Computer Science ›› 2018, Vol. 45 ›› Issue (2): 32-39.doi: 10.11896/j.issn.1002-137X.2018.02.006

Previous Articles     Next Articles

Information Security Framework Based on Blockchain for Cyber-physics System

DING Qing-yang, WANG Xiu-li, ZHU Jian-ming and SONG Biao   

  • Online:2018-02-15 Published:2018-11-13

Abstract: Cyber-physics system has drawn widespread attention of academia,and the protection problems and protection measures it faces are also increasingly becoming the research focus in the field.By combing the current research results about the security issues of cyber-physics system and corresponding protective measures at home and abroad,it is found that the security protection measures based on the overall multi-level coordination and distributed architecture have become the current research direction,which is in line with the features of distributed architecture of blockchain technology.Based on the introduction of the distributed topology of blockchain and its information security features,this paper proposed the idea of security protection in which the blockchain technology is integrated with the cyber-physics system,proved the possibility of combining the two parts,and constructed BCCPS framework mechanism of integrating the two parts deeply.The specific construction of BCCPS framework at both the basic level and the integrated level was highlighted.Finally,the security of BCCPS framework was demonstrated from four aspects:confidentiality,integrity,availability and traceability of information security.This research provides a new idea for establishing a secure and robust cyber-physics system.

Key words: Cyber-physics system,Blockchain,Information security,BCCPS framework,Security analysis

