Engineering cybersecurity in cyber physical systems

نویسندگان

  • Hausi A. Müller
  • Marin Litoiu
  • John Mylopoulos
چکیده

Advances in the interconnected capabilities of cyber physical systems (CPS) affect virtually every engineered system. Today, software approaches dominate all aspects of connecting the physical and cyber worlds in part due to the convergence of computing, control and communications software technologies. Unfortunately, software technologies are more vulnerable to cybersecurity problems than traditional hardware solutions. This workshop aims to develop a research agenda for engineering cybersecurity into cyber physical systems (CPS) through designtime requirements engineering, continuous assurance at runtime, and cognitive security analytics. CPS are distributed, software-intensive smart systems that control tightly integrated computational and physical components. A combination of design-time and runtime techniques are needed to support reasoning about cybersecurity. We advocate a holistic requirements engineering approach, continuous validation with feedback loops supported by models at runtime and networked control, and cognitive security analytics using Watson. CCS Concepts • Software and its engineering➝Software organization and properties➝Software system structures • Security and privacy➝Software and application security➝Software security engineering

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cybersecurity@PNNL and BioSENSE: Biologically-inspired Secure Elastic Networked Sensor Environment Speaker Bio

Speaker Bio Mohamed Eltoweissy is Chief Scientist for Cyber Security Research at the Pacific Northwest National Laboratory. He is also Affiliate Professor in The Bradley Department of Electrical and Computer Engineering at Virginia Tech and The Electrical and Computer Engineering Department at the University of Arizona. Eltoweissy's current research interests crosscuts the areas of cyber resili...

متن کامل

Critical review of cybersecurity protection procedures and practice in water distribution systems

The objective of this paper is to conduct a critical review of cybersecurity procedures and practices in the water distribution sector. Specifically, this paper provides a characterization of the current state of cybersecurity practice and risk management in drinking water systems. This characterization is critically important due to the number of cyber attacks that have occurred against water ...

متن کامل

Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective

Urban railway systems are increasingly relying on information and communications technologies (ICT). This evolution makes cybersecurity an important concern, in addition to the traditional focus on reliability, availability, maintainability and safety. In this paper, we examine two examples of cyberintensive systems in urban railway environments—a communications-based train control system, and ...

متن کامل

Cyber Physical Security for Industrial Control Systems and IoT

Cyber-attacks and cybersecurity used to be the issues for those who use Internet and computers. The issues, however, are expanding to anyone who does not even use them directly. The society is gradually and heavily depending on networks and computers. They are not closed within a cyberspace anymore and having interaction with our real world with sensors and actuators. Such systems are known as ...

متن کامل

STPA-SafeSec: Safety and security analysis for cyber-physical systems

Cyber-physical systems tightly integrate physical processes and information and communication technologies. As today’s critical infrastructures, e.g., the power grid or water distribution networks, are complex cyber-physical systems, ensuring their safety and security becomes of paramount importance.Traditional safety analysis methods, such as HAZOP, are ill-suited to assess these systems. Furt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016