ArticlePDF Available

Makineler Arası İletişim Sistemlerinde Güvenli Veri Aktarımı için Bir Hibrit Güvenlik Şema Önerisi

Authors:

Abstract

Özet-Endüstri 4.0 son zamanların en popüler konularından biri olmayı sürdürmektedir. Bünyesinde, zeki fabrika sistemleri, kendi aralarında otomatik iletişim kurarak süreci yönetebilen makineler ve ortaya çıkan zeki ürünler bulundurduğu için ilgi alanında kalmaya devam edecektir. Ancak, yeni nesil endüstri devrimi kapsamında ele alınan uygulamalar, temelde bilgisayar destekli yönetim, veri toplama ve işleme sistemleri çalıştırdıklarından dolayı siber suçlara karşı ilgi uyandırmaktadırlar. Bundan dolayı, Endüstri 4.0 gelişmelerinin önem verilmesi gereken adımlarından biri de siber güvenliktir. Çünkü, sistem içerisinde bulunan tüm parçalar internet alt yapısı ile iletişim kurmakta ve siber saldırılara karşı açık hale gelmektedir. Güvenli bir endüstri 4.0 yapısı için gerekli siber güvenlik önlemlerinin alınması şarttır. Bu sayede işletmeler kendi iç ve dış süreçlerinin aksamasını ve verimlilik kaybını engelleyebilirler. Bu çalışmada endüstri 4.0 kavramlarından olan makineler arası iletişim (M2M) sistemleri için hibrit güvenlik şeması önerilmiş ve test edilmiştir. Yapılan testler sonucunda, geliştirilen şema ile cihazlar arasında yapılan veri alışverişinin gizliliği, bütünlüğü ve güvenliğinin sağlandığı tespit edilmiştir. Abstract-Industry 4.0 remains one of the most popular topics of recent times. Because of it has intelligent factory systems and machines that can manage the process by automatically communication among themselves, and intelligent products that arise, Industry 4.0 will remain in the area of the interest. However, the practices covered in the new generation of industrial revolution are arousing interest about cybercrime, because of they employ computer aided management, data collection and processing systems. Therefore one of the steps that should be given importance of the developments of Industry 4.0 is cyber security. Because, all parts in system communicate with infrastructure of the internet and be vulnerable against the cyber-attacks. It is essential to have the necessary cyber security measures for a safe industry 4.0 structure. In this way, businesses can prevent hitch of their internal and external processes and loss of productivity. In this study, a hybrid security scheme has been developed and have been controlled for the machine to machine communication (M2M) that is part of the industry 4.0. As a result of tests, have been determined that provide privacy, integrity and security of the data exchange among devices with developed scheme.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Nowadays the elds in which machine-to-machine (M2M) applications are used and the numbers of M2M devices and users are increasing gradually. In an M2M application, M2M platforms are used in order to follow and analyze the data presented by M2M devices. The communication of multiple users and devices via an M2M platform causes some problems in terms of security. In this study, an M2M platform has been developed by using RestFul web services and NoSQL database. On this platform a token-based authentication method was used for multiple users and devices. In this method, an authorized request approach was adopted for authorized users and an unauthorized request approach was adopted for unauthorized users. In the token-based authentication method on the M2M platform no session information is kept. Thanks to the adopted method, in multiple processes carried out on the platform, not only was data traffic density decreased, but also security level was increased for both user and device authentication.
Article
Full-text available
Internet of Things (IoT) transforms network communication to Machine-to-Machine (M2M) basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS) is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.
Conference Paper
Full-text available
The vision of the 4th industrial revolution describes the realization of the Internet of Things within the context of the factory to realize a significantly higher flexibility and adaptability of production systems. Driven by politics and research meanwhile most of the automation technology providers in Germany have recognized the potentials of Industry 4.0 and provide first solutions. However, presented solutions so far represent vendor-specific or isolated production system. In order to make Industry 4.0 a success, these proprietary approaches must be replaced by open and standardized solutions. For this reason, the SmartFactoryKL has realized a very first multi-vendor and highly modular production system as a sample reference for Industry 4.0. This contribution gives an overview of the current status of the SmartFactoryKL initiative to build a highly modular, multi-vendor production line based on common concepts and standardization activities. The findings and experiences of this multi-vendor project are documented as an outline for further research on highly modular production lines.
Article
