2019
DOI: 10.1109/access.2019.2903153
|View full text |Cite
|
Sign up to set email alerts
|

Predictive Formal Analysis of Resilience in Cyber-Physical Systems

Abstract: The behavioral analysis of cyber-physical systems in safety-critical scenarios is a challenging task. In this paper, the endogenous and exogenous aspects of resilience are of cornerstone importance in system design and verification. Endogenous resilience is the inherent ability of the system to detect and process internal faults and malicious attacks. Exogenous resilience is the permanent capability of the system to maintain a safe operation within its ambient environment. In this paper, we present a predictiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 39 publications
0
6
0
1
Order By: Relevance
“…A recent ever-growing interest has been devoted to resilience challenges [2,14,15], often related to the notion of self-adaptation, as witnessed by an increasing number of surveys on this topic [16][17][18][19]. Targets of recent approaches addressing CPS resilience vary from cyber-security [20][21][22][23], to cyberphysical power systems [24,25] and to cyber-physical production systems [26][27][28][29][30]. The first ones are focused on security issues at runtime on the communication layer or to implement resource balancing strategies between the edge and cloud computing layers.…”
Section: Related Workmentioning
confidence: 99%
“…A recent ever-growing interest has been devoted to resilience challenges [2,14,15], often related to the notion of self-adaptation, as witnessed by an increasing number of surveys on this topic [16][17][18][19]. Targets of recent approaches addressing CPS resilience vary from cyber-security [20][21][22][23], to cyberphysical power systems [24,25] and to cyber-physical production systems [26][27][28][29][30]. The first ones are focused on security issues at runtime on the communication layer or to implement resource balancing strategies between the edge and cloud computing layers.…”
Section: Related Workmentioning
confidence: 99%
“…Les méthodes d'analyses de sécurité représentent 14.14% des approches. Il s'agit de moyens pour évaluer les risques avant la construction des drones [69] et des systèmes [102], ou avant les opérations [4] avec des cartes de risques au sol en cas d'impact [36,66,88] ou encore des méthodes formelles pour prédire la résilience des systèmes [81]. Ces méthodes concernent aussi l'exécution des opérations avec un système de recommandation utilisant les méthodes formelles [54].…”
Section: Approches Principales (Rq2 -Rq3)unclassified
“…Indeed, as many architectures have to be evaluated during the engineering process, a major issue is then the ability of modelers to easily build and modify the system model (for example by adding or removing component models). Pattern-based modeling, combined with a structured modeling framework, seems to be a very efficient way to allow a plug-and-play approach to compose models from a library of generic and reusable models: [32,33,34]. These models must have standard interfaces to ensure their interoperability and can be adapted and composed according to the architecture to be modelled.…”
Section: Objectives and Hypothesesmentioning
confidence: 99%