2015
DOI: 10.14236/ewic/ics2015.4
|View full text |Cite
|
Sign up to set email alerts
|

A Model-based Approach to Interdependency between Safety and Security in ICS

Abstract: Wide use of modern ICT technologies brings not only communication efficiency, but also security vulnerabilities into industrial control systems. Traditional physically-isolated systems are now required to take cyber security into consideration, which might also lead to system failures. However, integrating security and safety analysis has always been a challenging issue and the various interdependencies between them make it even more difficult, because they might mutually enhance, or undermine. The paper propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Fifteen studies 23–37 out of those 51 were focusing exclusively on requirements modeling of such systems. Thirty‐one studies 38–68 were focusing on both requirements modeling and analysis. A few studies were either focusing solely on requirements analysis 69–72 or requirements traceability 73 …”
Section: Mapping Study Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Fifteen studies 23–37 out of those 51 were focusing exclusively on requirements modeling of such systems. Thirty‐one studies 38–68 were focusing on both requirements modeling and analysis. A few studies were either focusing solely on requirements analysis 69–72 or requirements traceability 73 …”
Section: Mapping Study Resultsmentioning
confidence: 99%
“…However, an interesting point to note is that all these publications stemmed from a single group applying a particular method: Abstract State Machines. Pipeline systems, on the other hand, were mainly dealing with the oil industry 46,49,88,95,96 . The use of power grid systems has been mentioned in previous studies 69,83,104,120,126 …”
Section: Mapping Study Resultsmentioning
confidence: 99%
“…(ii) more advanced attacker models or attacking heuristics are needed to select the next weakness to exploit. (iii) as addressed in [13], security controls might have potential negative sideeffects to the other important criteria of ICS, such as safety, performance and availability. We will look for possible extensions to model those criteria into the simulation.…”
Section: Discussionmentioning
confidence: 99%
“…Requirement nodes capture safety-related objectives, which are used to evaluate the impact of cyber attacks on the system safety. Detailed modelling and reasoning about these requirements can be found in [13]. Definition 2.…”
Section: Modelling and Problem Representationmentioning
confidence: 99%
See 1 more Smart Citation