Systems-theoretic security requirements modeling for cyber-physical systems

被引:3
|
作者
Carter, Bryan T. [1 ]
Bakirtzis, Georgios [2 ]
Elks, Carl R. [3 ]
Fleming, Cody H. [1 ,4 ]
机构
[1] Univ Virginia, Syst Engn, Charlottesville, VA USA
[2] Univ Virginia, Comp Sci & Elect & Comp Engn, Charlottesville, VA USA
[3] Virginia Commonwealth Univ, Elect & Comp Engn, Richmond, VA USA
[4] Univ Virginia, Mech & Aerosp Engn, Charlottesville, VA 22904 USA
关键词
cybersecurity; cyber-physical system; security analysis; SysML; system modeling; SAFETY;
D O I
10.1002/sys.21504
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cyber-physical systems (CPS) present a unique modeling challenge due to their numerous heterogeneous components, complex physical interactions, and disjoint communication networks. Modeling CPS to aid security analysis further adds to these challenges, because securing CPS requires not only understanding of the system architecture, but also the system's role within its broader expected service. This is due to the infeasibility of completely securing every single component, network, and part within a CPS. As such it is necessary to be cognizant of the system's expected service, or mission, so that the effects of an exploit can be mitigated and the system can perform its mission at least in a partially degraded manner-in other words, a mission-aware approach to security. As such, a security analysis methodology based on this philosophy is greatly aided by the creation of a model that combines system architecture information, its admissible behaviors, and its mission context. This paper presents a technique for creating such a model using the Systems Modeling Language.
引用
收藏
页码:411 / 421
页数:11
相关论文
共 50 条
  • [1] Modeling security in cyber-physical systems
    Burmester, Mike
    Magkos, Ernmanouil
    Chrissikopoulos, Vassilis
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (3-4) : 118 - 126
  • [2] Modeling and Specifying Requirements for Cyber-Physical Systems
    Ordinez, L.
    Alimenti, O.
    Rinland, E.
    Gomez, M.
    Marchetti, J.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2013, 11 (01) : 625 - 632
  • [3] Modeling and Requirements on the Physical Side of Cyber-Physical Systems
    Heimdahl, Mats P. E.
    Duan, Lian
    Murugesan, Anitha
    Rayadurgam, Sanjai
    [J]. 2013 2ND INTERNATIONAL WORKSHOP ON THE TWIN PEAKS OF REQUIREMENTS AND ARCHITECTURE (TWINPEAKS), 2013, : 1 - 7
  • [4] Security Requirements Engineering: A Framework for Cyber-Physical Systems
    Rehman, Shafiq Ur
    Allgaier, Christopher
    Gruhn, Volker
    [J]. 2018 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2018), 2018, : 315 - 320
  • [5] A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems
    Span, Martin Trae
    Mailloux, Logan O.
    Grimaila, Michael R.
    Young, William Bill
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2018,
  • [6] On modeling of electrical cyber-physical systems considering cyber security
    Wang, Yi-nan
    Lin, Zhi-yun
    Liang, Xiao
    Xu, Wen-yuan
    Yang, Qiang
    Yan, Gang-feng
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2016, 17 (05) : 465 - 478
  • [7] On modeling of electrical cyber-physical systems considering cyber security
    Yi-nan WANG
    Zhi-yun LIN
    Xiao LIANG
    Wen-yuan XU
    Qiang YANG
    Gang-feng YAN
    [J]. Frontiers of Information Technology & Electronic Engineering, 2016, 17 (05) : 465 - 478
  • [8] On modeling of electrical cyber-physical systems considering cyber security
    Yi-nan Wang
    Zhi-yun Lin
    Xiao Liang
    Wen-yuan Xu
    Qiang Yang
    Gang-feng Yan
    [J]. Frontiers of Information Technology & Electronic Engineering, 2016, 17 : 465 - 478
  • [9] Cyber-Physical Systems - Security
    Zseby, T.
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2018, 135 (03): : 249 - 249
  • [10] Security in Cyber-Physical Systems
    Dsouza, Joanita
    Elezabeth, Laura
    Mishra, Ved Prakash
    Jain, Rachna
    [J]. PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 840 - 844