scholarly journals A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems

Systems ◽  
2019 ◽  
Vol 7 (2) ◽  
pp. 21 ◽  
Author(s):  
Bryan Carter ◽  
Stephen Adams ◽  
Georgios Bakirtzis ◽  
Tim Sherburne ◽  
Peter Beling ◽  
...  

Despite “cyber” being in the name, cyber–physical systems possess unique characteristics that limit the applicability and suitability of traditional cybersecurity techniques and strategies. Furthermore, vulnerabilities to cyber–physical systems can have significant safety implications. The physical and cyber interactions inherent in these systems require that cyber vulnerabilities not only be defended against or prevented, but that the system also be resilient in the face of successful attacks. Given the complex nature of cyber–physical systems, the identification and evaluation of appropriate defense and resiliency strategies must be handled in a targeted and systematic manner. Specifically, what resiliency strategies are appropriate for a given system, where, and which should be implemented given time and/or budget constraints? This paper presents two methodologies: (1) the cyber security requirements methodology and (2) a systems-theoretic, model-based methodology for identifying and prioritizing appropriate resiliency strategies for implementation in a given system and mission. This methodology is demonstrated using a case study based on a hypothetical weapon system. An assessment and comparison of the results from the two methodologies suggest that the techniques presented in this paper can augment and enhance existing systems engineering approaches with model-based evidence.

2012 ◽  
Vol 7 (5) ◽  
pp. 255-265
Author(s):  
Soo-Youl Park ◽  
Wook-Jin Choi ◽  
Bo-Heung Chung ◽  
Jeong-Nyeo Kim ◽  
Joo-Man Kim

2021 ◽  
Vol 13 (2) ◽  
pp. 32-39
Author(s):  
George Matta ◽  
Sebastian Chlup ◽  
Abdelkader Magdy Shaaban ◽  
Christoph Schmittner ◽  
Andreas Pinzenöhler ◽  
...  

The Internet of Things (IoT) and cloud technologies are increasingly implemented in the form of Cyber-Physical Systems of Systems (CPSoS) for the railway sector. In order to satisfy the security requirements of Cyber-Physical Systems (CPS), domainspecific risk identification assessment procedures have been developed. Threat modelling is one of the most commonly used methods for threat identification for the security analysis of CPSoS and is capable of targeting various domains. This paper reports our experience of using a risk management framework identify the most critical security vulnerabilities in CPSoS in the domain and shows the broader impact this work can have on the domain of safety and security management. Moreover, we emphasize the application of common analytical methods for cyber-security based on international industry standards to identify the most vulnerable assets. These will be applied to a meta-model for automated railway systems in the concept phase to support the development and deployment of these systems. Furthermore, it is the first step to create a secure and standard complaint system by design.


2017 ◽  
Vol 139 (03) ◽  
pp. S3-S8 ◽  
Author(s):  
Edwin Zivi

This article discusses various aspects of a course on cyber-physical systems (CPS) in the educational programs of defense organizations. CPS are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. The article also highlights various objectives of the CPS course. A central challenge to deploying resilient CPSs involves the appreciation for the multi-disciplinary challenges and the lack of a unified framework for CPS analysis, design and implementation. A significant part of the course focuses on a case study in industrial control of a Vinyl Acetate (VAc) chemical plant. The course described herein presents fundamental concepts within the rapidly expanding field of CPS and has been tailored to and is well received by U.S. Naval Academy Systems Engineering senior level engineering students. The U.S. Naval Academy thrust in cyber security studies includes a new major, Cyber Sciences, and construction of a new facility, Hopper Hall, to house the assembled multi-disciplinary teaching and research team.


2015 ◽  
Vol 76 (4) ◽  
Author(s):  
Daniel Kliewe ◽  
Lydia Kaiser ◽  
Roman Dumitrescu ◽  
Jürgen Gausemeier

This paper will improve the system protection for Cyber-Physical Systems (CPS) by the use of the specification technique CONSENS. Therefore an approach is demonstrated and validated. The possibilities how the system protection can be integrated in Model-Based Systems Engineering (MBSE) and especially in CONSENS are shown and discussed. First results how the different views on the system can be used to identify components worth protecting of CPS are presented. The identified components are of crucial importance in order to ensure the protection of CPS.


2020 ◽  
Vol 8 (10) ◽  
pp. 768
Author(s):  
Georgios Kavallieratos ◽  
Sokratis Katsikas

One aspect of the digital transformation process in the shipping industry, a process often referred to as Shipping 4.0, is the increased digitization of on board systems that goes along with increased automation in and autonomy of the vessel. This is happening by integrating Information Technology with Operation Technology systems that results in Cyber Physical Systems on which the safe operations and sailing of contemporary and future vessels depend. Unavoidably, such highly interconnected and interdependent systems increase the exposure of the vessel’s digital infrastructure to cyber attacks and cyber security risks. In this paper, we leverage the STRIDE and DREAD methodologies to qualitatively and quantitatively assess the cyber risk of Cyber Physical Systems on board digitalized contemporary and future ships. Further, we propose appropriate cyber security baseline controls to mitigate such risks, by applying a systematic approach using a set of criteria that take into account the security requirements; the cyber risks; the possible attacks; and the possibly already existing controls, to select from the list of controls provided in the Industrial Control Systems (ICS) overlay of the NIST Guide to ICS Security. The results are expected to support the decision-making and the design of a security architecture for the cyber-enabled ship.


Electronics ◽  
2021 ◽  
Vol 10 (8) ◽  
pp. 983
Author(s):  
Alachew Mengist ◽  
Lena Buffoni ◽  
Adrian Pop

In the field of model-based design of Cyber–Physical Systems (CPS), seamless traceability of the process, from requirements to models to simulation results, is becoming increasingly important. It can be used to support several activities such as variant handling, impact analysis, component reuse, software maintenance and evolution, verification, and validation. Despite the fact that the relevance of traceability in the model-based design of CPSs is well known, current tools that support traceability management are inadequate in practice. The lack of comprehensive whole-lifecycle systems engineering support in a single tool is one of the main causes of such ineffective traceability management, where traceability relationships between artifacts are still manually generated and maintained. This paper aims at presenting an approach and a prototype for automatically generating and maintaining the appropriate traceability links between heterogeneous artifacts ranging from requirement models, through design models, down to simulation and verification results throughout the product life cycle in model-based design of CPSs. A use case study is presented to validate and illustrate the proposed method and prototype.


Sign in / Sign up

Export Citation Format

Share Document