A six-step model for safety and security analysis of cyber-physical systems

G. Sabaliauskaite, S. Adepu, A. Mathur

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

10 Citations (Scopus)

Abstract

A Six-Step Model (SSM) is proposed for modeling and analysis of Cyber-Physical System (CPS) safety and security. SSM incorporates six dimensions (hierarchies) of a CPS, namely, functions, structure, failures, safety countermeasures, cyber-attacks, and security countermeasures. The inter-dependencies between these dimensions are defined using a set of relationship matrices. SSM enables comprehensive analysis of CPS safety and security, as it uses system functions and structure as a knowledge-base for understanding what effect the failures, cyber-attacks, and selected safety and security countermeasures might have on the system. A water treatment system is used as an example to illustrate how the proposed model could serve as a useful tool in the safety and security modeling and analysis of critical infrastructures.
Original languageEnglish
Title of host publicationCritical Information Infrastructures Security
PublisherSpringer, Cham
Pages189-200
Number of pages12
ISBN (Electronic)978-3-319-71368-7
ISBN (Print)978-3-319-71367-0
DOIs
Publication statusPublished - 22 Nov 2017
Externally publishedYes
Event11th International Conference on Critical Information Infrastructures Security 2016 - Paris, France
Duration: 10 Oct 201612 Oct 2016

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
ISSN (Print)0302-9743

Conference

Conference11th International Conference on Critical Information Infrastructures Security 2016
Abbreviated titleCRITIS2016
Country/TerritoryFrance
CityParis
Period10/10/1612/10/16

Keywords

  • Cyber-Physical Systems
  • Failures
  • Safety
  • Cyber-attacks
  • Security
  • GTST-MLD
  • 3-Step Model

Fingerprint

Dive into the research topics of 'A six-step model for safety and security analysis of cyber-physical systems'. Together they form a unique fingerprint.

Cite this