[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Introduction of a Hybrid Monitor for Cyber-Physical Systems

  • Conference paper
  • First Online:
Intelligent Computing (SAI 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1230))

Included in the following conference series:

  • 710 Accesses

Abstract

Computing systems and mobile technologies have changed dramatically since the introduction of firewall technology in 1988. The internet has grown from a simple network of networks to a cyber and physical entity that encompasses the entire planet. Cyber-physical systems (CPS) now control most of the day to day operations of human civilization from autonomous cars to nuclear energy plants. While phenomenal, this growth has created new security threats. These are threats that cannot be blocked by a firewall for they are not only cyber but cyber-physical. In light of these cyber-physical threats, this paper proposes a security measure that promises to enhance the security of cyber-physical systems. Using theoretical cyber, physical, and cyber-physical attack scenarios, this paper highlights the need for additional monitoring of cyber-physical systems as an extra security measure. Additionally, we illustrate the efficiency of the proposed monitor using a Shannon entropy proof, and a multiple security domain nondeducibility (MSDND) proof.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Howser, G., McMillin, B.: Using information-flow methods to analyze the security of cyber-physical systems. Computer 50(4), 17–26 (2017). https://doi.org/10.1109/MC.2017.112

    Article  Google Scholar 

  2. Crow, M.L., McMillin, B., Wang, W., Bhattacharyya, S.: Intelligent energy management of the FREEDM system. In: IEEE PES General Meeting, Providence, RI, pp. 1–4 (2010). https://doi.org/10.1109/PES.2010.5589992

  3. Thudimilla, A., McMillin, B.: Multiple security domain nondeducibility air traffic surveillance systems. In: IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore 2017, pp. 136–139 (2017). https://doi.org/10.1109/HASE.2017.29

  4. Kushner, D.: The real story of stuxnet. IEEE Spectr. 50(3), 48–53 (2013). https://doi.org/10.1109/MSPEC.2013.6471059

    Article  Google Scholar 

  5. Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: IECON 2011–37th Annual Conference of the IEEE Industrial Electronics Society, Melbourne, VIC, pp. 4490–4494 (2011). https://doi.org/10.1109/IECON.2011.6120048

  6. Weimer, J., Ivanov, R., Chen, S., Roederer, A., Sokolsky, O., Lee, I.: Parameter invariant monitor design for cyber–physical systems. Proc. IEEE 106(1), 71–92 (2018). https://doi.org/10.1109/JPROC.2017.2723847

    Article  Google Scholar 

  7. Ehrenfeld, J.M.: WannaCry, Cybersecurity and Health Information Technology: A Time to Act. Springer, New York, 24 May 2017

    Google Scholar 

  8. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 (1948). https://doi.org/10.1002/j.1538-7305.1948.tb01338.x

    Article  MathSciNet  MATH  Google Scholar 

  9. Phan, Q.-S., Malacaria, P., Pǎsǎreanu, C.S., D’Amorim, M.: Quantifying information leaks using reliability analysis. In: Proceedings of the 2014 International SPIN Symposium on Model Checking of Software (SPIN 2014), pp. 105–108. ACM, New York (2014). https://doi.org/10.1145/2632362.2632367

  10. Li, H.: Information efficiency of communications for networked control in cyber physical systems: when carnot meets shannon. In: 2016 IEEE 55th Conference on Decision and Control (CDC), Las Vegas, NV, pp. 1865–1870 (2016). https://doi.org/10.1109/CDC.2016.7798536

  11. Li, Y., Chen, M., Zhang, G., Shao, Y., Feng, F., Hou, X.: A model for vehicular cyber-physical system based on extended hybrid automaton. In: 2013 8th International Conference on Computer Science & Education, Colombo, pp. 1305–1308 (2013). https://doi.org/10.1109/ICCSE.2013.6554123.

  12. Mao, J., Chen, L.: Runtime monitoring for cyber-physical systems: a case study of cooperative adaptive cruise control. In: Proceedings of the 2012 Second International Conference on Intelligent System Design and Engineering Application (ISDEA 2012), pp. 509–515. IEEE Computer Society, Washington, DC (2012). https://doi.org/10.1109/ISdea.2012.592

  13. Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013). https://doi.org/10.1109/TAC.2013.2266831

    Article  MathSciNet  MATH  Google Scholar 

  14. McParland, C., Peisert, S., Scaglione, A.: Monitoring security of networked control systems: it’s the physics. IEEE Secur. Privacy 12(6), 32–39 (2014). https://doi.org/10.1109/MSP.2014.122

    Article  Google Scholar 

  15. Pal, K., Adepu, S., Goh, J.: Effectiveness of association rules mining for invariants generation in cyber-physical systems. In: IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, pp. 124–127 (2017). https://doi.org/10.1109/HASE.2017.21

  16. Cruz, T., et al.: Improving network security monitoring for industrial control systems. In: IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, pp. 878–881 (2015). https://doi.org/10.1109/INM.2015.7140399

  17. Mattei, T.A.: Privacy, confidentiality, and security of health care information: lessons from the recent WannaCry cyberattack. World Neurosurg. 104, 972–974 (2017). https://doi.org/10.1016/j.wneu.2017.06.104. ISSN 1878-8750

    Article  Google Scholar 

  18. Center for strategic and international studies, May 2019. https://www.csis.org/programs/technology-policy-program/significant-cyberincidents

  19. Ding, D., Han, Q.-L., Xiang, Y., Ge, X., Zhang, X.M.: A survey on security control and attack detection for industrial cyberphysical systems. Neurocomputing 275, 1674–1683 (2018)

    Article  Google Scholar 

  20. Lee, R.M., Assante, M.J., Conway, T.: Analysis of the cyber attack on the Ukrainian power grid. Defense Use Case, E-ISAC, 18 March 2016

    Google Scholar 

  21. Giraldo, J., Urbina, D., Cardenas, A., Valente, J., Faisal, M., Ruths, J., Tippenhauer, N.O., Sandberg, H., Candell, R.: A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. 51(4), 36, Article no. 76 (2018). https://doi.org/10.1145/3203245

  22. Gharaibeh, A., et al.: Smart cities: a survey on data management, security, and enabling technologies. IEEE Commun. Surv. Tutorials 19(4), 2456–2501 (2017). https://doi.org/10.1109/COMST.2017.2736886

    Article  Google Scholar 

Download references

Acknowledgments

This research was sponsored by the United States National Science Foundation (NFS). The following colleagues made notable contribution to the research over the span of the project; Dr. Patrick Taylor (Associate Professor, Missouri S&T’s Department of Computer Science), Manish Jaisinghani (Graduate Student, Missouri S&T’s Department of Computer Science), Anusha Thudmilla (Graduate Student, Missouri S&T’s Department of Computer Science), Joshua Hermann (Graduate Student, Missouri S&T’s Department of Computer Science).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Ceasar Aguma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ceasar Aguma, J., McMillin, B., Regan, A. (2020). Introduction of a Hybrid Monitor for Cyber-Physical Systems. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_25

Download citation

Publish with us

Policies and ethics