Abstract
Cyber Physical Trust Systems (CPTS) are Cyber Physical Systems and Internet of Things enriched with trust as an explicit, measurable, testable and verifiable system component. In this paper, we propose to use blockchain, a distributed ledger technology, as the trust enabling system component for CPTS. We propose two schemes for CPTSs driven by blockchain in relation to two typical network model cases. We show that our proposed approach achieves the security properties, such as device identification, authentication, integrity, and non-repudiation, and provides protection against popular attacks, such as replay and spoofing. We provide formal proofs of those properties using the Tamarin Prover tool. We describe results of a proof-of-concept which implements a CPTS driven by blockchain for physical asset management and present a performance analysis of our implementation. We identify use cases in which CPTSs driven by blockchain find applications.
Highlights
Cyber-physical systems (CPS) are envisioned as an emerging paradigm that focuses on seamless integration and orchestration of objects and embedded systems, communicating with one another using advanced networking technologies [1], [2]
We propose two schemes for Cyber Physical Trust Systems (CPTS) driven by blockchain in relation to two typical network model cases
We provide in depth formal and informal security analysis of the proposed schemes, which establish that our schemes have the security properties, e.g., decentralization, transparency, unpredictability, device authentication and integrity, device identification, and non-repudiation
Summary
Cyber-physical systems (CPS) are envisioned as an emerging paradigm that focuses on seamless integration and orchestration of objects and embedded systems, communicating with one another using advanced networking technologies [1], [2]. The proposed scheme utilized the security features provided by blockchain, and designed several secure virtual zones (called bubbles) In such zones the smart objects or things can identify each other, establish trust, and protect the system against replay attacks using time-stamps. Note that the scheme did not have any pre-shared information among entities, it is hard to understand how these entities would verify each other In this scheme, the blockchain server (i.e., BIDaaS provider) utilizes its own public and private key pair to provide the security services (e.g., authentication). There may be direct NFC communication between CPS and handheld devices
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have