Modelling and evaluation of the security of cyber-physical systems using stochastic Petri nets
- Author(s): Hamed Orojloo 1 and Mohammad Abdollahi Azgomi 1
-
-
View affiliations
-
Affiliations:
1:
Trustworthy Computing Laboratory, School of Computer Engineering, Iran University of Science and Technology , Tehran , Iran
-
Affiliations:
1:
Trustworthy Computing Laboratory, School of Computer Engineering, Iran University of Science and Technology , Tehran , Iran
- Source:
IET Cyber-Physical Systems: Theory & Applications,
0pp.
DOI: 10.1049/iet-cps.2018.0008 , Online ISSN 2398-3396 Available online: 19 July 2018
This is an open access article published by the IET under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0/)
Received 11/01/2018,
Accepted 03/07/2018,
Revised 14/04/2018,
Published 18/07/2018

Full text loading...
/deliver/fulltext/10.1049/iet-cps.2018.0008/IET-CPS.2018.0008.html;jsessionid=1930j88i3rdik.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-cps.2018.0008&mimeType=html&fmt=ahah
Other keywords: CPSs; false-positive probability; quantitative analysis; stochastic Petri net model; defensive parameters; malicious attacks; stochastic Petri nets; system-focused quantitative security measures; physical disruption; security attacks; intrusion detection systems; cyber-physical systems; security countermeasures; IDSs
Subjects: Combinatorial mathematics; Other topics in statistics; Data security
References
-
-
1)
-
1. Burmester, M., Magkos, E., Chrissikopoulos, V.: ‘Modeling security in cyber-physical systems’, Int. J. Crit. Infrastruct. Prot., 2012, 5, (3–4), pp. 118–126.
-
-
2)
-
2. Nguyen, H.P., Shaukat, A., Yue, T.: ‘Model-based security engineering for cyber-physical systems: a systematic mapping study’, Inf. Softw. Technol., 2017, 83, pp. 116–135.
-
-
3)
-
3. Lee, E.A., Seshia, S.A.: ‘Introduction to embedded systems – a cyber-physical systems approach’ (MIT Press, Cambridge, Massachusetts, USA, 2017, 2nd edn.).
-
-
4)
-
4. Krotofil, M., Larsen, J., Gollmann, D.: ‘The process matters: ensuring data veracity in cyber-physical systems’. Proc. of the 10th ACM Symp. on Information, Computer and Communications Security (ASIA CCS ‘15), Singapore, April 2015, pp. 133–144.
-
-
5)
-
5. Krotofil, M., Larsen, J.: ‘Are you threatening my hazards?’. Proc. of 9th Int. Workshop on Security (IWSEC'14), Hirosaki, Japan, August 2014, pp. 17–32.
-
-
6)
-
6. Ashibani, Y., Mahmoud, Q.H.: ‘Cyber physical systems security: analysis, challenges and solutions’, Comput. Secur., 2017, 68, pp. 81–97.
-
-
7)
-
7. Molloy, M.K.: ‘Performance analysis using stochastic Petri nets’, IEEE Trans. Comput., 1982, 31, (9), pp. 913–917.
-
-
8)
-
8. Marsan, M.A., Balbo, G., Conte, G., et al: ‘Modelling with generalized stochastic Petri nets’ (John Wiley & Sons Inc., New York, NY, USA, 1994).
-
-
9)
-
9. Sharma, A.B., Ivančić, F., Niculescu-Mizil, A., et al: ‘Modeling and analytics for cyber-physical systems in the age of big data’, ACM SIGMETRICS Perform. Eval. Rev., 2014, 41, pp. 74–77.
-
-
10)
-
10. Mitchell, R., Chen, I.R.: ‘Effect of intrusion detection and response on reliability of cyber physical systems’, IEEE Trans. Rel., 2013, 62, (1), pp. 199–210.
-
-
11)
-
11. Rahimi, S., Zargham, M.: ‘Analysis of the security of VPN configurations in industrial control environments’, J. Crit. Infrastruct. Prot., 2012, 5, (1), pp. 3–13.
-
-
12)
-
12. Ni, S., Zhuang, Y., Gu, J., et al: ‘A formal model and risk assessment method for security-critical real-time embedded systems’, Comput. Secur., 2016, 58, pp. 199–215.
-
-
13)
-
13. Mitchell, R., Chen, I.R.: ‘Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems’, IEEE Trans. Reliab., 2015, 65, pp. 350–358.
-
-
14)
-
14. Krotofil, M., Cárdenas, A.A., Larsen, J., et al: ‘Vulnerabilities of cyber-physical systems to stale data-determining the optimal time to launch attacks’, Int. J. Crit. Infrastruct. Prot., 2014, 7, pp. 213–232.
-
-
15)
-
15. Genge, B., Siaterlis, C., Hohenadel, M.: ‘Impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems’, Int. J. Comput. