2019
DOI: 10.1155/2019/8348925
|View full text |Cite
|
Sign up to set email alerts
|

Security Requirements Engineering in Safety-Critical Railway Signalling Networks

Abstract: Securing a safety-critical system is a challenging task, because safety requirements have to be considered alongside security controls. We report on our experience to develop a security architecture for railway signalling systems starting from the bare safety-critical system that requires protection. We use a threat-based approach to determine security risk acceptance criteria and derive security requirements. We discuss the executed process and make suggestions for improvements. Based on the security requirem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…These risk assessments are generally focused on attacks that could impact safety, as defined in the functional safety standards. 10,11,[15][16][17][18][19][20][21] In rail the most common scenario modelled is a hacker compromising the ICS so as to cause: a loss of safe distance, an over-speed event or collision via disrupting signals. This bias of considering only the most catastrophic hazard and framing cybersecurity controls to make this as difficult as possible, may not do justice to the intelligence of hackers.…”
Section: Cognitive Bias In Threat and Risk Assessmentmentioning
confidence: 99%
See 1 more Smart Citation
“…These risk assessments are generally focused on attacks that could impact safety, as defined in the functional safety standards. 10,11,[15][16][17][18][19][20][21] In rail the most common scenario modelled is a hacker compromising the ICS so as to cause: a loss of safe distance, an over-speed event or collision via disrupting signals. This bias of considering only the most catastrophic hazard and framing cybersecurity controls to make this as difficult as possible, may not do justice to the intelligence of hackers.…”
Section: Cognitive Bias In Threat and Risk Assessmentmentioning
confidence: 99%
“…• MILS-Based secure-platform for ICS, 19 • Domain-specific and cross-organisational intrusion detection and monitoring, 23 and • Advanced honeypot and deception solutions 24 )…”
Section: Existential Threats To Rail Operationsmentioning
confidence: 99%
“…With the shell concept, security and safety functionality is separated such that security can be updated independently from safety, and security does not interfere negatively with the safety functionality. Heinrich et al [6] propose a hardware platform according to the shell concept that allows the execution of safety and security functionality on the same hardware without interference by the help of a separation kernel. The rule-based anomaly detection proposed in this article can be one of the security measures deployed on this platform that interacts with the safety functionality which controls the railway signalling field elements.…”
Section: Related Workmentioning
confidence: 99%
“…We investigate anomaly detection on the controllers of railway signalling as one building block among many of a defence in depth concept. Other security measures should cover communication integrity and authentication, hardware integrity against physical tampering with devices, a separation kernel to isolate different pieces of software, and health monitoring during runtime as discussed by Heinrich et al [6]. We study sophisticated semantic attacks that make use of licit control commands to set railway signals and points to a state that may cause train accidents.…”
Section: Introductionmentioning
confidence: 99%
“…With the increase of phenomena like cyber-terrorism and malevolent attacks in general, FMs can be used to create fully secure architectures that allow the proper function of the railway network, while in the same time they enable the developers to make sure that security requirements are not violated across the engineering and development processes. Reports can be found on such cases, such as the one by Heinrich et al [37], who propose several security requirements that architectures, such as the one proposed in this article, should cover.…”
Section: Security Of Railway Signaling Systemsmentioning
confidence: 99%