A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

被引:20
|
作者
Chen, Dong [1 ]
Chang, Guiran [2 ]
机构
[1] Northeastern Univ, Sch Informat Sci & Engn, Shenyang, Peoples R China
[2] Northeastern Univ, Ctr Comp, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
M2M; security; privacy preserving; cyber-physical systems; INTRUSION DETECTION; ACCESS-CONTROL; SENSOR; PRIVACY; SCHEME;
D O I
10.3837/tiis.2012.01.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.
引用
收藏
页码:24 / 45
页数:22
相关论文
共 50 条
  • [1] A Dynamic-Encryption Authentication Scheme for M2M Security in Cyber-Physical Systems
    Chen, Shuo
    Ma, Maode
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 2897 - 2901
  • [2] An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems
    Chen, Shuo
    Ma, Maode
    Luo, Zhenxing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1146 - 1157
  • [3] Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication
    Paul, Sebastian
    Scheible, Patrik
    [J]. COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 295 - 316
  • [4] Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication
    Paul, Sebastian
    Scheible, Patrik
    Wiemer, Friedrich
    [J]. JOURNAL OF COMPUTER SECURITY, 2022, 30 (04) : 623 - 653
  • [5] Cyber-physical systems and their security issues
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    [J]. COMPUTERS IN INDUSTRY, 2018, 100 : 212 - 223
  • [6] A survey on the security of cyber-physical systems
    Wu G.
    Sun J.
    Chen J.
    [J]. Control Theory and Technology, 2016, 14 (1) : 2 - 10
  • [7] A Survey on Cyber-Physical Systems Security
    Yu, Zhenhua
    Gao, Hongxia
    Cong, Xuya
    Wu, Naiqi
    Song, Houbing Herbert
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24) : 21670 - 21686
  • [8] A Survey on M2M Systems for mHealth: A Wireless Communications Perspective
    Kartsakli, Elli
    Lalos, Aris S.
    Antonopoulos, Angelos
    Tennina, Stefano
    Di Renzo, Marco
    Alonso, Luis
    Verikoukis, Christos
    [J]. SENSORS, 2014, 14 (10): : 18009 - 18052
  • [9] Cyber-Physical Systems Security-A Survey
    Humayed, Abdulmalik
    Lin, Jingqiang
    Li, Fengjun
    Luo, Bo
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 1802 - 1831
  • [10] Security Challenges and Attacks in M2M Communications
    Imani, Amirhosein
    Keshavarz-Haddad, Alireza
    Eslami, Mohsen
    Haghighat, Javad
    [J]. 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 264 - 269