4.2 Article

The Integration of Diversely Redundant Designs, Dynamic System Models, and State Estimation Technology to the Cyber Security of Physical Systems

期刊

SYSTEMS ENGINEERING
卷 16, 期 4, 页码 401-412

出版社

WILEY
DOI: 10.1002/sys.21239

关键词

adaptive security; cyber security; system-aware cyber security; model-based data-consistency checking; cyber security architecture; cyber security for physical systems

资金

  1. U.S. Department of Defense through the Systems Engineering Research Center (SERC) [H98230-08-D-0171]

向作者/读者索取更多资源

As exemplified in the 2010 Stuxnet attack on Iranian nuclear facilities, cyber attackers have capabilities to embed disruptive infections into equipment that is employed within physical systems. This paper presents a cyber security design approach that addresses cyber attacks that include modification of operator displays used for support in managing software controlled automated systems. This class of problems is especially important because our nation's critical infrastructures include such systems. In addition, many other systems, such as surveillance systems, navigation systems, and communications systems, are candidates for such solutions as they continue to become more and more automated. The suggested design approach builds upon fault-tolerant and automatic control system techniques that, with important and necessary modifications, are the basis for providing improved cyber security. In particular, the appropriate combination of diversely redundant security designs coupled with system dynamics models and state estimation techniques provide a potential means for detecting purposeful adjustments to operator displays. This paper provides a theoretical approach for designing such solutions and a corresponding set of examples with simulation-based results. In addition, the paper includes a discussion of important implementation requirements for greater assurance of such physical system security solutions. (c) 2013 Wiley Periodicals, Inc. Syst Eng 16

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.2
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据