2011 4th International Symposium on Resilient Control Systems 2011
DOI: 10.1109/isrcs.2011.6016081
|View full text |Cite
|
Sign up to set email alerts
|

A hierarchical security architecture for cyber-physical systems

Abstract: Abstract-Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and comm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
52
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 74 publications
(52 citation statements)
references
References 16 publications
0
52
0
Order By: Relevance
“…The purpose of the cyber-security impact assessment is to identify threats and the consequences of successful attacks so that security managers can prioritize security defense resources [17] . The cyber-security impact assessment can be achieved by the following three steps: asset identification and classification, asset quantization, and dynamic assessment.…”
Section: Cyber-security Impact Assessmentmentioning
confidence: 99%
See 2 more Smart Citations
“…The purpose of the cyber-security impact assessment is to identify threats and the consequences of successful attacks so that security managers can prioritize security defense resources [17] . The cyber-security impact assessment can be achieved by the following three steps: asset identification and classification, asset quantization, and dynamic assessment.…”
Section: Cyber-security Impact Assessmentmentioning
confidence: 99%
“…Ocarina [17] can automatically generate the framework code from the AADL models. This code is then compiled with the AADL runtime and functional source code to create executable binaries.…”
Section: Simulation In the Aadl Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Quanyan Zhu, et al, in [80] adopts a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. …”
Section: Security Architecture and Designmentioning
confidence: 99%
“…It has been pointed out that current research philosophies lack the depth or the focus on the control system application to satisfy many aspects of requirements of resilience, including graceful degradation of hierarchical control while under cyber attack. In [7], a hierarchical viewpoint is used to address security concerns at each level of complex systems. The paper emphasizes a holistic cross-layer philosophy for developing security solutions and provides a game-theoretical approach to model cross-layer security problems in cyberphysical systems.…”
Section: Related Workmentioning
confidence: 99%