skip to main content
10.1145/2093698.2093864acmotherconferencesArticle/Chapter ViewAbstractPublication PagesisabelConference Proceedingsconference-collections
research-article

Security requirements for a cyber physical community system: a case study

Published: 26 October 2011 Publication History

Abstract

Cyber physical system is an emerging networking paradigm. It is applied to telecommunication, transportation, and healthcare for automation and bringing new technologies. This system is based on physical devices that communicate with each other and outside world through wired or wireless medium. Hence, it is vulnerable to various types of new and acquired threats. In this paper, we discuss about the security requirements for a cyber physical community system using a case study of Vehicle cloud. Vehicle cloud is a novel idea that uses the benefits of newly emerging cyber physical systems and the concept of cloud computing to provide better services to the community.

References

[1]
J. Wu, D. Li, Y. Tu, P. Zhang, and F. Li, "A Survey of Cyber Physical Systems," in IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems, Kunming, China, March 2011.
[2]
B Latre, B Braem, I Moerman, C Blondia, and P Demeester, "A survey on wireless body area networks," Wireless Networks, vol. 17, no. 1, pp. 1--18, January 2011.
[3]
Smart Lab. {Online}. http://www.smartlabsinc.com/
[4]
E. K. Wang et al., "Security Issues and Challenges for Cyber Physical System," in IEEE/ACM International Conference on Green Computing and Communications, 2010, pp. 733--738.
[5]
A Cardenas et al., "Challenges for Securing Cyber Physical Systems," in Workshop on Future Directions in Cyber-physical Systems Security, DHS, July 2009.
[6]
R Akella, H Tang, and B. M. McMillin, "Analysis of information flow security in cyber--physical systems," International Journal of Critical Infrastructure Protection, pp. 157--173, 2010.
[7]
L. A. Tang et al., "Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems," in 10th IEEE International Conference on Data Mining, Sydney, NSW, January 2011, pp. 1079--1084.
[8]
N. Kottenstette, G. Karsai, and J. Sztipanovits, "A Passivity-Based Framework for Resilient Cyber Physical Systems," in 2nd IEEE International Symposium on Resilient Control Systems, Idaho Falls, ID, September 2009, pp. 43--50.
[9]
A Banerjee, K. Venkatasubramanian, and S. K. S. Gupta, "Challenges of Implementing Cyber-Physical Security Solutions in Body Area Networks," in 4th International Conference on Body Area Networks, Los Angeles, CA, April 2009.
[10]
K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "Green and Sustainable Cyber Physical Security Solutions for Body Area Networks," in 6th IEEE Workshop on Wearable and Implantable Body Sensor Networks, Berkeley, CA, August 2009, pp. 240--245.
[11]
T. T. Gamage, B. M. McMillin, and Roth P. R., "Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation," in IEEE 34th Annual Computer Software and Applications Conference Workshops, Seoul, South Korea, July 2010, pp. pp.158--163.
[12]
C. Zimmer, B. Bhat, F. Mueller, and S. Mohan, "Time-Based Intrusion Detection in Cyber-Physical Systems," in 1st ACM/IEEE International Conference on Cyber-Physical Systems, Stockholm, Sweden, 2010, pp. 109--118.
[13]
M. Abuelela and S. Olariu, "Taking VANET to the Clouds," in 8th International Conference on Advances in Mobile Computing & Multimedia, Paris, France, November 2010.
[14]
S. Ma, O. Wolfson, and Lin J., "IIP: An Event-Based Platform for ITS Applications," in 4th ACM SIGSPATIAL International Workshop on Computational Transportation Science, San Jose, CA, USA, November 2010.
[15]
D. Bernstein, N. Vidovic, and S. Modi, "A Cloud PAAS for High Scale, Function, and Velocity Mobile Applications," in Fifth IEEE International Conference on Systems and Networks Communications, November 2010, pp. 117--123.
[16]
P. Park, H. Yim, H. Moon, and J. Jung, "An OSGi Based In-Vehicle Gateway Platform Architecture for Improved Sensor Extensibility and Interoperability," in 33rd Annual IEEE International Computer Software and Applications Conference, 2009, pp. 140--147.
[17]
C. Squatriglia. (2011, April) Toyota and Microsoft to Bring the Cloud to Cars. {Online}. http://www.wired.com/autopia/2011/04/toyota-microsoft-to-bring-the-cloud-to-cars
[18]
Greg. (2011, May) Google and Ford Collaborate on Cloud Cars. {Online}. http://www.geekwithlaptop.com/google-and-ford-collaborate-on-cloud-cars
[19]
G. Chen and T. Fraichard, "A Real-Time Navigation Architecture for Automated Vehicles in Urban Environments," in IEEE Intelligent Vehicles Symposium, Istanbul, Turkey, 2007.
[20]
F. B. Cheikh, M. A. Mastouri, and S. Hasnaoui, "Implementing a Real-Time Middleware Based on DDS for the Cooperative Vehicle Infrastructure Systems," in Sixth International Conference on Wireless and Mobile Communications, 2010, pp. 492--497.
[21]
M. C. Chen, J. L. Chen, and T. W. Chang, "Android/OSGi-based vehicular network management system,"," Elsevier Computer Communications, vol. 34, pp. 169--183, 2011.
[22]
I. Krontiris and T. Dimitriou, "Towards intrusion detection in wireless sensor networks," in 13th European Wireless Conference, Paris, 2007.
[23]
A. H. Farooqi and F. A. Khan, "Intrusion Detection Systems for Wireless Sensor Networks: A Survey," in Communication and Networking: Springer, Jeju Island, Korea, 2009, pp. 234--241.
[24]
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," in Computer, 2002, pp. 54--62.
[25]
Z. S. Bojkovic, B. M. Bakmaz, and M. R. Bakmaz, "Security Issues in Wireless Sensor Networks," International Journal of Communications, vol. II, no. 1, pp. 106--115, 2008.
[26]
Amazon. (2010) Amazon Web Services. {Online}. https://aws.amazon.com/
[27]
L. M. Kaufman, "Data Security in the World of Cloud Computing," IEEE Security & Privacy, vol. 7, no. 4, pp. 61--64, August 2009.
[28]
Cloud Security Alliance. (2010) Top Threats to Cloud Computing V1.0. {Online}. http://www.cloudsecurityalliance.org/topthreat

