A Scoring System to efficiently measure Security in Cyber-Physical Systems

被引:1
作者
Aigner, Andreas [1 ]
Khelil, Abdelmajid [1 ]
机构
[1] Landshut Univ Appl Sci, Dept Comp Sci, Landshut, Germany
来源
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) | 2020年
关键词
Security Scoring; Security Metrics; Security Analysis; Threat Analysis; Security Engineering; Cyber-Physical Systems; Internet of Things;
D O I
10.1109/TrustCom50675.2020.00151
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
the importance of Cyber-Physical Systems (CPS) gains more and more weight in our daily business and private life. Although CPS build the backbone for major trends, like Industry 4.0 and connected vehicles, they also propose many new challenges. One major challenge can be found in achieving a high level of security within such highly connected environments, in which an unpredictable number of heterogeneous systems with often-distinctive characteristics interact with each other. In order to develop high-level security solutions, system designers must eventually know the current level of security of their specification. To this end, security metrics and scoring frameworks are essential, as they quantitatively express security of a given design or system. However, existing solutions may not be able to handle the proposed challenges of CPS, as they mainly focus on one particular system and one specific attack. Therefore, we aim to elaborate a security scoring mechanism, which can efficiently be used in CPS, while considering all essential information. We break down each system within the CPS into its core functional blocks and analyze a variety of attacks in terms of exploitability, scalability of attacks, as well as potential harm to targeted assets. With this approach, we get an overall assessment of security for the whole CPS, as it integrates the security-state of all interacting systems. This allows handling the presented complexity in CPS in a more efficient way, than existing solutions.
引用
收藏
页码:1142 / 1146
页数:5
相关论文
共 50 条
[41]   On the Security of Cyber-Physical Systems Against Stochastic Cyber-Attacks Models [J].
Abu Al-Haija, Qasem .
2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, :155-160
[42]   Some Considerations on Dependability Issues and Cyber-Security of Cyber-Physical Systems [J].
Thiriet, Jean-Marc ;
Mocanu, Stephane .
2018 INTERNATIONAL CONFERENCE ON SMART COMMUNICATIONS IN NETWORK TECHNOLOGIES (SACONET), 2018, :1-6
[43]   Systems-theoretic security requirements modeling for cyber-physical systems [J].
Carter, Bryan T. ;
Bakirtzis, Georgios ;
Elks, Carl R. ;
Fleming, Cody H. .
SYSTEMS ENGINEERING, 2019, 22 (05) :411-421
[44]   EMBED-SoSE: Drawing a Cyber-physical System of Systems [J].
Ivo, Andre A. S. ;
Ribeiro, Sheila G. ;
Mattiello-Francisco, Fatima .
ENASE: PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2022, :485-493
[45]   Remote Health Monitoring System Modeling for Cyber-Physical Systems [J].
Calhan, Ali ;
Cicioglu, Murtaza .
2022 30TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU, 2022,
[46]   A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems [J].
Khalil, Alvi Ataur ;
Franco, Javier ;
Parvez, Imtiaz ;
Uluagac, Selcuk ;
Shahriar, Hossain ;
Rahman, Mohammad Ashiqur .
2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, :1774-1779
[47]   Context-Aware Security Solutions for Cyber-Physical Systems [J].
Kaiyu Wan ;
Vangalur Alagar .
Mobile Networks and Applications, 2014, 19 :212-226
[48]   Security Against Communication Network Attacks of Cyber-Physical Systems [J].
Públio Macedo Lima ;
Marcos Vinícius Silva Alves ;
Lilian Kawakami Carvalho ;
Marcos Vicente Moreira .
Journal of Control, Automation and Electrical Systems, 2019, 30 :125-135
[49]   Cyber-physical systems security: Limitations, issues and future trends [J].
Yaacoub, Jean-Paul A. ;
Salman, Ola ;
Noura, Hassan N. ;
Kaaniche, Nesrine ;
Chehab, Ali ;
Malli, Mohamad .
MICROPROCESSORS AND MICROSYSTEMS, 2020, 77
[50]   Security analysis for cyber-physical systems under undetectable attacks: A geometric approach [J].
Zhao, Zhengen ;
Yang, Ying ;
Li, Yuzhe ;
Liu, Ruijie .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) :4359-4370