A Survey on Security Issues of M2M Communications in Cyber-Physical Systems
نویسندگان
چکیده
In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.
منابع مشابه
Cyber Physical Security for Industrial Control Systems and IoT
Cyber-attacks and cybersecurity used to be the issues for those who use Internet and computers. The issues, however, are expanding to anyone who does not even use them directly. The society is gradually and heavily depending on networks and computers. They are not closed within a cyberspace anymore and having interaction with our real world with sensors and actuators. Such systems are known as ...
متن کاملMachine-to-Machine Communications: Architectures, Standards and Applications
As a new business concept, machine-to-machine (M2M) communications are born from original telemetry technology with the intrinsic features of automatic data transmissions and measurement from remote sources typically by cable or radio. M2M includes a number of technologies that need to be combined in a compatible manner to enable its deployment over a broad market of consumer electronics. In or...
متن کاملFrom machine-to-machine communications towards cyber-physical systems
In recent years, cyber-physical systems (CPS) have emerged as a promising direction to enrich the interactions between physical and virtual worlds. In this article, we first present the correlations among machine-to-machine (M2M), wireless sensor networks (WSNs), CPS and internet of things (IoT), and introduce some research activities in M2M, including M2M architectures and typical applications...
متن کاملA survey on information security threats and solutions for Machine to Machine (M2M) communications
Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources ofmachines and devices in theM2Mnetworks bring several constraints including energy, bandwidth, storage, and computation. Such constraints pose several challenges in the design of M2M networks. Furthermore, some elements that contributed to the rise of M2M applications have c...
متن کاملGLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications
Supporting a massive number of machine to machine (M2M) devices has been considered as an essential requirement in M2M communications. Meanwhile, cyber security is of paramount importance in M2M; if M2M devices cannot securely access the networks through efficient authentication, all applications involving M2M cannot be widely accepted. One of research challenges in M2M is group authentication ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- TIIS
دوره 6 شماره
صفحات -
تاریخ انتشار 2012