1,451
views
0
recommends
+1 Recommend
1 collections
    8
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Optimizing Blockchain for data integrity in Cyber Physical Systems

      proceedings-article
      1 , 1 , 1
      5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018)
      ICS & SCADA Cyber Security Research
      29 - 30 August 2018
      Blockchain, Cyber-Physical Systems, Security, Data Integrity, Logging
      Bookmark

            Abstract

            Securely maintaining log records for audit and accountability purposes is key for the proper operation of Cyber-Physical Systems. Thus, integrity of data used by Supervisory Control and Data acquisition (SCADA) components for monitoring and control functionalitiesmust be ensured. In this work, we consider a blockchain-based scheme for enhancing the integrity of measurements recorded in ledger blocks while taking into account particular application constraints within our problem formulation. Particularly, our formulation considers the real-time requirements of the monitoring and control functions and optimizes the blockchain computations for efficient resource utilization in order to deliver hard to tamper blocks of measurements. Performance analysis of the resulting mathematical programming solution is conducted through extensive simulation results.

            Content

            Author and article information

            Contributors
            Conference
            August 2018
            August 2018
            : 74-83
            Affiliations
            [1 ]KIOS Center of Excellence, Department of Electrical and Computer Engineering, University of Cyprus
            Article
            10.14236/ewic/ICS2018.9
            440ae647-4de4-445c-bc67-8bc60be242a0
            © Koumidis et al. Published by BCS Learning and Development Ltd. Proceedings of ICS & SCADA 2018

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            5th International Symposium for ICS & SCADA Cyber Security Research 2018
            ICS-CSR 2018
            5
            University of Hamburg, Germany
            29 - 30 August 2018
            Electronic Workshops in Computing (eWiC)
            ICS & SCADA Cyber Security Research
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICS2018.9
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Security,Cyber-Physical Systems,Logging,Blockchain,Data Integrity

            REFERENCES

            1. 2005 Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing IACR Cryptology ePrint Archive

            2. 2015 NIST Special Publication 800-82: Guide to Industrial Control Systems (ICS) Security

            3. 2017 Decentralized User-Centric Access Control using PubSub over Blockchain abs/1710.00110

            4. 2017 Towards Blockchain-based Auditable Storage and Sharing of IoT Data Proceedings of the 2017 on Cloud Computing Security Workshop

            5. ,, 2017 Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds 26th USENIX Security Symposium

            6. Ittay Eyal and Emin Gn Sirery 2014 How to Disincentivize Large Bitcoin Mining Pools http://hackingdistributed.com/2014/06/18/how-to-disincentivize-large-bitcoin-mining-pools/

            7. 2008 Bitcoin: A Peer-to-Peer Electronic Cash System” May 2008

            8. . (1992 ricing via processing or combatting junk mail Lecture Notes in Computer Science 740

            9. 2017 Distributed ledger technology: Beyond block chain UK Government Office for Science

            10. 2016 Blockchains and Smart Contracts for the Internet of Things IEEE Access

            11. 2016 NIST SP 800-160 systems security engineering: Considerations for a multidisciplinary approach in the engineering of trustworthy secure systems Nat. Inst. Standards Technol., US Dept. Commerce Gaithersburg, MD, US

            12. 2017 SMART POOL: Practical Decentralized Pooled Mining IIACR Cryptology ePrint Archive

            13. 2016 Optimizing Governed Blockchains for Financial Process Authentications http://arxiv.org/abs/1612.00407

            14. 2014 Industrial Control System Network Traffic Data sets to Facilitate Intrusion Detection System Research Critical Infrastructure Protection VIII

            15. 2011 A Control System Testbed to Validate Critical Infrastructure Protection Concepts International Journal of Critical Infrastructure Protection

            16. 2003 Forward-security in private-key cryptography Proc. Topics Cryptol

            17. 1997 Forward-security in private-key cryptography

            Comments

            Comment on this article