2018
DOI: 10.1016/j.ergon.2018.06.008
|View full text |Cite
|
Sign up to set email alerts
|

A simulation platform for human-machine interaction safety analysis of cyber-physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 7 publications
1
10
0
Order By: Relevance
“…Moreover, understanding the safety of the physical system of CPSs is the first step to conduct cybersecurity analysis and verification. Therefore, based on our previous research [31], we generate security constraints based on system safety, and provide run-time monitoring to identify attacks. Our attack scenario generation uses an attack-tree based approach as follows: we design an attack tree template for possible OT-level attacks of CPS, and produce various possible attack scenarios by using our general template of the attack tree.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, understanding the safety of the physical system of CPSs is the first step to conduct cybersecurity analysis and verification. Therefore, based on our previous research [31], we generate security constraints based on system safety, and provide run-time monitoring to identify attacks. Our attack scenario generation uses an attack-tree based approach as follows: we design an attack tree template for possible OT-level attacks of CPS, and produce various possible attack scenarios by using our general template of the attack tree.…”
Section: Related Workmentioning
confidence: 99%
“…To provide the possibility of thoroughly exploring the state space and to find the potential problems that may not be discovered by the simulation itself, a combination of possible attacks and HMI was used in the model checking to explore the human-machine interactions more deeply. The study was based on our previous classification of safety assertions [31,33] and systematically generated a set of security constraints for run-time monitoring, followed by the related security verification using model checking, assuming that the violation of these safety constraints was caused by malicious attacks. In summary, the contribution of this work is to develop a constraint-based model checking approach to CPS security design, verification, and run-time monitoring.…”
Section: Related Workmentioning
confidence: 99%
“…We designed and implemented the PRMWFA-ACPS with Ptolemy, which was developed by Berkeley University in the United States [40]- [41]. We used the role-oriented and model stratification to design the PRMWFA-ACPS, and we applied ports to complete the system construction and data communication.…”
Section: Prmwfa-cps Design In Ptolemymentioning
confidence: 99%
“…In smart manufacturing environment, although many operations are executed automatically, human errors are still of great importance, especially omissions and the incorrect selection of variants. Human failure modes include misuse, false indication, and mode confusion [52]. Based on these modes, a CPS safety analysis and simulation platform called CP-SAP is developed and a cyber-physical human dynamic fault tree is designed in [52].…”
Section: Human Limitation Managementmentioning
confidence: 99%
“…Human failure modes include misuse, false indication, and mode confusion [52]. Based on these modes, a CPS safety analysis and simulation platform called CP-SAP is developed and a cyber-physical human dynamic fault tree is designed in [52]. In order to access human errors, human errors probability (HEP) and human reliability probability (HRP) are proposed as indicators for the relative occurrence of errors and respectively faultless actions [51].…”
Section: Human Limitation Managementmentioning
confidence: 99%