[1] PARK K J,ZHENG R,LIU X.Cyber-physical systems:Mile-stones and research challenges[J].Computer Communications,2012,6(1):1-7.
[2] YIN S Y,BAO J S,ZHANG Y M,et al.M2M Security Techno-logy of CPS Based on Blockchains[J].Symmetry,2017,9(9):193-210.
[3] 中华人民共和国国务院.中国制造2025[EB/OL].(2015-05-08)[2017-11-24].http://www.gov.cn/zhengce/content/2015-05/19/content_9784.htm.
[4] RAJKUMAR R,LEE I,SHA L,et al.Cyber-physical systems:The next computing revolution[C]∥Proceedings of the 47th Design Automation Conference.New York:ACM,2010:731-736.
[5] ALI S,ANWAR R W,HUSSAIN O K.Cyber security for cyber physical systems:a trust-based approach[J].Theory Apply Inf-Technoly,2015,1(2):144-152.
[6] PASQUALETTI F,CARLI R,BULLO F.A distributed method for state estimation and false data detection in power networks[C]∥Smart Grid Communications.New York:IEEE Press,2011:469-474.
[7] PALAVICINI G,BRYAN J,SHEETS J,et al.Towards firm-ware analysis of industrial internet of things (IIoT)—Applying symbolic analysis to IIOT firmware vetting[C]∥Proceedings of the 2nd International Conference on Internet of Things,Big Data and Security.Porto,2017:470-477.
[8] China Information Physics System Development Forum,WhitePaper on Information Physics Systems [M].Beijing:China Information Physics System Development Forum,2017.(in Chinese) 中国信息物理系统发展论坛.信息物理系统白皮书[M].北京:中国信息物理系统发展论坛,2017.
[9] LEE E A.Computing Foundations and Practice for CyberPhysical Systems:a Preliminary Report[R].University of California,2006.
[10] HE J F.Cyber-Physical System[J].China Computer Society New-sletter,2010,6(1):25-29.(in Chinese) 何积丰.Cyber-Physical System[J].中国计算机学会通讯,2010,6(1):25-29.
[11] BAHETI R,GILL H.Cyber-physical systems[J].Computer,2017,0(4):14-16.
[12] LI Z,PENG Y,XIE F,et al.Security threats and measures of information physics system [J].Journal of Tsinghua University (Science and Technology),2012,2(10):1482-1487.(in Chinese) 李钊,彭勇,谢丰,等.信息物理系统安全威胁与措施[J].清华大学学报(自然科学版),2012,2(10):1482-1487.
[13] The European Union’s Seventh Framework Programme.CyPhERS Cyber-Physical European Roadmap & Strategy[EB/OL].(2013-10-11) [2017-11-25].http://www.cyphers.eu/sites/default/files/D2.1.pdf.
[14] JING B,ZHOU W,HUANG Y F,et al.Information Physics Fusion System and Its Application [J].Journal of Air Force Engineering University (Natural Science Edition),2014,5 (2):1-6.(in Chinese) 景博,周伟,黄以锋,等.信息物理融合系统及其应用[J].空军工程大学学报(自然科学版),2014,15(2):1-6.
[15] NSF.Cyber-physical systems (cps) program solicitation,2016.[EB/OL].(2016-03-08)[2017-11-24].http://www.nsf.gov/pubs/2016/nsf16549/nsf16549.html.
[16] LEE J,BAGHERI B,KAO H A.A Cyber-Physical Systems architecture forIndustry 4.0-based manufacturing systems[J].Manufacturing Letters,2015,3(1):18-23.
[17] GUAN X P, YANG B,CHEN C L.A Comprehensive Overview of Cyber-Physical Systems:From Perspective of Feedback System[J].IEEE/CAA Jouranal of Automatica Sinica,2016,3(1):1-14.
[18] RAJKUMAR R,INSUP L,LUI S,et al.Cyber-physical sys-tems:the next computing revolution[C]∥Proceedings of the 47th ACM/IEEE Design Automation Conference.California,USA:IEEE,2010:731-736.
[19] WEN J R,WU M Q,SU J F.Information physics fusion system [J].Automation,2012,8(4):517-528.(in Chinese) 温景容,武穆清,宿景芳.信息物理融合系统[J].自动化学报,2012,8(4):517-528.
[20] MLLER D P E.Guide to Computing Fundamentals in Cyber-Physical Systems[M].Switzerland:Springer Nature,2016.
[21] ZHOU X S,YANG Y L,YANG G.Methodology for constructing dynamic behavior model of information-physical fusion system [J].Chinese Journal of Computers,2014,7(6):1411-1421.(in Chinese) 周兴社,杨亚磊,杨刚.信息-物理融合系统动态行为模型构建方法[J].计算机学报,2014,7(6):1411-1421.
[22] TAN Y,GODDARD S,PEREZ L.A prototype architecture for cyber-physical systems[J].Acm Sigbed Review,2008,5(1):1-2.
[23] PENG K L,PENG W,WANG D X,et al.Review on the Security of Information Fusion Systems [J].Journal of Network Safety,2016,7(7):20-28.(in Chinese) 彭昆仑,彭伟,王东霞,等.信息物理融合系统安全问题研究综述[J].网络安全学报,2016,7(7):20-28.
[24] ASHIBANI Y,MAHMOUD Q H.Cyber physical systems security:Analysis,challenges and solutions[J].Computers Security,2017,8(68):81-97.
[25] NOURIAN A,MADNICK S.A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet[J].IEEE Transactions on Dependable & Secure Computing,2015,2(12):1.
[26] PREMNATH S N,HAAS Z J.Security and privacy in the internet-ofthings under time-and-budget-limited adversary model[J].IEEE Wireless Communications Letters,2015,4(3):277-280.
[27] WANG J,ABID H,LEE S,et al.A secured health care application architecture for cyber-physical systems[J].Control Engineering Applied Informatics,2011,3(3):101-108.
[28] TRAPPE W,HOWARD R,MOORE R S.Low-energy security:limits and opportunities in the internet of things[J].IEEE Security &Privacy,2015,3(1):14-21.
[29] KIRKPATRICK M,BERTINO E,SHELDON F T.Restricted Authentication and Encryption for Cyber-physical Systems[C]∥DHS CPS Workshop Restricted Authentication and Encryption for Cyber physical System.Newark:Newark Press,2009:1-4.
[30] ZHAO K,GE L.A survey on the Internet of Things security[C]∥Ninth International Conferece on Computational Intelligence & Security.Leshan:IEEE Press,2013:663-667.
[31] VEGH L,MICLEA L.Enhancing security in cyber-physical systems through cryptographic and stegano graphic techniques[C]∥IEEE International Conference on Automation.New York:IEEE Press,2014:1-6.
[32] WEI J,KUNDUR D.Biologically inspired hierarchical cyber-physical multi-agent distributed control framework for sustainable smart grids[M]∥ Cyber Physical Systems Approach to Smart Electric Power Grid.Springer Berlin Heidelberg,2015,2(3):219-259
[33] DJOUADI S,MELIN A,FERRAGUT E,et al.Finite energyand bounded attacks on control system sensor signals[C]∥American Control Conference.Portland,IEEE Press,2014:1716-1722.
[34] YUAN Y,WANG F Y.Study on the Technology and Development of Blockchain[J].Journal of Automation,2016,2(4):482-491.(in Chinese) 袁勇,王飞跃.区块链技术与发展现状与展望[J].自动化学报,2016,42(4):482-491.
[35] NGUYEN P H,ALI S,YUE T.Model-based security engineeringfor cyber-physical systems:A systematic mapping study[J].Information and Software Technology,2017,83(2):116-135.
[36] CARDENAS A A,AMIN S,SASTRY S.Secure control:to-wards survivable cyberphysical systems[C]∥The 28th International Conference on Distributed Computing Systems Workshops.Washington,IEEE Press,2015:495-500.
[37] OATES R,THOM F,HERRIES G.Security-aware,model-based systems engineering with sysML[C]∥Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research.Berlin:BCS Press,2013:78-87.
[38] BISHOP M.Computer Security:Art andScience[M].Boston:MA Press,2002:62-68.
[39] Smart Grid Interoperability Panel Cyber Security WorkingGroup,Guidelines for smart grid cyber security[S].Washington:National Institution of Standards and Technology,2010.
[40] MCDOWELL M.Understanding denial-of-service attacks[EB/OL].(2004-07-06)[2017-11-21].http://www.us-cert.gov/ncas/tips/st04-015.
[41] MIRKOVIC J,REIHER P.A Taxonomy of DDoS Attack andDDoS Defense Mechanisms[J].Acm Sigcomm Computer Communication Review,2004,4(2):39-53.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .