scholarly journals Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Security Analysis

Author(s):  
Tope Omitola ◽  
Abdolbaghi Rezazadeh ◽  
Michael Butler
2021 ◽  
Vol 13 (2) ◽  
pp. 32-39
Author(s):  
George Matta ◽  
Sebastian Chlup ◽  
Abdelkader Magdy Shaaban ◽  
Christoph Schmittner ◽  
Andreas Pinzenöhler ◽  
...  

The Internet of Things (IoT) and cloud technologies are increasingly implemented in the form of Cyber-Physical Systems of Systems (CPSoS) for the railway sector. In order to satisfy the security requirements of Cyber-Physical Systems (CPS), domainspecific risk identification assessment procedures have been developed. Threat modelling is one of the most commonly used methods for threat identification for the security analysis of CPSoS and is capable of targeting various domains. This paper reports our experience of using a risk management framework identify the most critical security vulnerabilities in CPSoS in the domain and shows the broader impact this work can have on the domain of safety and security management. Moreover, we emphasize the application of common analytical methods for cyber-security based on international industry standards to identify the most vulnerable assets. These will be applied to a meta-model for automated railway systems in the concept phase to support the development and deployment of these systems. Furthermore, it is the first step to create a secure and standard complaint system by design.


2019 ◽  
Vol 23 (2) ◽  
pp. 189-210 ◽  
Author(s):  
Nelson H. Carreras Guzman ◽  
Morten Wied ◽  
Igor Kozine ◽  
Mary Ann Lundteigen

Logistics ◽  
2018 ◽  
Vol 2 (4) ◽  
pp. 23
Author(s):  
Cyril Alias ◽  
Frank Alarcón Olalla ◽  
Hauke Iwersen ◽  
Julius Ollesch ◽  
Bernd Noche

In the course of the ongoing era of digitization, cyber-physical systems and complex event processing belong to the most discussed technologies nowadays. The huge challenge that digitization is forming to the transportation and logistics sector is largely accepted by the responsible organizations. Despite initial steps being taken towards digitized value-creation, many professionals wonder about how to realize the ideas and stumble with the precise steps to be taken. With the vision of smart logistics in mind and cost-efficient technologies available, they require a systematic methodology to exploit the potentials accompanying digitization. With the help of an effective and targeted workshop procedure, potentially appropriate application areas with promising benefit potentials can be identified effectively. Such a workshop procedure needs to be a stepwise approach in order to carefully consider all the relevant aspects and to allow for organizational acceptance to grow. In three real-world use case examples from different areas of the transportation and logistics industry, promising applications of cyber-physical systems and complex event processing are identified and pertaining event patterns of critical situations developed in order to make realization easier at a later stage. Each use case example exhibits a frequently occurring problem that can be effectively addressed by using the above-mentioned technology.


2012 ◽  
Vol 7 (5) ◽  
pp. 255-265
Author(s):  
Soo-Youl Park ◽  
Wook-Jin Choi ◽  
Bo-Heung Chung ◽  
Jeong-Nyeo Kim ◽  
Joo-Man Kim

2015 ◽  
Vol 2015 ◽  
pp. 1-12
Author(s):  
Siyu Lin ◽  
Hao Wu

Cyber-physical systems (CPSs) connect with the physical world via communication networks, which significantly increases security risks of CPSs. To secure the sensitive data, secure forwarding is an essential component of CPSs. However, CPSs require high dimensional multiattribute and multilevel security requirements due to the significantly increased system scale and diversity, and hence impose high demand on the secure forwarding information query and storage. To tackle these challenges, we propose a practical secure data forwarding scheme for CPSs. Considering the limited storage capability and computational power of entities, we adopt bloom filter to store the secure forwarding information for each entity, which can achieve well balance between the storage consumption and query delay. Furthermore, a novel link-based bloom filter construction method is designed to reduce false positive rate during bloom filter construction. Finally, the effects of false positive rate on the performance of bloom filter-based secure forwarding with different routing policies are discussed.


Author(s):  
Georgios Kalogeras ◽  
Christos Anagnostopoulos ◽  
Christos Alexakos ◽  
Athanasios Kalogeras ◽  
Georgios Mylonas

Sign in / Sign up

Export Citation Format

Share Document