A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

被引:20
|
作者
Chen, Dong [1 ]
Chang, Guiran [2 ]
机构
[1] Northeastern Univ, Sch Informat Sci & Engn, Shenyang, Peoples R China
[2] Northeastern Univ, Ctr Comp, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
M2M; security; privacy preserving; cyber-physical systems; INTRUSION DETECTION; ACCESS-CONTROL; SENSOR; PRIVACY; SCHEME;
D O I
10.3837/tiis.2012.01.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.
引用
收藏
页码:24 / 45
页数:22
相关论文
共 50 条
  • [31] A security gateway application for End-to-End M2M communications
    Chen, Hsing-Chung
    You, Ilsun
    Weng, Chien-Erh
    Cheng, Chia-Hsin
    Huang, Yung-Fa
    [J]. COMPUTER STANDARDS & INTERFACES, 2016, 44 : 85 - 93
  • [32] Security Enumerations for Cyber-Physical Systems
    Schlette, Daniel
    Menges, Florian
    Baumer, Thomas
    Pernul, Guenther
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIV, DBSEC 2020, 2020, 12122 : 64 - 76
  • [33] Analysis of security in cyber-physical systems
    Chen, Jie
    Zhang, Fan
    Sun, Jian
    [J]. SCIENCE CHINA-TECHNOLOGICAL SCIENCES, 2017, 60 (12) : 1975 - 1977
  • [34] Security threats in M2M networks: A survey with case study
    Hussain, Fatima
    Ferdouse, Lilatul
    Anpalagan, Alagan
    Karim, Lutful
    Woungang, Isaac
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2017, 32 (02): : 117 - 135
  • [35] Modeling security in cyber-physical systems
    Burmester, Mike
    Magkos, Ernmanouil
    Chrissikopoulos, Vassilis
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (3-4) : 118 - 126
  • [36] Analysis of security in cyber-physical systems
    CHEN Jie
    ZHANG Fan
    SUN Jian
    [J]. Science China Technological Sciences, 2017, (12) : 1975 - 1977
  • [37] Cyber-Physical Systems: A Security Perspective
    Konstantinou, Charalambos
    Maniatakos, Michail
    Saqib, Fareena
    Hu, Shiyan
    Plusquellic, Jim
    Jin, Yier
    [J]. 2015 20TH IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2015,
  • [38] Safety and security of cyber-physical systems
    Biro, Miklos
    Mashkoor, Atif
    Sametinger, Johannes
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2023, 35 (07)
  • [39] Cyber-Physical Systems Security and Privacy
    Henkel, Jorg
    [J]. IEEE DESIGN & TEST, 2017, 34 (04) : 4 - 4
  • [40] Cyber-Physical Systems and Reliability Issues
    Yusupova, Nafisa
    Rizvanov, Dmitry
    Andrushko, Dmitry
    [J]. PROCEEDINGS OF THE 8TH SCIENTIFIC CONFERENCE ON INFORMATION TECHNOLOGIES FOR INTELLIGENT DECISION MAKING SUPPORT (ITIDS 2020), 2020, 174 : 133 - 137