2012
DOI: 10.1016/j.ijcip.2012.08.002
|View full text |Cite
|
Sign up to set email alerts
|

Modeling security in cyber–physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 81 publications
(43 citation statements)
references
References 47 publications
0
42
0
1
Order By: Relevance
“…After the solution is found, the privilege of creating a new block is guaranteed and a bitcoin is rewarded. 4 Transmit the verification results. The node that computes the solution firstly receives the bitcoin from the system and this piece of information is broadcast to all the nodes through the Internet.…”
Section: The Working Principle Of a Blockchainmentioning
confidence: 99%
See 1 more Smart Citation
“…After the solution is found, the privilege of creating a new block is guaranteed and a bitcoin is rewarded. 4 Transmit the verification results. The node that computes the solution firstly receives the bitcoin from the system and this piece of information is broadcast to all the nodes through the Internet.…”
Section: The Working Principle Of a Blockchainmentioning
confidence: 99%
“…We should use advances in technology to address this issue. An analysis of the security issues at the various layers of the CPS architecture, risk assessment, and techniques were discussed for securing CPS in [4]. A framework for modelling the security of a cyber-physical system has been described [5], where the behaviour of the adversary is controlled by a threat model that captures the cyber aspects and the physical aspects of the cyber-physical system in a unified manner.…”
Section: Related Workmentioning
confidence: 99%
“…Automated detection of confidentiality breaches is performed by using the CoPS model checker [38]. A threat model for CPS [39] has been proposed to incorporate typical characteristics of physical systems, such as survivability to abnormal behavior and the possibility to recover after critically vulnerable states are reached. A CPS is modeled as a finite, hybrid timed automaton with faults.…”
Section: Secure Cyber-physical Systemsmentioning
confidence: 99%
“…Our security framework for a critical infrastructure C consists of: 1) A real-time model that captures its functionality including a faults distribution F on components [13]. 2) A set S of specifications, policies and security requirements that identifies the vulnerabilities V that need to be protected.…”
Section: A Threat Model and Security Frameworkmentioning
confidence: 99%