A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems

Despite “cyber„ being in the name, cyber–physical systems possess unique characteristics that limit the applicability and suitability of traditional cybersecurity techniques and strategies. Furthermore, vulnerabilities to cyber–physical systems can have signif...

Full description

Bibliographic Details
Main Authors: Bryan Carter, Stephen Adams, Georgios Bakirtzis, Tim Sherburne, Peter Beling, Barry Horowitz, Cody Fleming
Format: Article
Language:English
Published: MDPI AG 2019-04-01
Series:Systems
Subjects:
Online Access:https://www.mdpi.com/2079-8954/7/2/21
id doaj-cba46d653097410d82c0a39c1075703b
record_format Article
spelling doaj-cba46d653097410d82c0a39c1075703b2020-11-24T21:44:27ZengMDPI AGSystems2079-89542019-04-01722110.3390/systems7020021systems7020021A Preliminary Design-Phase Security Methodology for Cyber–Physical SystemsBryan Carter0Stephen Adams1Georgios Bakirtzis2Tim Sherburne3Peter Beling4Barry Horowitz5Cody Fleming6Systems Engineering, University of Virginia, Charlottesville, VA 22904, USASystems Engineering, University of Virginia, Charlottesville, VA 22904, USAComputer Science and Electrical & Computer Engineering, University of Virginia, Charlottesville, VA 22904, USASystems Engineering, University of Virginia, Charlottesville, VA 22904, USASystems Engineering, University of Virginia, Charlottesville, VA 22904, USASystems Engineering, University of Virginia, Charlottesville, VA 22904, USASystems Engineering, University of Virginia, Charlottesville, VA 22904, USADespite “cyber„ being in the name, cyber–physical systems possess unique characteristics that limit the applicability and suitability of traditional cybersecurity techniques and strategies. Furthermore, vulnerabilities to cyber–physical systems can have significant safety implications. The physical and cyber interactions inherent in these systems require that cyber vulnerabilities not only be defended against or prevented, but that the system also be resilient in the face of successful attacks. Given the complex nature of cyber–physical systems, the identification and evaluation of appropriate defense and resiliency strategies must be handled in a targeted and systematic manner. Specifically, what resiliency strategies are appropriate for a given system, where, and which should be implemented given time and/or budget constraints? This paper presents two methodologies: (1) the cyber security requirements methodology and (2) a systems-theoretic, model-based methodology for identifying and prioritizing appropriate resiliency strategies for implementation in a given system and mission. This methodology is demonstrated using a case study based on a hypothetical weapon system. An assessment and comparison of the results from the two methodologies suggest that the techniques presented in this paper can augment and enhance existing systems engineering approaches with model-based evidence.https://www.mdpi.com/2079-8954/7/2/21model-based systems engineeringcyber–physical systemscyber securitysafetyrisk
collection DOAJ
language English
format Article
sources DOAJ
author Bryan Carter
Stephen Adams
Georgios Bakirtzis
Tim Sherburne
Peter Beling
Barry Horowitz
Cody Fleming
spellingShingle Bryan Carter
Stephen Adams
Georgios Bakirtzis
Tim Sherburne
Peter Beling
Barry Horowitz
Cody Fleming
A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems
Systems
model-based systems engineering
cyber–physical systems
cyber security
safety
risk
author_facet Bryan Carter
Stephen Adams
Georgios Bakirtzis
Tim Sherburne
Peter Beling
Barry Horowitz
Cody Fleming
author_sort Bryan Carter
title A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems
title_short A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems
title_full A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems
title_fullStr A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems
title_full_unstemmed A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems
title_sort preliminary design-phase security methodology for cyber–physical systems
publisher MDPI AG
series Systems
issn 2079-8954
publishDate 2019-04-01
description Despite “cyber„ being in the name, cyber–physical systems possess unique characteristics that limit the applicability and suitability of traditional cybersecurity techniques and strategies. Furthermore, vulnerabilities to cyber–physical systems can have significant safety implications. The physical and cyber interactions inherent in these systems require that cyber vulnerabilities not only be defended against or prevented, but that the system also be resilient in the face of successful attacks. Given the complex nature of cyber–physical systems, the identification and evaluation of appropriate defense and resiliency strategies must be handled in a targeted and systematic manner. Specifically, what resiliency strategies are appropriate for a given system, where, and which should be implemented given time and/or budget constraints? This paper presents two methodologies: (1) the cyber security requirements methodology and (2) a systems-theoretic, model-based methodology for identifying and prioritizing appropriate resiliency strategies for implementation in a given system and mission. This methodology is demonstrated using a case study based on a hypothetical weapon system. An assessment and comparison of the results from the two methodologies suggest that the techniques presented in this paper can augment and enhance existing systems engineering approaches with model-based evidence.
topic model-based systems engineering
cyber–physical systems
cyber security
safety
risk
url https://www.mdpi.com/2079-8954/7/2/21
work_keys_str_mv AT bryancarter apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT stephenadams apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT georgiosbakirtzis apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT timsherburne apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT peterbeling apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT barryhorowitz apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT codyfleming apreliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT bryancarter preliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT stephenadams preliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT georgiosbakirtzis preliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT timsherburne preliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT peterbeling preliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT barryhorowitz preliminarydesignphasesecuritymethodologyforcyberphysicalsystems
AT codyfleming preliminarydesignphasesecuritymethodologyforcyberphysicalsystems
_version_ 1725910199211917312