Cited By

View all
  • (2013)A novel intrusion detection framework for wireless sensor networksPersonal and Ubiquitous Computing10.1007/s00779-012-0529-y17:5(907-919)Online publication date: 1-Jun-2013
  • (2012)Bio-inspired Evolutionary Sensory system for Cyber-Physical System defense2012 IEEE Conference on Technologies for Homeland Security (HST)10.1109/THS.2012.6459829(79-86)Online publication date: Nov-2012
  1. Security requirements for a cyber physical community system: a case study

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ISABEL '11: Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
      October 2011
      949 pages
      ISBN:9781450309134
      DOI:10.1145/2093698
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      • Universitat Pompeu Fabra
      • IEEE
      • Technical University of Catalonia Spain: Technical University of Catalonia (UPC), Spain
      • River Publishers: River Publishers
      • CTTC: Technological Center for Telecommunications of Catalonia
      • CTIF: Kyranova Ltd, Center for TeleInFrastruktur

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 26 October 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cloud computing
      2. cyber physical system (CPS)
      3. security
      4. vehicle cloud (V-Cloud)

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      ISABEL '11
      Sponsor:
      • Technical University of Catalonia Spain
      • River Publishers
      • CTTC
      • CTIF

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 10 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2013)A novel intrusion detection framework for wireless sensor networksPersonal and Ubiquitous Computing10.1007/s00779-012-0529-y17:5(907-919)Online publication date: 1-Jun-2013
      • (2012)Bio-inspired Evolutionary Sensory system for Cyber-Physical System defense2012 IEEE Conference on Technologies for Homeland Security (HST)10.1109/THS.2012.6459829(79-86)Online publication date: Nov-2012

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media