计算机科学 ›› 2018, Vol. 45 ›› Issue (2): 32-39.doi: 10.11896/j.issn.1002-137X.2018.02.006

• 区块链技术 • 上一篇    下一篇

基于区块链的信息物理融合系统的信息安全保护框架

丁庆洋,王秀利,朱建明,宋彪   

  1. 中央财经大学信息学院 北京100081,中央财经大学信息学院 北京100081,中央财经大学信息学院 北京100081,中央财经大学信息学院 北京100081
  • 出版日期:2018-02-15 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金重点项目:工业信息物理融合系统安全理论与关键技术(U1509214)资助

Information Security Framework Based on Blockchain for Cyber-physics System

DING Qing-yang, WANG Xiu-li, ZHU Jian-ming and SONG Biao   

  • Online:2018-02-15 Published:2018-11-13

摘要: 信息物理融合系统(Cyber-Physical System,CPS)受到了学术界的广泛关注,其面临的安全性问题及防护措施也日益成为领域研究热点。通过梳理现阶段国内外关于CPS安全问题及其防护措施的研究成果发现,基于整体多层次统筹以及分布式架构的防护措施成为了当前的研究导向,这与区块链技术的整体性分布式架构特征相一致。在区块链分布式拓扑结构及其信息安全特性的基础上,提出了融合区块链技术与CPS的防护思想,论证了结合二者的可能性,并构建了实现二者深入融合的BCCPS框架机制。重点介绍了BCCPS框架在基础层级和集成层级两个层面上的具体构造情况。最后,从信息安全的保密性、完整性、可用性、可追溯性4个维度论证了BCCPS框架的安全性。该研究为建立安全、健壮的CPS提供了新思路。

关键词: 信息物理系统,区块链,信息安全,BCCPS框架,安全性分析

Abstract: Cyber-physics system has drawn widespread attention of academia,and the protection problems and protection measures it faces are also increasingly becoming the research focus in the field.By combing the current research results about the security issues of cyber-physics system and corresponding protective measures at home and abroad,it is found that the security protection measures based on the overall multi-level coordination and distributed architecture have become the current research direction,which is in line with the features of distributed architecture of blockchain technology.Based on the introduction of the distributed topology of blockchain and its information security features,this paper proposed the idea of security protection in which the blockchain technology is integrated with the cyber-physics system,proved the possibility of combining the two parts,and constructed BCCPS framework mechanism of integrating the two parts deeply.The specific construction of BCCPS framework at both the basic level and the integrated level was highlighted.Finally,the security of BCCPS framework was demonstrated from four aspects:confidentiality,integrity,availability and traceability of information security.This research provides a new idea for establishing a secure and robust cyber-physics system.

Key words: Cyber-physics system,Blockchain,Information security,BCCPS framework,Security analysis

