Analyzing Cyber Security Threats on Cyber-Physical Systems using Model-Based Systems Engineering

Author(s):  
Aleksandr A. Kerzhner ◽  
Kymie Tan ◽  
Elyse Fosse
Systems ◽  
2019 ◽  
Vol 7 (2) ◽  
pp. 21 ◽  
Author(s):  
Bryan Carter ◽  
Stephen Adams ◽  
Georgios Bakirtzis ◽  
Tim Sherburne ◽  
Peter Beling ◽  
...  

Despite “cyber” being in the name, cyber–physical systems possess unique characteristics that limit the applicability and suitability of traditional cybersecurity techniques and strategies. Furthermore, vulnerabilities to cyber–physical systems can have significant safety implications. The physical and cyber interactions inherent in these systems require that cyber vulnerabilities not only be defended against or prevented, but that the system also be resilient in the face of successful attacks. Given the complex nature of cyber–physical systems, the identification and evaluation of appropriate defense and resiliency strategies must be handled in a targeted and systematic manner. Specifically, what resiliency strategies are appropriate for a given system, where, and which should be implemented given time and/or budget constraints? This paper presents two methodologies: (1) the cyber security requirements methodology and (2) a systems-theoretic, model-based methodology for identifying and prioritizing appropriate resiliency strategies for implementation in a given system and mission. This methodology is demonstrated using a case study based on a hypothetical weapon system. An assessment and comparison of the results from the two methodologies suggest that the techniques presented in this paper can augment and enhance existing systems engineering approaches with model-based evidence.


2015 ◽  
Vol 76 (4) ◽  
Author(s):  
Daniel Kliewe ◽  
Lydia Kaiser ◽  
Roman Dumitrescu ◽  
Jürgen Gausemeier

This paper will improve the system protection for Cyber-Physical Systems (CPS) by the use of the specification technique CONSENS. Therefore an approach is demonstrated and validated. The possibilities how the system protection can be integrated in Model-Based Systems Engineering (MBSE) and especially in CONSENS are shown and discussed. First results how the different views on the system can be used to identify components worth protecting of CPS are presented. The identified components are of crucial importance in order to ensure the protection of CPS.


2016 ◽  
Vol 26 (1) ◽  
pp. 817-832 ◽  
Author(s):  
John Fitzgerald ◽  
Carl Gamble ◽  
Richard Payne ◽  
Peter Gorm Larsen ◽  
Stylianos Basagiannis ◽  
...  

2020 ◽  
Vol 1 ◽  
pp. 197-206
Author(s):  
S. Japs ◽  
L. Kaiser ◽  
A. Kharatyan

AbstractThe development of cyber-physical systems requires close cooperation between stakeholders from different disciplines. Model-based systems engineering support this by the design of a system model. Non-identified domain knowledge by the stakeholders is a challenge when creating the system model. The CONSENS 3D-Modeling Method supports the domain-independent elicitation of domain knowledge using a 3D environment and enables the derivation of a SysML system model. We applyed the method by implementing a prototype, called 3D Engineer, to an application example from the automotive industry.


2017 ◽  
Vol 139 (03) ◽  
pp. S3-S8 ◽  
Author(s):  
Edwin Zivi

This article discusses various aspects of a course on cyber-physical systems (CPS) in the educational programs of defense organizations. CPS are engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components. The article also highlights various objectives of the CPS course. A central challenge to deploying resilient CPSs involves the appreciation for the multi-disciplinary challenges and the lack of a unified framework for CPS analysis, design and implementation. A significant part of the course focuses on a case study in industrial control of a Vinyl Acetate (VAc) chemical plant. The course described herein presents fundamental concepts within the rapidly expanding field of CPS and has been tailored to and is well received by U.S. Naval Academy Systems Engineering senior level engineering students. The U.S. Naval Academy thrust in cyber security studies includes a new major, Cyber Sciences, and construction of a new facility, Hopper Hall, to house the assembled multi-disciplinary teaching and research team.


2021 ◽  
Vol 9 (12) ◽  
pp. 1384
Author(s):  
Iosif Progoulakis ◽  
Paul Rohmeyer ◽  
Nikitas Nikitakos

The integration of IT, OT, and human factor elements in maritime assets is critical for their efficient and safe operation and performance. This integration defines cyber physical systems and involves a number of IT and OT components, systems, and functions that involve multiple and diverse communication paths that are technologically and operationally evolving along with credible cyber security threats. These cyber security threats and risks as well as a number of known security breach scenarios are described in this paper to highlight the evolution of cyber physical systems in the maritime domain and their emerging cyber vulnerabilities. Current industry and governmental standards and directives related to cyber security in the maritime domain attempt to enforce the regulatory compliance and reinforce asset cyber security integrity for optimum and safe performance with limited focus, however, in the existing OT infrastructure and systems. The use of outside-of-the-maritime industry security risk assessment tools and processes, such the API STD 780 Security Risk Assessment (SRA) and the Bow Tie Analysis methodologies, can assist the asset owner to assess its IT and OT infrastructure for cyber and physical security vulnerabilities and allocate proper mitigation measures assuming their similarities to ICS infrastructure. The application of cyber security controls deriving from the adaptation of the NIST CSF and the MITRE ATT&CK Threat Model can further increase the cyber security integrity of maritime assets, assuming they are periodically evaluated for their effectiveness and applicability. Finally, the improvement in communication among stakeholders, the increase in operational and technical cyber and physical security resiliency, and the increase in operational cyber security awareness would be further increased for maritime assets by the convergence of the distinct physical and cyber security functions as well as onshore- and offshore-based cyber infrastructure of maritime companies and asset owners.


Electronics ◽  
2021 ◽  
Vol 10 (8) ◽  
pp. 983
Author(s):  
Alachew Mengist ◽  
Lena Buffoni ◽  
Adrian Pop

In the field of model-based design of Cyber–Physical Systems (CPS), seamless traceability of the process, from requirements to models to simulation results, is becoming increasingly important. It can be used to support several activities such as variant handling, impact analysis, component reuse, software maintenance and evolution, verification, and validation. Despite the fact that the relevance of traceability in the model-based design of CPSs is well known, current tools that support traceability management are inadequate in practice. The lack of comprehensive whole-lifecycle systems engineering support in a single tool is one of the main causes of such ineffective traceability management, where traceability relationships between artifacts are still manually generated and maintained. This paper aims at presenting an approach and a prototype for automatically generating and maintaining the appropriate traceability links between heterogeneous artifacts ranging from requirement models, through design models, down to simulation and verification results throughout the product life cycle in model-based design of CPSs. A use case study is presented to validate and illustrate the proposed method and prototype.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document