Towards Network Coding for Cyber-Physical Systems: Security Challenges and Applications
نویسندگان
چکیده
This survey summarizes the research on the applications and security challenges of network coding in wireless networks and Cyber-Physical Systems. Network coding technique generalizes the store-and-forward routing by mixing the received packets at the intermediate nodes to a single packet before forwarding them. Network coding has received a lot of attention from the community, and researchers has widely studied its application in increasing the throughput and transmissions reliability of networks and cyber-physical systems. Applying network coding can be a challenge to the security of the networks. However, network coding can also provide a natural way to conceal the transmitted data from eavesdroppers. As a result of mixing the received packets at the intermediate nodes, the transmission protocols in network coding are more vulnerable against some attacks, such as pollution and Byzantine attacks. A single polluted packet can easily pollute many packets. Also, because of encoding at the intermediate nodes, the security mechanisms that are proposed for the traditional transmission protocols might not be appropriate for the protocols with network coding. On the other hand, since the transmitted packets are encoded, an eavesdropper cannot get meaningful data by overhearing a single encoded packet, which makes the transmissions more robust against eavesdropping attack. In this survey, in addition to discussing the security challenges in network coding protocols, we explain the applications of network coding in providing security. Our main focus in this paper is on the applications of network coding in providing security.
منابع مشابه
A Survey on Security Issues of M2M Communications in Cyber-Physical Systems
In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure archite...
متن کاملReview of Attack Detection Scheme for Cyber Physical Security System
Cyber-Physical Systems (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges that are (1) general workflow of cyber physical systems, (2) identifying the unique properties of cyber-physical systems and (3) discussing security mechanisms applicable to cyber physical systems. In particular, we analyze and we ...
متن کاملThe Challenges and Trends of Deploying Blockchain in the Real World for the Users’ Need
Blockchain technology is a decentralized and open database maintained by a peer-to-peer network, offering a “trustless trust” for untrusted parties. Despite the fact that some researchers consider blockchain as a bubble, blockchain technology has the genuine potential to solve problems across industries. In this article, we provide an overview of the development that Blockchain technology has h...
متن کاملAccess Control Challenges for Cyber-Physical Systems
With the growth of wireless networks and mobile devices, we are moving closer towards an era of cyberphysical systems (CPSs). Such systems have the potential to benefit numerous applications in areas as diverse as military, financial, and health care. However, security issues must be addressed before CPSs can be widely deployed. The problem is serious because CPSs involve interactions between a...
متن کاملTowards a Framework for Assuring Cyber Physical System Security
Today, cyber physical systems (CPS) are becoming popular in power networks, healthcare devices, transportation networks, industrial process and infrastructures. As cyber physical systems are used more and more extensively and thoroughly, security of cyber physical systems has become the utmost important concern in system design, implementation and research. Many kinds of attacks arise (e.g. the...
متن کامل