[1] PARK K J,ZHENG R,LIU X.Cyber-physical systems:Mile-stones and research challenges[J].Computer Communications,2012,6(1):1-7.
[2] YIN S Y,BAO J S,ZHANG Y M,et al.M2M Security Techno-logy of CPS Based on Blockchains[J].Symmetry,2017,9(9):193-210.
[3] 中华人民共和国国务院.中国制造2025[EB/OL].(2015-05-08)[2017-11-24].http://www.gov.cn/zhengce/content/2015-05/19/content_9784.htm.
[4] RAJKUMAR R,LEE I,SHA L,et al.Cyber-physical systems:The next computing revolution[C]∥Proceedings of the 47th Design Automation Conference.New York:ACM,2010:731-736.
[5] ALI S,ANWAR R W,HUSSAIN O K.Cyber security for cyber physical systems:a trust-based approach[J].Theory Apply Inf-Technoly,2015,1(2):144-152.
[6] PASQUALETTI F,CARLI R,BULLO F.A distributed method for state estimation and false data detection in power networks[C]∥Smart Grid Communications.New York:IEEE Press,2011:469-474.
[7] PALAVICINI G,BRYAN J,SHEETS J,et al.Towards firm-ware analysis of industrial internet of things (IIoT)—Applying symbolic analysis to IIOT firmware vetting[C]∥Proceedings of the 2nd International Conference on Internet of Things,Big Data and Security.Porto,2017:470-477.
[8] China Information Physics System Development Forum,WhitePaper on Information Physics Systems [M].Beijing:China Information Physics System Development Forum,2017.(in Chinese) 中国信息物理系统发展论坛.信息物理系统白皮书[M].北京:中国信息物理系统发展论坛,2017.
[9] LEE E A.Computing Foundations and Practice for CyberPhysical Systems:a Preliminary Report[R].University of California,2006.
[10] HE J F.Cyber-Physical System[J].China Computer Society New-sletter,2010,6(1):25-29.(in Chinese) 何积丰.Cyber-Physical System[J].中国计算机学会通讯,2010,6(1):25-29.
[11] BAHETI R,GILL H.Cyber-physical systems[J].Computer,2017,0(4):14-16.
[12] LI Z,PENG Y,XIE F,et al.Security threats and measures of information physics system [J].Journal of Tsinghua University (Science and Technology),2012,2(10):1482-1487.(in Chinese) 李钊,彭勇,谢丰,等.信息物理系统安全威胁与措施[J].清华大学学报(自然科学版),2012,2(10):1482-1487.
[13] The European Union’s Seventh Framework Programme.CyPhERS Cyber-Physical European Roadmap & Strategy[EB/OL].(2013-10-11) [2017-11-25].http://www.cyphers.eu/sites/default/files/D2.1.pdf.
[14] JING B,ZHOU W,HUANG Y F,et al.Information Physics Fusion System and Its Application [J].Journal of Air Force Engineering University (Natural Science Edition),2014,5 (2):1-6.(in Chinese) 景博,周伟,黄以锋,等.信息物理融合系统及其应用[J].空军工程大学学报(自然科学版),2014,15(2):1-6.
[15] NSF.Cyber-physical systems (cps) program solicitation,2016.[EB/OL].(2016-03-08)[2017-11-24].http://www.nsf.gov/pubs/2016/nsf16549/nsf16549.html.
[16] LEE J,BAGHERI B,KAO H A.A Cyber-Physical Systems architecture forIndustry 4.0-based manufacturing systems[J].Manufacturing Letters,2015,3(1):18-23.
[17] GUAN X P, YANG B,CHEN C L.A Comprehensive Overview of Cyber-Physical Systems:From Perspective of Feedback System[J].IEEE/CAA Jouranal of Automatica Sinica,2016,3(1):1-14.
[18] RAJKUMAR R,INSUP L,LUI S,et al.Cyber-physical sys-tems:the next computing revolution[C]∥Proceedings of the 47th ACM/IEEE Design Automation Conference.California,USA:IEEE,2010:731-736.
[19] WEN J R,WU M Q,SU J F.Information physics fusion system [J].Automation,2012,8(4):517-528.(in Chinese) 温景容,武穆清,宿景芳.信息物理融合系统[J].自动化学报,2012,8(4):517-528.
[20] MLLER D P E.Guide to Computing Fundamentals in Cyber-Physical Systems[M].Switzerland:Springer Nature,2016.
[21] ZHOU X S,YANG Y L,YANG G.Methodology for constructing dynamic behavior model of information-physical fusion system [J].Chinese Journal of Computers,2014,7(6):1411-1421.(in Chinese) 周兴社,杨亚磊,杨刚.信息-物理融合系统动态行为模型构建方法[J].计算机学报,2014,7(6):1411-1421.
[22] TAN Y,GODDARD S,PEREZ L.A prototype architecture for cyber-physical systems[J].Acm Sigbed Review,2008,5(1):1-2.
[23] PENG K L,PENG W,WANG D X,et al.Review on the Security of Information Fusion Systems [J].Journal of Network Safety,2016,7(7):20-28.(in Chinese) 彭昆仑,彭伟,王东霞,等.信息物理融合系统安全问题研究综述[J].网络安全学报,2016,7(7):20-28.
