2018 13th Annual Conference on System of Systems Engineering (SoSE) 2018
DOI: 10.1109/sysose.2018.8428776
|View full text |Cite
|
Sign up to set email alerts
|

Extending a Multi-Agent Systems Simulation Architecture for Systems-of-Systems Security Analysis

Abstract: Security is an important concern for softwareintensive Systems-of-Systems (SoS). Architectural analysis for SoS secturity assessment should be performed at early stages of development. Such activity could prevent vulnerabilities and avoid potential cascading attack emergent behaviors, i.e., a succession of security vulnerabilities that emerge from individual constituents security fragilities, potentially causing interruption and collapse of SoS operation. Model simulation can prevent these issues by predicting… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…For example, [91] reviews agent-based cloud computing, [92] and [93] review the agent-based internet of things and cyber-physical systems and [94] reviews the applications of MAS in digital factories. By reviewing some of the applications proposed in the literature for MAS in these emerging technologies, one can con¯rm the vast potential of future work, such as smart vehicles and tra±c control systems [95][96][97][98], personalized medicine and healthcare systems [99][100][101], security and safety [102,103] and smart manufacturing [104,105]. This coupling can be attributed to the unique characteristics considered for agents and their capabilities for interaction.…”
Section: Discussionmentioning
confidence: 99%
“…For example, [91] reviews agent-based cloud computing, [92] and [93] review the agent-based internet of things and cyber-physical systems and [94] reviews the applications of MAS in digital factories. By reviewing some of the applications proposed in the literature for MAS in these emerging technologies, one can con¯rm the vast potential of future work, such as smart vehicles and tra±c control systems [95][96][97][98], personalized medicine and healthcare systems [99][100][101], security and safety [102,103] and smart manufacturing [104,105]. This coupling can be attributed to the unique characteristics considered for agents and their capabilities for interaction.…”
Section: Discussionmentioning
confidence: 99%
“…Security, addressed in four studies, is associated with the prevention of cascading attacks, deined as a succession of security vulnerabilities from fragilities in the interconnection among constituents of an SoS, which potentially cause interruption and collapse of its operations [55]. Therefore, the main concerns regarding SoS security are the avoidance of attack propagation and protection to both information and data of constituents from an unauthorized access.…”
Section: Rq2: Which Are the Quality Atributes Commonly Considered In ...mentioning
confidence: 99%
“…The results of both scoring criteria were merged and all papers with an aggregated score of at least 6 were included in the literature list. Complementing this list with our previous two articles [ 19 , 20 ] and four manually added papers [ 64 , 65 , 66 , 67 ], resulted into a total of 46 papers [ 19 , 20 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , 71 , 72 , 73 , 74 , 75 , 76 , 77 , 78 , 79 , 80 , 81 , 82 , 83 , 84 , 85 , 86 , 87 , 88 , 89 , 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 , 98 , 99 , 100 , 101 , 102 , 103 , 104 , 105 , 106 ,…”
Section: Requirements For the Enterprise Architecturementioning
confidence: 99%
“…Nevertheless, a total of 26 ( ) papers concerned either an ongoing study or a complete study, which implies that there is some mature basis from whereon we can build further. Furthermore, it is interesting that several papers [ 19 , 20 , 77 , 78 , 79 , 86 , 93 , 95 , 96 ] use agent-based modeling techniques to support their work.…”
Section: Requirements For the Enterprise Architecturementioning
confidence: 99%