scholarly journals Modeling of storage processes using Petri nets

2020 ◽  
Vol 175 ◽  
pp. 05038
Author(s):  
Marina Ganzhur ◽  
Nikita Dyachenko ◽  
Andrey Gazizov ◽  
Arthur Otakulov ◽  
Dmitry Romanov

Cyber-physical systems are actively explored in the global and domestic scientific community. It is expected that cyber-physical systems will minimize human participation in the production process, as well as in many other areas of society. At the same time, the information security aspect of the interaction of elements remains insufficiently studied. The classical approach to ensuring security is aimed at counteracting a clear destructive information impact - when information security breaches have obvious signs. The risk of failure of one object of the system can lead to critical conditions. Safety modeling of managerial structures is reduced to considering the operability of the functions of the intermediate link and the interaction between objects that make decisions on the management and generating teams. By analyzing these transitions in limiting cases, it allows the use of analysis and synthesis approaches based on structural schemes and logical relationships.

Information security can be efficiently provided by the sound structured information and a set of specialized experts in the field of IT and CPS. The interconnection among the systems in the CPS imposes a new challenge in providing security to CPS. A concise study of CPS security is given in this chapter. The problem of secure control systems is also indentified and defined. The way the information security and control theory guards the system is explored. The security of CPSs can be enhanced using a particular set of challenges, which are also described later in this chapter. The resistance to malicious events is strengthening as cyber physical systems are part of critical structures. The CPSs are time sensitive in nature, unlike the distributed system where a little amount of delay is acceptable.


2021 ◽  
Vol 15 ◽  
Author(s):  
Khalida Douibi ◽  
Solène Le Bars ◽  
Alice Lemontey ◽  
Lipsa Nag ◽  
Rodrigo Balp ◽  
...  

In the last few decades, Brain-Computer Interface (BCI) research has focused predominantly on clinical applications, notably to enable severely disabled people to interact with the environment. However, recent studies rely mostly on the use of non-invasive electroencephalographic (EEG) devices, suggesting that BCI might be ready to be used outside laboratories. In particular, Industry 4.0 is a rapidly evolving sector that aims to restructure traditional methods by deploying digital tools and cyber-physical systems. BCI-based solutions are attracting increasing attention in this field to support industrial performance by optimizing the cognitive load of industrial operators, facilitating human-robot interactions, and make operations in critical conditions more secure. Although these advancements seem promising, numerous aspects must be considered before developing any operational solutions. Indeed, the development of novel applications outside optimal laboratory conditions raises many challenges. In the current study, we carried out a detailed literature review to investigate the main challenges and present criteria relevant to the future deployment of BCI applications for Industry 4.0.


2021 ◽  
Vol 16 (92) ◽  
pp. 72-81
Author(s):  
Emil A. Gumerov ◽  
◽  
Tamara V. Alekseeva ◽  

Cyber-physical systems are a means of effectively managing industrial applications of the Internet of things. Physical layer cyber-physical system implements the control devices of the industrial Internet of things and intelligent algorithms digital system level provide management and information security applications. Effective management and information security determine the success of the industrial Internet of things, so the research topic is relevant. The purpose of this article is to develop an optimal architecture of a cyber-physical system based on the principles of data processing at the place of their occurrence and the application of a control action at the place of the problem occurrence. The authors were faced with the task of exploring all the possibilities associated with the application of the proposed principles and developing an optimal application architecture for the industrial Internet of things. In the study proposed the concept of intelligent application of industrial Internet of things, which enables processing of continuously generated data in their source and provides application control action to the location of the problem. The proposed solution: a) increases the information security of the industrial application of the Internet of things (data is not transmitted over the network) and b) prevents an attack on the software of the Industrial application of the Internet of things. The solution can be used by developers of industrial IoT systems to effectively launch and implement projects


2019 ◽  
Vol 76 (4) ◽  
pp. 2643-2664 ◽  
Author(s):  
Steven Walker-Roberts ◽  
Mohammad Hammoudeh ◽  
Omar Aldabbas ◽  
Mehmet Aydin ◽  
Ali Dehghantanha

Abstract Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were made possible by higher integration of physical and digital elements. In today’s pervasive cyber-physical systems, connecting more devices introduces new vulnerabilities and security threats. With increasing cybersecurity incidents, cybersecurity professionals are becoming incapable of addressing what has become the greatest threat climate than ever before. This research investigates the spectrum of risk of a cybersecurity incident taking place in the cyber-physical-enabled world using the VERIS Community Database. The findings were that the majority of known actors were from the US and Russia, most victims were from western states and geographic origin tended to reflect global affairs. The most commonly targeted asset was information, with the majority of attack modes relying on privilege abuse. The key feature observed was extensive internal security breaches, most often a result of human error. This tends to show that access in any form appears to be the source of vulnerability rather than incident specifics due to a fundamental trade-off between usability and security in the design of computer systems. This provides fundamental evidence of the need for a major reevaluation of the founding principles in cybersecurity.


Systems ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 18
Author(s):  
Baoluo Meng ◽  
Daniel Larraz ◽  
Kit Siu ◽  
Abha Moitra ◽  
John Interrante ◽  
...  

The ever-increasing complexity of cyber-physical systems is driving the need for assurance of critical infrastructure and embedded systems. However, traditional methods to secure cyber-physical systems—e.g., using cyber best practices, adapting mechanisms from information technology systems, and penetration testing followed by patching—are becoming ineffective. This paper describes, in detail, Verification Evidence and Resilient Design In anticipation of Cybersecurity Threats (VERDICT), a language and framework to address cyber resiliency. When we use the term resiliency, we mean hardening a system such that it anticipates and withstands attacks. VERDICT analyzes a system in the face of cyber threats and recommends design improvements that can be applied early in the system engineering process. This is done in two steps: (1) Analyzing at the system architectural level, with respect to cyber and safety requirements and (2) by analyzing at the component behavioral level, with respect to a set of cyber-resiliency properties. The framework consists of three parts: (1) Model-Based Architectural Analysis and Synthesis (MBAAS); (2) Assurance Case Fragments Generation (ACFG); and (3) Cyber Resiliency Verifier (CRV). The VERDICT language is an Architecture Analysis and Design Language (AADL) annex for modeling the safety and security aspects of a system’s architecture. MBAAS performs probabilistic analyses, suggests defenses to mitigate attacks, and generates attack-defense trees and fault trees as evidence of resiliency and safety. It can also synthesize optimal defense solutions—with respect to implementation costs. In addition, ACFG assembles MBAAS evidence into goal structuring notation for certification purposes. CRV analyzes behavioral aspects of the system (i.e., the design model)—modeled using the Assume-Guarantee Reasoning Environment (AGREE) annex and checked against cyber resiliency properties using the Kind 2 model checker. When a property is proved or disproved, a minimal set of vital system components responsible for the proof/disproof are identified. CRV also provides rich and localized diagnostics so the user can quickly identify problems and fix the design model. This paper describes the VERDICT language and each part of the framework in detail and includes a case study to demonstrate the effectiveness of VERDICT—in this case, a delivery drone.


Sign in / Sign up

Export Citation Format

Share Document