[24] ASHIBANI Y,MAHMOUD Q H.Cyber physical systems security:Analysis,challenges and solutions[J].Computers Security,2017,8(68):81-97.
[25] NOURIAN A,MADNICK S.A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet[J].IEEE Transactions on Dependable & Secure Computing,2015,2(12):1.
[26] PREMNATH S N,HAAS Z J.Security and privacy in the internet-ofthings under time-and-budget-limited adversary model[J].IEEE Wireless Communications Letters,2015,4(3):277-280.
[27] WANG J,ABID H,LEE S,et al.A secured health care application architecture for cyber-physical systems[J].Control Engineering Applied Informatics,2011,3(3):101-108.
[28] TRAPPE W,HOWARD R,MOORE R S.Low-energy security:limits and opportunities in the internet of things[J].IEEE Security &Privacy,2015,3(1):14-21.
[29] KIRKPATRICK M,BERTINO E,SHELDON F T.Restricted Authentication and Encryption for Cyber-physical Systems[C]∥DHS CPS Workshop Restricted Authentication and Encryption for Cyber physical System.Newark:Newark Press,2009:1-4.
[30] ZHAO K,GE L.A survey on the Internet of Things security[C]∥Ninth International Conferece on Computational Intelligence & Security.Leshan:IEEE Press,2013:663-667.
[31] VEGH L,MICLEA L.Enhancing security in cyber-physical systems through cryptographic and stegano graphic techniques[C]∥IEEE International Conference on Automation.New York:IEEE Press,2014:1-6.
[32] WEI J,KUNDUR D.Biologically inspired hierarchical cyber-physical multi-agent distributed control framework for sustainable smart grids[M]∥ Cyber Physical Systems Approach to Smart Electric Power Grid.Springer Berlin Heidelberg,2015,2(3):219-259
[33] DJOUADI S,MELIN A,FERRAGUT E,et al.Finite energyand bounded attacks on control system sensor signals[C]∥American Control Conference.Portland,IEEE Press,2014:1716-1722.
[34] YUAN Y,WANG F Y.Study on the Technology and Development of Blockchain[J].Journal of Automation,2016,2(4):482-491.(in Chinese) 袁勇,王飞跃.区块链技术与发展现状与展望[J].自动化学报,2016,42(4):482-491.
[35] NGUYEN P H,ALI S,YUE T.Model-based security engineeringfor cyber-physical systems:A systematic mapping study[J].Information and Software Technology,2017,83(2):116-135.
[36] CARDENAS A A,AMIN S,SASTRY S.Secure control:to-wards survivable cyberphysical systems[C]∥The 28th International Conference on Distributed Computing Systems Workshops.Washington,IEEE Press,2015:495-500.
[37] OATES R,THOM F,HERRIES G.Security-aware,model-based systems engineering with sysML[C]∥Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research.Berlin:BCS Press,2013:78-87.
[38] BISHOP M.Computer Security:Art andScience[M].Boston:MA Press,2002:62-68.
[39] Smart Grid Interoperability Panel Cyber Security WorkingGroup,Guidelines for smart grid cyber security[S].Washington:National Institution of Standards and Technology,2010.
[40] MCDOWELL M.Understanding denial-of-service attacks[EB/OL].(2004-07-06)[2017-11-21].http://www.us-cert.gov/ncas/tips/st04-015.
[41] MIRKOVIC J,REIHER P.A Taxonomy of DDoS Attack andDDoS Defense Mechanisms[J].Acm Sigcomm Computer Communication Review,2004,4(2):39-53.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75 .
[2] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[3] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[4] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[5] 史雯隽,武继刚,罗裕春. 针对移动云计算任务迁移的快速高效调度算法[J]. 计算机科学, 2018, 45(4): 94 -99 .
[6] 周燕萍,业巧林. 基于L1-范数距离的最小二乘对支持向量机[J]. 计算机科学, 2018, 45(4): 100 -105 .
[7] 刘博艺,唐湘滟,程杰仁. 基于多生长时期模板匹配的玉米螟识别方法[J]. 计算机科学, 2018, 45(4): 106 -111 .
[8] 耿海军,施新刚,王之梁,尹霞,尹少平. 基于有向无环图的互联网域内节能路由算法[J]. 计算机科学, 2018, 45(4): 112 -116 .
[9] 崔琼,李建华,王宏,南明莉. 基于节点修复的网络化指挥信息系统弹性分析模型[J]. 计算机科学, 2018, 45(4): 117 -121 .
[10] 王振朝,侯欢欢,连蕊. 抑制CMT中乱序程度的路径优化方案[J]. 计算机科学, 2018, 45(4): 122 -125 .