• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

Vol. 6, No.1, January 30, 2012
10.3837/tiis.2012.01.002, Download Paper (Free):

Abstract

In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Dong Chen and Guiran Chang, "A Survey on Security Issues of M2M Communications in Cyber-Physical Systems," KSII Transactions on Internet and Information Systems, vol. 6, no. 1, pp. 24-45, 2012. DOI: 10.3837/tiis.2012.01.002

[ACM Style]
Chen, D. and Chang, G. 2012. A Survey on Security Issues of M2M Communications in Cyber-Physical Systems. KSII Transactions on Internet and Information Systems, 6, 1, (2012), 24-45. DOI: 10.3837/tiis.2012.01.002