
    Li, Hong-tu
    Yuan, Wei
    Sun, Yuyu
    Chu, Jian-feng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 131 - 146
  • [28] On Cellular Network Planning and Operation with M2M Signalling and Security Considerations
    Jaber, Mona
    Kouzayha, Nour
    Dawy, Zaher
    Kayssi, Ayman
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 429 - 434
  • [29] M2M communications based on the M-Bus protocol
    M. A. Schneps-Schneppe
    Automatic Control and Computer Sciences, 2012, 46 (2) : 83 - 89
  • [30] A security gateway application for End-to-End M2M communications
    Chen, Hsing-Chung
    You, Ilsun
    Weng, Chien-Erh
    Cheng, Chia-Hsin
    Huang, Yung-Fa
    COMPUTER STANDARDS & INTERFACES, 2016, 44 : 85 - 93