2019 16th IEEE Annual Consumer Communications &Amp; Networking Conference (CCNC) 2019
DOI: 10.1109/ccnc.2019.8651751
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Security Cost Model for Cyber-Physical Systems

Abstract: In times of Industry 4.0 and cyber-physical systems (CPS) providing security is one of the biggest challenges. A cyber attack launched at a CPS poses a huge threat, since a security incident may affect both the cyber and the physical world. Since CPS are very flexible systems, which are capable of adapting to environmental changes, it is important to keep an overview of the resulting costs of providing security. However, research regarding CPS currently focuses more on engineering secure systems and does not s… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…As resource constraints are often a bottleneck for IIoT systems, it is perhaps surprising that there has not been a lot of work on modeling the overhead these bring. The only such work that was found in the literature is by Ivkic et al [238], and describes an onion layer model that enables one to sum all overhead introduced by security functions.…”
Section: Models and Methodologiesmentioning
confidence: 99%
“…As resource constraints are often a bottleneck for IIoT systems, it is perhaps surprising that there has not been a lot of work on modeling the overhead these bring. The only such work that was found in the literature is by Ivkic et al [238], and describes an onion layer model that enables one to sum all overhead introduced by security functions.…”
Section: Models and Methodologiesmentioning
confidence: 99%
“…The formal description 𝑥 𝑖𝑐 𝑓 𝑚 or 𝑥 𝑖𝑐𝑠𝑚 specifies the normalised measurement result of metric 𝑚 used to measure task 𝑢 or 𝑠 which has been performed by component 𝑐 that participated in interaction 𝑖. Thus, this is an extension of the Onion Layer Model in [27,28] to enable aggregating these measurement results with different units by normalising them to a generic Cost Unit.…”
Section: Onion Layer Modelmentioning
confidence: 99%
“…The Onion Layer Model from from Ivkic et al (2019), as shown in Figure 2, can be used to describe security costs that occur each time an interaction is executed. In this context, an interaction is defined as a unit of work, which is executed at a specific time, serves a specific purpose and can be treated in an coherent and reliable way independent of other interactions.…”
Section: Security Cost Modeling Frameworkmentioning
confidence: 99%
“…This paper builds on Ivkic et al (2019) where we introduce an Onion Layer Model for formally describing how the costs of security can be modelled within a CPS. This initial investigation included a mathematical expression for describing the costs of security during the interaction of components and their performed security-related tasks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation