Analysis of Cybersecurity Mechanisms with respect to Dependability and Security Attributes

被引:2
|
作者
Sangchoolie, Behrooz [1 ]
Folkesson, Peter [1 ]
Kleberger, Pierre [1 ]
Vinter, Jonny [1 ]
机构
[1] RISE Res Inst Sweden, Dependable Transport Syst, Gothenburg, Sweden
基金
瑞典研究理事会;
关键词
safety; cybersecurity mechanism; privacy;
D O I
10.1109/DSN-W50199.2020.00027
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded electronic systems need to be equipped with different types of security mechanisms to protect themselves and to mitigate the effects of cybersecurity attacks. These mechanisms should be evaluated with respect to their impacts on dependability and security attributes such as availability, reliability, safety, etc. The evaluation is of great importance as, e.g., a security mechanism should never violate the system safety. Therefore, in this paper, we evaluate a comprehensive set of security mechanisms consisting of 17 different types of mechanisms with respect to their impact on dependability and security attributes. The results show that, in general, the use of these mechanisms have positive effect on system dependability and security. However, there are at least three mechanisms that could have negative impacts on system dependability by violating safety and availability requirements. The results support our claim that the analyses such as the ones conducted in this paper are necessary when selecting and implementing an optimal set of safety and security mechanisms.
引用
收藏
页码:94 / 101
页数:8
相关论文
共 50 条
  • [21] STATISTICAL ANALYSIS OF SECURITY ATTRIBUTES OF COMPUTER SYSTEMS
    Jozwiak, Ireneusz J.
    Laskowski, Wojciech
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY & SAFETY ENGINEERING, 2007, 14 (06): : 569 - 577
  • [22] Providing grid systems' dependability and security
    Bogdan, Razvan
    SACI 2007: 4TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, PROCEEDINGS, 2007, : 71 - 76
  • [23] Higher dependability and security for mobile applications
    Jin, Hongxia
    SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2006, 3934 : 89 - 103
  • [24] Interdependencies and security assessment: a dependability view
    Masera, Marcelo
    2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 585 - 589
  • [25] Security, Privacy, Policy, and Dependability Roundup
    Garber, Lee
    Garber, Lee, 1600, Institute of Electrical and Electronics Engineers Inc. (12): : 8 - 10
  • [26] Dependability and security in medical information system
    Zou, Xukai
    Dai, Yuan-Shun
    Doebbeling, Bradley
    Qi, Mingrui
    HUMAN-COMPUTER INTERACTION, PT 4, PROCEEDINGS: HCI APPLICATIONS AND SERVICES, 2007, 4553 : 549 - +
  • [27] Quantitative Assessment for Organisational Security & Dependability
    Asnar, Yudistira
    Felici, Massimo
    Massacci, Fabio
    Tedeschi, Alessandra
    Yautsiukhin, Artsiom
    DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY, 2009, : 40 - +
  • [28] Security, privacy, policy, and dependability roundup
    Garber, L., 1600, Institute of Electrical and Electronics Engineers Inc., United States (11):
  • [29] Dependability and security will change embedded computing
    Serpanos, Dimitrios
    Henkel, Joerg
    COMPUTER, 2008, 41 (01) : 103 - 105
  • [30] Model checking dependability attributes of wireless group communication
    Massink, M
    Katoen, JP
    Latella, D
    2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 711 - 720