Failure Mode and Effect Analysis for Cyber-Physical Systems

被引:14
作者
Oliveira, Joao [1 ]
Carvalho, Goncalo [2 ]
Cabral, Bruno [2 ]
Bernardino, Jorge [1 ,2 ]
机构
[1] Polytech Inst Coimbra, Inst Super Engn Coimbra ISEC, P-3030199 Coimbra, Portugal
[2] Univ Coimbra, Ctr Informat & Syst Univ Coimbra CISUC, Dept Informat Engn, P-3030290 Coimbra, Portugal
来源
FUTURE INTERNET | 2020年 / 12卷 / 11期
关键词
cyber-physical systems; failure mode and effect analysis; risk priority number; communications-based train control; COMMUNICATION; NUMBERS;
D O I
10.3390/fi12110205
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-Physical Systems (CPS) are a prominent component of the modern digital transformation, which combines the dynamics of the physical processes with those of software and networks. Critical infrastructures have built-in CPS, and assessing its risk is crucial to avoid significant losses, both economic and social. As CPS are increasingly attached to the world's main industries, these systems' criticality depends not only on software efficiency and availability but also on cyber-security awareness. Given this, and because Failure Mode and Effect Analysis (FMEA) is one of the most effective methods to assess critical infrastructures' risk, in this paper, we show how this method performs in the analysis of CPS threats, also exposing the main drawbacks concerning CPS risk assessment. We first propose a risk prevention analysis to the Communications-Based Train Control (CBTC) system, which involves exploiting cyber vulnerabilities, and we introduce a novel approach to the failure modes' Risk Priority Number (RPN) estimation. We also propose how to adapt the FMEA method to the requirement of CPS risk evaluation. We applied the proposed procedure to the CBTC system use case since it is a CPS with a substantial cyber component and network data transfer.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 32 条
[31]   Message dropping attacks in overlay networks: Attack detection and attacker identification [J].
Xie, Liang ;
Zhu, Sencun .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (03)
[32]  
Xu J., 2015, J COMPUTER COMMUNICA, V3, P7, DOI 10.4236/jcc.2015.39007