2020
DOI: 10.1007/978-3-030-58295-1_1
|View full text |Cite
|
Sign up to set email alerts
|

Trustworthy Inter-connected Cyber-Physical Systems

Abstract: In this paper we identify some of the particular challenges that are encountered when trying to secure cyber-physical systems. We describe three of our current activities: the architecture of a system for monitoring cyber-physical systems; a new approach to modelling dependencies in such systems which leads to a measurement of the security of the system -interpreted as the least effort that an attacker has to expend to compromise the operation; and an approach to optimising the diversity of products used in a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Trust in these systems is essential. Hankin and Barrèere [25] note that there are many aspects to trustworthiness: reliability, trust, dependability, privacy, resilience, and safety. Adversaries ranging from solo hackers to state-sponsored APTs have an interest in attacking these systems.…”
Section: Secure and Trustworthy Systemsmentioning
confidence: 99%
“…Trust in these systems is essential. Hankin and Barrèere [25] note that there are many aspects to trustworthiness: reliability, trust, dependability, privacy, resilience, and safety. Adversaries ranging from solo hackers to state-sponsored APTs have an interest in attacking these systems.…”
Section: Secure and Trustworthy Systemsmentioning
confidence: 99%
“…Trust in these systems is essential. Hankin and Barrèere [23] note that there are many aspects to trustworthiness: reliability, trust, dependability, privacy, resilience, and safety. Adversaries ranging from solo hackers to state-sponsored APTs have an interest in attacking these systems.…”
Section: Secure and Trustworthy Systemsmentioning
confidence: 99%
“…While useful in many types of scenarios [69], most of them are focused on OR-only graph-based models for IT networks and do not cover AND/OR semantics. Other important approaches targeting cyber-physical systems include probabilistic model checking and formal methods [30,42,73,78], security metrics and graph-based methods [34,61,70,72], system design analysis [19], real-time monitoring [12,38], structural controllability aspects [3,52,58,60], among others. The focus of this work is on the identification of CPS components that are most likely to jeopardise the system's mission.…”
Section: Related Workmentioning
confidence: 99%