A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems
Despite “cyber„ being in the name, cyber–physical systems possess unique characteristics that limit the applicability and suitability of traditional cybersecurity techniques and strategies. Furthermore, vulnerabilities to cyber–physical systems can have signif...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-04-01
|
Series: | Systems |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-8954/7/2/21 |
id |
doaj-cba46d653097410d82c0a39c1075703b |
---|---|
record_format |
Article |
spelling |
doaj-cba46d653097410d82c0a39c1075703b2020-11-24T21:44:27ZengMDPI AGSystems2079-89542019-04-01722110.3390/systems7020021systems7020021A Preliminary Design-Phase Security Methodology for Cyber–Physical SystemsBryan Carter0Stephen Adams1Georgios Bakirtzis2Tim Sherburne3Peter Beling4Barry Horowitz5Cody Fleming6Systems Engineering, University of Virginia, Charlottesville, VA 22904, USASystems Engineering, University of Virginia, Charlottesville, VA 22904, USAComputer Science and Electrical & Computer Engineering, University of Virginia, Charlottesville, VA 22904, USASystems Engineering, University of Virginia, Charlottesville, VA 22904, USASystems Engineering, University of Virginia, Charlottesville, VA 22904, USASystems Engineering, University of Virginia, Charlottesville, VA 22904, USASystems Engineering, University of Virginia, Charlottesville, VA 22904, USADespite “cyber„ being in the name, cyber–physical systems possess unique characteristics that limit the applicability and suitability of traditional cybersecurity techniques and strategies. Furthermore, vulnerabilities to cyber–physical systems can have significant safety implications. The physical and cyber interactions inherent in these systems require that cyber vulnerabilities not only be defended against or prevented, but that the system also be resilient in the face of successful attacks. Given the complex nature of cyber–physical systems, the identification and evaluation of appropriate defense and resiliency strategies must be handled in a targeted and systematic manner. Specifically, what resiliency strategies are appropriate for a given system, where, and which should be implemented given time and/or budget constraints? This paper presents two methodologies: (1) the cyber security requirements methodology and (2) a systems-theoretic, model-based methodology for identifying and prioritizing appropriate resiliency strategies for implementation in a given system and mission. This methodology is demonstrated using a case study based on a hypothetical weapon system. An assessment and comparison of the results from the two methodologies suggest that the techniques presented in this paper can augment and enhance existing systems engineering approaches with model-based evidence.https://www.mdpi.com/2079-8954/7/2/21model-based systems engineeringcyber–physical systemscyber securitysafetyrisk |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Bryan Carter Stephen Adams Georgios Bakirtzis Tim Sherburne Peter Beling Barry Horowitz Cody Fleming |
spellingShingle |
Bryan Carter Stephen Adams Georgios Bakirtzis Tim Sherburne Peter Beling Barry Horowitz Cody Fleming A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems Systems model-based systems engineering cyber–physical systems cyber security safety risk |
author_facet |
Bryan Carter Stephen Adams Georgios Bakirtzis Tim Sherburne Peter Beling Barry Horowitz Cody Fleming |
author_sort |
Bryan Carter |
title |
A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems |
title_short |
A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems |
title_full |
A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems |
title_fullStr |
A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems |
title_full_unstemmed |
A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems |
title_sort |
preliminary design-phase security methodology for cyber–physical systems |
publisher |
MDPI AG |
series |
Systems |
issn |
2079-8954 |
publishDate |
2019-04-01 |
description |
Despite “cyber„ being in the name, cyber–physical systems possess unique characteristics that limit the applicability and suitability of traditional cybersecurity techniques and strategies. Furthermore, vulnerabilities to cyber–physical systems can have significant safety implications. The physical and cyber interactions inherent in these systems require that cyber vulnerabilities not only be defended against or prevented, but that the system also be resilient in the face of successful attacks. Given the complex nature of cyber–physical systems, the identification and evaluation of appropriate defense and resiliency strategies must be handled in a targeted and systematic manner. Specifically, what resiliency strategies are appropriate for a given system, where, and which should be implemented given time and/or budget constraints? This paper presents two methodologies: (1) the cyber security requirements methodology and (2) a systems-theoretic, model-based methodology for identifying and prioritizing appropriate resiliency strategies for implementation in a given system and mission. This methodology is demonstrated using a case study based on a hypothetical weapon system. An assessment and comparison of the results from the two methodologies suggest that the techniques presented in this paper can augment and enhance existing systems engineering approaches with model-based evidence. |
topic |
model-based systems engineering cyber–physical systems cyber security safety risk |
url |
https://www.mdpi.com/2079-8954/7/2/21 |
work_keys_str_mv |
AT bryancarter apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT stephenadams apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT georgiosbakirtzis apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT timsherburne apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT peterbeling apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT barryhorowitz apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT codyfleming apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT bryancarter preliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT stephenadams preliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT georgiosbakirtzis preliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT timsherburne preliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT peterbeling preliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT barryhorowitz preliminarydesignphasesecuritymethodologyforcyberphysicalsystems AT codyfleming preliminarydesignphasesecuritymethodologyforcyberphysicalsystems |
_version_ |
1725910199211917312 |