Guiding the selection of security patterns for real-time systems

被引:0
|
作者
Motii, Anas [1 ]
Hamid, Brahim [2 ]
Lanusse, Agnes [1 ]
Bruel, Jean-Michel [2 ]
机构
[1] CEA, LIST, Lab Model Driven Engn Embedded Syst, PC 174, F-91191 Gif Sur Yvette, France
[2] Univ Toulouse, IRIT, 118 Route Narbonne, F-31062 Toulouse 9, France
关键词
Real-time; Security patterns; Schedulability analysis; Model-Driven Engineering (MDE);
D O I
10.1109/ICECCS.2016.27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing critical systems such as Cyber-Physical Systems (CPS) is an important feature especially when it comes to critical transmitted data in a real-time environment. At the same time, the implementation of security counter-measures in such systems may impact transmission delays of critical tasks. For this reason selecting proper security mechanisms in such critical systems is an important issue. In this context, we propose a model-based approach for selecting proper security solution alternatives composed of security patterns at early design stage against real-time requirements. We provide a generalizable and tool-supported solution to support the approach using UML and its profiles. A validation of the work is presented via a simplified version of SCADA (Supervisory Control and Data Acquisition) system case study.
引用
收藏
页码:155 / 164
页数:10
相关论文
共 50 条
  • [41] A Systematic Security Analysis of Real-Time Cyber-Physical Systems
    Easwaran, Arvind
    Chattopadhyay, Anupam
    Bhasin, Shivam
    2017 22ND ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2017, : 206 - 213
  • [42] Issues and approaches to supporting timeliness and security in real-time database systems
    Son, SH
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (04) : 397 - 410
  • [43] Challenges and Prospects of Communication Security in Real-Time Ethernet Automation Systems
    Mueller, Thomas
    Walz, Andreas
    Kiefer, Manuel
    Doran, Hans Dermot
    Sikora, Axel
    2018 14TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS (WFCS 2018), 2018,
  • [44] Distance Bounding: A Practical Security Solution for Real-Time Location Systems
    Abu-Mahfouz, Adnan
    Hancke, Gerhard P.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) : 16 - 27
  • [45] REAL-TIME SYSTEMS
    KARJALAINEN, J
    MICROPROCESSING AND MICROPROGRAMMING, 1993, 38 (1-5): : 475 - 476
  • [46] LARGE SCALE, REAL-TIME SYSTEMS SECURITY ANALYSIS IN HIGHER EDUCATION
    Sheen, Jordan
    Rowe, Dale C.
    Helps, Richard G.
    2012 ASEE ANNUAL CONFERENCE, 2012,
  • [47] Period Adaptation for Continuous Security Monitoring in Multicore Real-Time Systems
    Hasan, Monowar
    Mohan, Sibin
    Pellizzoni, Rodolfo
    Bobba, Rakesh B.
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 430 - 435
  • [48] A parallel complete method for real-time security analysis in power systems
    Mendes, JC
    Saavedra, OR
    Feitosa, SA
    ELECTRIC POWER SYSTEMS RESEARCH, 2000, 56 (01) : 27 - 34
  • [49] Real-time systems
    Wedde, HF
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (04) : 303 - 304
  • [50] Real-time systems
    Abdelzaher, T
    Sharp, D
    REAL-TIME SYSTEMS, 2005, 29 (2-3) : 99 - 99