Abstract
In mobile cyber-physical systems, the execution program of physical system including remote robotics should be a flexible and self-manageable to control behaviors from remote system. However, the physical system is not safe in the view point of security because we assume that the physical system can be infected by a malicious people. Since the core program should be protected and we have to guarantee the secure connection between CPS client and CPS server. This paper addresses the security issues regarding remote code such as CPS client. In addition, we propose the CPS server discovery mechanism based on the secure group management for cloud based CPS system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sztipanovits, J.: Composition of Cyber-Physical Systems. In: 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2007, pp. 3–6. IEEE Press, New York (2007)
Saponas, T., Lester, J., Froehlich, J., Fogarty, J., Landay, J.: iLearn on the iPhone: Real-Time Human Activity Classification on Commodity Mobile Phones. University of Washington CSE Tech Report UW-CSE-08-04-02 (2008)
Froehlich, J., Dillahunt, T., Klasnja, P., Mankoff, J., Consolvo, S., Harrison, B., Landay, J.: UbiGreen: Investigating a Mobile Tool for Tracking and Supporting Green Transportation Habits. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, pp. 1043–1052. ACM (2009)
Thompson, C., White, J., Dougherty, B., Schmidt, D.: Optimizing Mobile Application Performance with Model-Driven Engineering. In: Proceedings of the 7th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (2009)
Jones, W.D.: Forecasting Traffic Flow. IEEE Spectrum 38(1), 90–91 (2001)
Rose, G.: Mobile Phones as Traffic Probes: Practices, Prospects, and Issues. Transport Reviews 26(3), 275–291 (2006)
Mohan, P., Padmanabhan, V., Ranjee, R.: Nericell: Rich Monitoring of Road and Traffic Conditions Using Mobile Smartphones. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, pp. 323–336. ACM, New York (2008)
Leijdekkers, P., Gay, V.: Personal Heart Monitoring and Rehabilitation System Using Smart Phones. In: Proceedings of the International Conference on Mobile Business, p. 29 (2006)
White, J., Turner, H.: Smartphone Computing in the Classroom. IEEE Pervasive Computing 10(2), 82–86 (2011)
Whtie, J., Clarke, S., Groba, C., Dougherty, B., Thompson, C., Schmidt, D.C.: R&D Challenges and Solutions for Mobile Cyber-physical Applications and Supporting Internet Services. Journal of Internet Services and Applications 26(2), 4–6 (2009)
Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)
Baugher, M., Canetti, R., Dondeti, L., Lindholm, F.: MSEC Group Key Management Architecture. IETF Internet Draft (September 2003)
Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)
Sander, T., Tschudin, C.: Towards Mobile Cryptography. In: IEEE Symposium on Security and Privacy, pp. 215–224 (1998)
Yee, B.: A Sanctuary for Mobile Agents. In: Ryan, M. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 261–273. Springer, Heidelberg (1999)
Stinso, D.R.: Collision-free Hash Function. Cryptography Theory and Practice, pp. 234–236. CRC Press (1995)
NIST: Recommendation for Key Management –Part 1: General (revised), NIST Special Publication 800-57, p. 63 (2007)
Sahner, R., Trivedi, K., Puliafito, A.: Performance and Reliability Analysis of Computer Systems. Kluwer Academic Publishers (1996)
Dikaiakos, M., Samaras, G.: A Performance Analysis Framework for Mobile Agent Systems. In: Toussaint, M.-J. (ed.) Ada-Europe 1994. LNCS, vol. 887, pp. 180–187. Springer, Heidelberg (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, J., Lee, S. (2011). Trusted CPS Server Discovery Mechanism in the Insecure Cloud Networks. In: Kim, Th., Adeli, H., Stoica, A., Kang, BH. (eds) Control and Automation, and Energy System Engineering. CES3 CA 2011 2011. Communications in Computer and Information Science, vol 256. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-26010-0_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-26010-0_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-26009-4
Online ISBN: 978-3-642-26010-0
eBook Packages: Computer ScienceComputer Science (R0)