Abstract
Computing systems and mobile technologies have changed dramatically since the introduction of firewall technology in 1988. The internet has grown from a simple network of networks to a cyber and physical entity that encompasses the entire planet. Cyber-physical systems (CPS) now control most of the day to day operations of human civilization from autonomous cars to nuclear energy plants. While phenomenal, this growth has created new security threats. These are threats that cannot be blocked by a firewall for they are not only cyber but cyber-physical. In light of these cyber-physical threats, this paper proposes a security measure that promises to enhance the security of cyber-physical systems. Using theoretical cyber, physical, and cyber-physical attack scenarios, this paper highlights the need for additional monitoring of cyber-physical systems as an extra security measure. Additionally, we illustrate the efficiency of the proposed monitor using a Shannon entropy proof, and a multiple security domain nondeducibility (MSDND) proof.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Howser, G., McMillin, B.: Using information-flow methods to analyze the security of cyber-physical systems. Computer 50(4), 17–26 (2017). https://doi.org/10.1109/MC.2017.112
Crow, M.L., McMillin, B., Wang, W., Bhattacharyya, S.: Intelligent energy management of the FREEDM system. In: IEEE PES General Meeting, Providence, RI, pp. 1–4 (2010). https://doi.org/10.1109/PES.2010.5589992
Thudimilla, A., McMillin, B.: Multiple security domain nondeducibility air traffic surveillance systems. In: IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore 2017, pp. 136–139 (2017). https://doi.org/10.1109/HASE.2017.29
Kushner, D.: The real story of stuxnet. IEEE Spectr. 50(3), 48–53 (2013). https://doi.org/10.1109/MSPEC.2013.6471059
Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: IECON 2011–37th Annual Conference of the IEEE Industrial Electronics Society, Melbourne, VIC, pp. 4490–4494 (2011). https://doi.org/10.1109/IECON.2011.6120048
Weimer, J., Ivanov, R., Chen, S., Roederer, A., Sokolsky, O., Lee, I.: Parameter invariant monitor design for cyber–physical systems. Proc. IEEE 106(1), 71–92 (2018). https://doi.org/10.1109/JPROC.2017.2723847
Ehrenfeld, J.M.: WannaCry, Cybersecurity and Health Information Technology: A Time to Act. Springer, New York, 24 May 2017
Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 (1948). https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
Phan, Q.-S., Malacaria, P., Pǎsǎreanu, C.S., D’Amorim, M.: Quantifying information leaks using reliability analysis. In: Proceedings of the 2014 International SPIN Symposium on Model Checking of Software (SPIN 2014), pp. 105–108. ACM, New York (2014). https://doi.org/10.1145/2632362.2632367
Li, H.: Information efficiency of communications for networked control in cyber physical systems: when carnot meets shannon. In: 2016 IEEE 55th Conference on Decision and Control (CDC), Las Vegas, NV, pp. 1865–1870 (2016). https://doi.org/10.1109/CDC.2016.7798536
Li, Y., Chen, M., Zhang, G., Shao, Y., Feng, F., Hou, X.: A model for vehicular cyber-physical system based on extended hybrid automaton. In: 2013 8th International Conference on Computer Science & Education, Colombo, pp. 1305–1308 (2013). https://doi.org/10.1109/ICCSE.2013.6554123.
Mao, J., Chen, L.: Runtime monitoring for cyber-physical systems: a case study of cooperative adaptive cruise control. In: Proceedings of the 2012 Second International Conference on Intelligent System Design and Engineering Application (ISDEA 2012), pp. 509–515. IEEE Computer Society, Washington, DC (2012). https://doi.org/10.1109/ISdea.2012.592
Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013). https://doi.org/10.1109/TAC.2013.2266831
McParland, C., Peisert, S., Scaglione, A.: Monitoring security of networked control systems: it’s the physics. IEEE Secur. Privacy 12(6), 32–39 (2014). https://doi.org/10.1109/MSP.2014.122
Pal, K., Adepu, S., Goh, J.: Effectiveness of association rules mining for invariants generation in cyber-physical systems. In: IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, pp. 124–127 (2017). https://doi.org/10.1109/HASE.2017.21
Cruz, T., et al.: Improving network security monitoring for industrial control systems. In: IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, pp. 878–881 (2015). https://doi.org/10.1109/INM.2015.7140399
Mattei, T.A.: Privacy, confidentiality, and security of health care information: lessons from the recent WannaCry cyberattack. World Neurosurg. 104, 972–974 (2017). https://doi.org/10.1016/j.wneu.2017.06.104. ISSN 1878-8750
Center for strategic and international studies, May 2019. https://www.csis.org/programs/technology-policy-program/significant-cyberincidents
Ding, D., Han, Q.-L., Xiang, Y., Ge, X., Zhang, X.M.: A survey on security control and attack detection for industrial cyberphysical systems. Neurocomputing 275, 1674–1683 (2018)
Lee, R.M., Assante, M.J., Conway, T.: Analysis of the cyber attack on the Ukrainian power grid. Defense Use Case, E-ISAC, 18 March 2016
Giraldo, J., Urbina, D., Cardenas, A., Valente, J., Faisal, M., Ruths, J., Tippenhauer, N.O., Sandberg, H., Candell, R.: A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. 51(4), 36, Article no. 76 (2018). https://doi.org/10.1145/3203245
Gharaibeh, A., et al.: Smart cities: a survey on data management, security, and enabling technologies. IEEE Commun. Surv. Tutorials 19(4), 2456–2501 (2017). https://doi.org/10.1109/COMST.2017.2736886
Acknowledgments
This research was sponsored by the United States National Science Foundation (NFS). The following colleagues made notable contribution to the research over the span of the project; Dr. Patrick Taylor (Associate Professor, Missouri S&T’s Department of Computer Science), Manish Jaisinghani (Graduate Student, Missouri S&T’s Department of Computer Science), Anusha Thudmilla (Graduate Student, Missouri S&T’s Department of Computer Science), Joshua Hermann (Graduate Student, Missouri S&T’s Department of Computer Science).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Ceasar Aguma, J., McMillin, B., Regan, A. (2020). Introduction of a Hybrid Monitor for Cyber-Physical Systems. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-52243-8_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52242-1
Online ISBN: 978-3-030-52243-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)