M2M Security Technology of CPS Based on Blockchains

被引:41
|
作者
Yin, Shiyong [1 ]
Bao, Jinsong [1 ]
Zhang, Yiming [2 ]
Huang, Xiaodi [3 ]
机构
[1] Donghua Univ, Coll Mech Engn, Shanghai 201620, Peoples R China
[2] Univ Michigan, Coll Literature Sci & Arts, Ann Arbor, MI 48109 USA
[3] Charles Sturt Univ, Sch Comp & Math, Albury, NSW 2640, Australia
来源
SYMMETRY-BASEL | 2017年 / 9卷 / 09期
基金
中国国家自然科学基金;
关键词
blockchain; machine-to-machine (M2M); cyber-physical system (CPS); cotton spinning production; MODEL;
D O I
10.3390/sym9090193
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
As the core of intelligent manufacturing, cyber-physical systems (CPS) have serious security issues, especially for the communication security of their terminal machine-to-machine (M2M) communications. In this paper, blockchain technology is introduced to address such a security problem of communications between different types of machines in the CPS. According to the principles of blockchain technology, we designed a blockchain for secure M2M communications. As a communication system, M2M consists of public network areas, device areas, and private areas, and we designed a sophisticated blockchain structure between the public area and private area. For validating our design, we took cotton spinning production as a case study to demonstrate our solution to M2M communication problems under the CPS framework. We have demonstrated that the blockchain technology can effectively solve the safety of expansion of machines in the production process and the communication data between the machines cannot be tampered with.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Study of Smart Illumination Control System with M2M Communication Technology
    Chen Hong
    Zhu Yue
    Wang Richi
    Wu JianDe
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON SMART CITIES, AUTOMATION & INTELLIGENT COMPUTING SYSTEMS (ICON-SONICS 2017), 2017, : 110 - 115
  • [42] Path planning algorithm based on M2M model
    College of Transportation, Jilin University, Changchun 130022, China
    不详
    Jilin Daxue Xuebao (Gongxueban), 2008, SUPPL. 2 (45-49):
  • [43] M2M: Challenges and Opportunities
    Ilderem, Vida
    2013 INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION, AND TEST (VLSI-DAT), 2013,
  • [44] M2M应用浅析
    张云霞
    田烨
    电信科学, 2009, 25 (12) : 4 - 8
  • [45] The Evolution of M2M into IoT
    Alam, Mahbubul
    Nielsen, Rasmus H.
    Prasad, Neeli R.
    2013 FIRST INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2013, : 112 - 115
  • [46] A survey on information security threats and solutions for Machine to Machine (M2M) communications
    Tuna, Gurkan
    Kogias, Dimitrios G.
    Gungor, V. Cagri
    Gezer, Cengiz
    Taskin, Erhan
    Ayday, Erman
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2017, 109 : 142 - 154
  • [47] A Survey on Security Issues of M2M Communications in Cyber-Physical Systems
    Chen, Dong
    Chang, Guiran
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 24 - 45
  • [48] Analysis of Security Protocols and Corresponding Cipher Suites in ETSI M2M Standards
    Adrianto, Daniel
    Lin, Fuchun Joseph
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 777 - 782
  • [49] A Study on Improving M2M Network Security through Abnormal Traffic Control
    Cho, Seongsoo
    Shrestha, Bhanu
    APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [50] Green NOMA M2M
    Kaliski, Rafael
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,