2018
DOI: 10.1109/tdsc.2016.2599880
|View full text |Cite
|
Sign up to set email alerts
|

On the Interplay Between Cyber and Physical Spaces for Adaptive Security

Abstract: Abstract-Ubiquitous computing is resulting in a proliferation of cyber-physical systems that host or manage valuable physical and digital assets. These assets can be harmed by malicious agents through both cyber-enabled or physically-enabled attacks, particularly ones that exploit the often ignored interplay between the cyber and physical world. The explicit representation of spatial topology is key to supporting adaptive security policies. In this paper we explore the use of Bigraphical Reactive Systems to mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
2

Relationship

4
5

Authors

Journals

citations
Cited by 48 publications
(33 citation statements)
references
References 48 publications
0
33
0
Order By: Relevance
“…This eliminates constraints (e.g., limited connectivity) imposed by other formalisms such as action calculi, which are suitable to represent interactions only between physical or cyber components. Moreover, BRS have been used to reason about CPS for various applications domains such as adaptive security systems [25]. Finally, we plan to develop a technique to analyze incidents that are generated from mapping a pattern to a system.…”
Section: Discussionmentioning
confidence: 99%
“…This eliminates constraints (e.g., limited connectivity) imposed by other formalisms such as action calculi, which are suitable to represent interactions only between physical or cyber components. Moreover, BRS have been used to reason about CPS for various applications domains such as adaptive security systems [25]. Finally, we plan to develop a technique to analyze incidents that are generated from mapping a pattern to a system.…”
Section: Discussionmentioning
confidence: 99%
“…Other verification tecniques for self-adaptive CPSs. Tsigkanos et al [36] use bigraphical reactive systems to represent topological relationships of cyber-physical systems. They apply explicit state model checking to reason about security threats brought by changes in the topological relationships that may occur at runtime.…”
Section: Related Workmentioning
confidence: 99%
“…Techniques for modelling self-adaptive systems using rigid modules (e.g., [21]) do not work well for CPSs where different groupings of concurrent cyber and physical components may need to be considered to satisfy each system requirement. Existing work to verify self-adaptive CPS [36] uses explicit state model checking. This can lead to state explosion and may not be computationally feasible for large-scale systems.…”
Section: Introductionmentioning
confidence: 99%
“…Bigraphs are a universal computational model, defined by Milner [16], for modeling interacting systems that evolve in time and space, and have been applied to model a wide range of systems, e.g. IoT/Edge systems [17]- [19], MixedReality systems [20], context-aware systems [21], networking [22], [23], and security of Cyber-Physical systems [24], [25]. Relationships between entities, e.g.…”
Section: Introductionmentioning
confidence: 99%