2019
DOI: 10.3390/systems7020021
|View full text |Cite
|
Sign up to set email alerts
|

A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems

Abstract: Despite “cyber” being in the name, cyber–physical systems possess unique characteristics that limit the applicability and suitability of traditional cybersecurity techniques and strategies. Furthermore, vulnerabilities to cyber–physical systems can have significant safety implications. The physical and cyber interactions inherent in these systems require that cyber vulnerabilities not only be defended against or prevented, but that the system also be resilient in the face of successful attacks. Given the compl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…Previous work [16] identified a six step approach for engineering in safety, security, and resilience could take the following interaction between model artifacts and teams.…”
Section: Mission Aware Cybersecuritymentioning
confidence: 99%
See 2 more Smart Citations
“…Previous work [16] identified a six step approach for engineering in safety, security, and resilience could take the following interaction between model artifacts and teams.…”
Section: Mission Aware Cybersecuritymentioning
confidence: 99%
“…Step Fig. 2 In mission aware the systems engineering lifecycle is segmented by specific teams that address system design and resilience based on losses related to safety and security (adapted from Carter et al [16])…”
Section: Mission Aware Cybersecuritymentioning
confidence: 99%
See 1 more Smart Citation
“…Mission Aware involves an early systems engineering process that identifies a high-level set of system objectives and unacceptable losses that represents system owners, operators, and other stakeholders. 12,13 Assuming that one has a high-level, comprehensive set of unacceptable outcomes, Mission Aware then involves constructing a model of the system from a control perspective based on the System-Theoretic Accident Model and Processes (STAMP) framework. 14 Specifically, we identify the controllers, the actions available to them, and the way in which those actions potentially lead to mission losses.…”
Section: Systems and Graph Theory For Safety And Securitymentioning
confidence: 99%
“…The pieces of information collected in the STAMP-based analysis are encoded into the system models (Figure 2), which are then used for further analysis and updated iteratively. 12,13 The specification graph (S-graph) combines diverse types of "states," or nodes, to represent the system operating in its mission environment. Valid decision behaviors of the operator, hazardous conditions, and mission outcome nodes are encoded as truth tables, which perform the standard Boolean algebra on critical combinations of states in the system.…”
Section: Systems and Graph Theory For Safety And Securitymentioning
confidence: 99%