Modeling security in cyber-physical systems

被引:67
|
作者
Burmester, Mike [1 ]
Magkos, Ernmanouil [2 ]
Chrissikopoulos, Vassilis [2 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
[2] Ionian Univ, Dept Informat, Corfu 49100, Greece
基金
美国国家科学基金会;
关键词
Cyber-physical systems; Threat models; Treaty verification protocols; ATTACKS;
D O I
10.1016/j.ijcip.2012.08.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a framework for modeling the security of a cyber-physical system in which the behavior of the adversary is controlled by a threat model that captures - in a unified manner - the cyber aspects (with discrete values) and the physical aspects (with continuous values) of the cyber-physical system. In particular, the framework addresses combined (dependent) vector attacks and synchronization/localization issues. The framework identifies the cyber-physical features that must be protected according to the prevailing security policy. Also, the framework can be used for formal proofs of the security of cyber-physical systems. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:118 / 126
页数:9
相关论文
共 50 条
  • [21] Security Games for Cyber-Physical Systems
    Vigo, Roberto
    Bruni, Alessandro
    Yuksel, Ender
    [J]. SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 17 - 32
  • [22] Analysis of security in cyber-physical systems
    CHEN Jie
    ZHANG Fan
    SUN Jian
    [J]. Science China(Technological Sciences)., 2017, 60 (12) - 1977
  • [23] Security Synthesis for Cyber-Physical Systems
    Li, Jitao
    Wang, Zhenhua
    Shen, Yi
    Xie, Lihua
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (02): : 1027 - 1037
  • [24] Security and networking for cyber-physical systems
    Wu, Shaoen
    Wang, Honggang
    Wu, Dalei
    Chatzimisios, Periklis
    Chen, Zhigang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (09) : 807 - 807
  • [25] Analysis of security in cyber-physical systems
    Jie Chen
    Fan Zhang
    Jian Sun
    [J]. Science China Technological Sciences, 2017, 60 : 1975 - 1977
  • [26] Security in the Era of Cyber-Physical Systems of Systems
    Karnouskos, Stamatis
    [J]. ERCIM NEWS, 2014, (97): : 44 - 45
  • [27] Understanding the impact of cyber-physical correlation on security analysis of Cyber-Physical Systems
    Jiang, Luanjuan
    Chen, Xin
    [J]. 2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 529 - 534
  • [28] Pattern-Based Modeling of Cyber-Physical Systems For Analyzing Security
    Maidl, Monika
    Wirtz, Roman
    Zhao, Tiange
    Heisel, Maritta
    Wagner, Marvin
    [J]. PROCEEDINGS OF THE 24TH EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS (EUROPLOP 2019), 2019,
  • [29] On the Security of Cyber-Physical Robotic Systems Using Dynamic Modeling and Simulation
    Hector, Joshua B.
    Katsiaris, Pantelis
    Carey, Nicole E.
    Cote, Nick
    Rawat, Danda B.
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [30] Threat modeling in cyber-physical systems
    Fernandez, Eduardo B.
    [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 448 - 453