Skip to main content

Trusted CPS Server Discovery Mechanism in the Insecure Cloud Networks

  • Conference paper
  • 1594 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 256))

Abstract

In mobile cyber-physical systems, the execution program of physical system including remote robotics should be a flexible and self-manageable to control behaviors from remote system. However, the physical system is not safe in the view point of security because we assume that the physical system can be infected by a malicious people. Since the core program should be protected and we have to guarantee the secure connection between CPS client and CPS server. This paper addresses the security issues regarding remote code such as CPS client. In addition, we propose the CPS server discovery mechanism based on the secure group management for cloud based CPS system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sztipanovits, J.: Composition of Cyber-Physical Systems. In: 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2007, pp. 3–6. IEEE Press, New York (2007)

    Google Scholar 

  2. Saponas, T., Lester, J., Froehlich, J., Fogarty, J., Landay, J.: iLearn on the iPhone: Real-Time Human Activity Classification on Commodity Mobile Phones. University of Washington CSE Tech Report UW-CSE-08-04-02 (2008)

    Google Scholar 

  3. Froehlich, J., Dillahunt, T., Klasnja, P., Mankoff, J., Consolvo, S., Harrison, B., Landay, J.: UbiGreen: Investigating a Mobile Tool for Tracking and Supporting Green Transportation Habits. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, pp. 1043–1052. ACM (2009)

    Google Scholar 

  4. Thompson, C., White, J., Dougherty, B., Schmidt, D.: Optimizing Mobile Application Performance with Model-Driven Engineering. In: Proceedings of the 7th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (2009)

    Google Scholar 

  5. Jones, W.D.: Forecasting Traffic Flow. IEEE Spectrum 38(1), 90–91 (2001)

    Article  MathSciNet  Google Scholar 

  6. Rose, G.: Mobile Phones as Traffic Probes: Practices, Prospects, and Issues. Transport Reviews 26(3), 275–291 (2006)

    Article  Google Scholar 

  7. Mohan, P., Padmanabhan, V., Ranjee, R.: Nericell: Rich Monitoring of Road and Traffic Conditions Using Mobile Smartphones. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, pp. 323–336. ACM, New York (2008)

    Chapter  Google Scholar 

  8. Leijdekkers, P., Gay, V.: Personal Heart Monitoring and Rehabilitation System Using Smart Phones. In: Proceedings of the International Conference on Mobile Business, p. 29 (2006)

    Google Scholar 

  9. White, J., Turner, H.: Smartphone Computing in the Classroom. IEEE Pervasive Computing 10(2), 82–86 (2011)

    Article  Google Scholar 

  10. Whtie, J., Clarke, S., Groba, C., Dougherty, B., Thompson, C., Schmidt, D.C.: R&D Challenges and Solutions for Mobile Cyber-physical Applications and Supporting Internet Services. Journal of Internet Services and Applications 26(2), 4–6 (2009)

    Google Scholar 

  11. Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

  12. Baugher, M., Canetti, R., Dondeti, L., Lindholm, F.: MSEC Group Key Management Architecture. IETF Internet Draft (September 2003)

    Google Scholar 

  13. Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  14. Sander, T., Tschudin, C.: Towards Mobile Cryptography. In: IEEE Symposium on Security and Privacy, pp. 215–224 (1998)

    Google Scholar 

  15. Yee, B.: A Sanctuary for Mobile Agents. In: Ryan, M. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 261–273. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  16. Stinso, D.R.: Collision-free Hash Function. Cryptography Theory and Practice, pp. 234–236. CRC Press (1995)

    Google Scholar 

  17. NIST: Recommendation for Key Management –Part 1: General (revised), NIST Special Publication 800-57, p. 63 (2007)

    Google Scholar 

  18. Sahner, R., Trivedi, K., Puliafito, A.: Performance and Reliability Analysis of Computer Systems. Kluwer Academic Publishers (1996)

    Google Scholar 

  19. Dikaiakos, M., Samaras, G.: A Performance Analysis Framework for Mobile Agent Systems. In: Toussaint, M.-J. (ed.) Ada-Europe 1994. LNCS, vol. 887, pp. 180–187. Springer, Heidelberg (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, J., Lee, S. (2011). Trusted CPS Server Discovery Mechanism in the Insecure Cloud Networks. In: Kim, Th., Adeli, H., Stoica, A., Kang, BH. (eds) Control and Automation, and Energy System Engineering. CES3 CA 2011 2011. Communications in Computer and Information Science, vol 256. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-26010-0_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-26010-0_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-26009-4

  • Online ISBN: 978-3-642-26010-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics