Towards Trustworthy Smart Cyber-Physical Systems

被引:0
作者
David, M. W. [1 ]
Yerkes, C. R. [1 ]
Simmons, M. E. [1 ]
Franceschini, W. [2 ]
机构
[1] Natl Intelligence Univ, Washington, DC 20301 USA
[2] US Army Gen Staff, Washington, DC USA
来源
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016 | 2016年 / 9977卷
关键词
Cyber-physical systems; Internet of Things; Trustworthiness; Wireless; Artificial intelligence; Security analytics; INTERNET;
D O I
10.1007/978-3-319-50011-9_30
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper looks at issues facing the design and operation of trusted, smart cyber-physical systems (CPS). It does this within the context of current efforts related to developing trusted hardware and software, and identifies issues related to those efforts. The paper also looks at several emerging technologies related to wireless systems, artificial intelligence and security analytics; and assesses how they may be leveraged to advance the goals of current and future efforts to create, operate and maintain trusted smart CPS. The views expressed do not reflect the official policy or position of the National Intelligence University, the Department of Defense, the U.S. Intelligence Community, or the U.S. Government.
引用
收藏
页码:392 / 399
页数:8
相关论文
共 17 条
[1]   Keys under doormats: mandating insecurity by requiring government access to all data and communications [J].
Abelson, Harold ;
Anderson, Ross ;
Bellovin, Steven M. ;
Benaloh, Josh ;
Blaze, Matt ;
Diffie, Whitfield ;
Gilmore, John ;
Green, Matthew ;
Landau, Susan ;
Neumann, Peter G. ;
Rivest, Ronald L. ;
Schiller, Jeffrey I. ;
Schneier, Bruce ;
Specter, Michael A. ;
Weitzner, Daniel J. .
JOURNAL OF CYBERSECURITY, 2015, 1 (01) :69-79
[2]  
[Anonymous], 2016, 2016 11 SYSTEM SYSTE, DOI DOI 10.1109/SYSOSE.2016.7542961
[3]   2012 Isn't the End of the World [J].
Cerf, Vinton G. .
IEEE INTERNET COMPUTING, 2010, 14 (06) :96-+
[4]  
Defense Advanced Research Projects Agency (DARPA), 2015, RAP ATT DET IS CHAR
[5]  
Department of Defense and General Services Administration (GSA), 2013, IMPR CYB RES ACQ, P1
[6]  
Hannula J. -M., 2016, IEEE ANTENNAS WIREL
[7]   A Formal-Semantics-Based Calculus of Trust [J].
Huang, Jingwei ;
Nicol, David M. .
IEEE INTERNET COMPUTING, 2010, 14 (05) :38-46
[8]   Big Data for Cyber Physical Systems An Analysis of Challenges, Solutions and Opportunities [J].
Jara, Antonio J. ;
Genoud, Dominique ;
Bocchi, Yann .
2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, :376-380
[9]   Multics security evaluation: Vulnerability analysis [J].
Karger, PA ;
Schell, RR .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :127-146
[10]  
Kumar K. Mahesh, 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), P1, DOI 10.1109/ISCO.2015.7282319