Abstract
At present, the problem of creating methodological security of cyberphysical systems, in particular, the design and implementation of information security subsystems is acute. At the same time, the landscape of threats and vulnerabilities typical for a wide range of hardware and software technologies used in cyberphysical systems is extremely wide and complex. In this context, the security of application layer protocols is of paramount importance, as these protocols are the basis for interaction between applications and services running on different devices, as well as in cloud infrastructures. With the constant interaction of the systems under study with the real physical infrastructure, the challenge is to determine effective measures to ensure the integrity of the transferred control commands, as disruption of the performed critical processes can affect human life and health. The paper provides an analytical review of the main methods of data integrity assurance in management protocol of cyberphysical systems, as well as an overview of application layer protocols vulnerabilities widely used in cyberphysical systems of different types. Classical methods of data integrity assurance, new methods, in particular, blockchain, as well as the main directions of increasing the efficiency of data integrity protocols in cyberphysical systems are considered. Analysis of application layer vulnerabilities is carried out on the example of the most popular MQTT, CoAP, AMQP, DDS, XMPP specifications and their implementations. It is established that despite the presence of basic security mechanisms in all these protocols, researchers continue to regularly identify vulnerabilities in popular implementations, that often endangers critical infrastructure services. In the course of preparing the review of the existing methods of data integrity assurance for the examined class of systems, the key problems of these methods integration and ways of their solution were defined.
Highlights
The landscape of threats and vulnerabilities typical for a wide range of hardware and software technologies used in cyberphysical systems is extremely wide and complex
The security of application layer protocols is of paramount importance, as these protocols are the basis for interaction between applications and services running on different devices, as well as in cloud infrastructures
The paper provides an analytical review of the main methods of data integrity assurance in management protocol of cyberphysical systems, as well as an overview of application layer protocols vulnerabilities widely used in cyberphysical systems of different types
Summary
Представлен обзор основных методов обеспечения целостности данных в протоколах управления киберфизических систем, а также обзор уязвимостей протоколов прикладного уровня, широко используемых в различных киберфизических системах. В качестве перспективных мер по нейтрализации угроз нарушения целостности данных приводится анализ мирового опыта по применению технологии блокчейн и цифровых водяных знаков в качестве механизмов обеспечения информационной безопасности киберфизических систем. В разделе 2 представлена общая характеристика рассматриваемых протоколов прикладного уровня, которые применяются для управления объектами киберфизических систем и элементами инфраструктуры Интернета вещей. Что многообразие и гетерогенность используемого оборудования в той или иной области применения, а также различные архитектурные модели киберфизических и социокиберфизических систем требуют дифференцированного подхода в подборе оптимального перечня методов и средств обеспечения информационной безопасности. Протоколы обнаружения служб (такие как mDNS и SSDP) не предоставляют функционал передачи команд управления, поэтому не являются предметом настоящего исследования
Published Version (
Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have