With the growing popularity of Internet of Things (IoT) in a wide range of applications, ensuring the communication security of IoT devices is important. Certificateless signature schemes are one of several viable approaches to providing data integrity and user identification security in resource-limited IoT devices. However, designing provably-secure and efficient certificateless signature schemes remains a challenging task. In this paper, we point out two shortcomings in Yeh et al.’s certificateless signature scheme, by explaining how an adversary can easily impersonate the key generation center to issue the partial private key for any user without being detected. Moreover, the scheme cannot resist public key replacement attacks. Then, we present an improved scheme and prove its unforgeability against super adversaries in the random oracle model. Furthermore, we demonstrate the efficiency of our scheme is comparable to that of Yeh’s scheme in terms of computational and communication costs.
Article
The Internet has made our planet a smaller world while the cyber world and the physical world have not been integrated seamlessly. In the future cyber-physical system (CPS), all objects in the physical world would be connected to the cyber world for achieving faster information processing, more accurate control and real-time response. Our abilities of controlling facilities and handling events will be much more powerful to make our lives much better. In the CPS, the machine-to-machine (M2M) communication, which is in charge of data collection, utilizes both wireless and wired systems to monitor environmental conditions and transmits the information among different systems without direct human intervention. As a part of the CPS, the M2M communication is considerable important while being fragile at the same time since M2M communication still faces lots of security threats. There are some security vulnerabilities that yet to be solved. In this paper, we propose an anonymous authentication scheme for multi-domain M2M environment. The proposed scheme applies hybrid encryption scheme involving certificateless cryptography and advanced encryption standard (AES) to achieve the authentication and anonymity properties. The security analysis with Burrows–Abadi–Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) shows that the proposed scheme is well designed and could withstand multiple attacks, such as man-in-the-middle attacks, replay attacks, DoS attacks, impersonation attacks and compromised attacks.
Article
Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, storage, and computation. Such constraints pose several challenges in the design of M2M networks. Furthermore, some elements that contributed to the rise of M2M applications have caused several new security threats and risks, typically due to the advancements in technology, increasing computing power, declining hardware costs, and freely available software tools. Due to the restricted capabilities of M2M devices, most of the recent research efforts on M2M have focused on computing, resource management, sensing, congestion control and controlling technologies. However, there are few studies on security aspects and there is a need to introduce the threats existing in M2M systems and corresponding solutions. Accordingly, in this paper, after presenting an overview of potential M2M applications, we present a survey of security threats against M2M networks and solutions to prevent or reduce their impact. Then, we investigate security-related challenges and open research issues in M2M networks to provide an insight for future research opportunities. Moreover, we discuss the oneM2M standard, one of the prominent standard initiatives for more secure and smoother M2M networks and the Internet of Things.
Article
Machine-to-Machine (M2M) communication is a promising technology for next generation communication systems. This communication paradigm facilitates ubiquitous communications with full mechanical automation, where a large number of intelligent devices connected by wired/wireless links, interact with each other without direct human intervention. As a result, M2M communication finds applications in wide areas such as smart grids, e-healthcare, home area networks, intelligent transportation systems, environmental monitoring, smart cities, and industrial automation. However, distinctive features in M2M communications form different challenges from those in human-to-human communications. These challenges need to be addressed, or otherwise it is not easy for this paradigm to gain trust of people. To understand M2M communications deeply, this paper presents a comprehensive review of M2M communication technology in terms of its system model architecture proposed by different standards developing organizations. This mainly includes 3GPP, ETSI, and oneM2M. Further, we have investigated distinctive features of various M2M applications and their supporting attributes, the M2M data traffic and their characterization, various M2M standardization bodies and their unique tasks, and potential M2M communication challenges and their proposed state-of-the-art solutions, followed by future research directions.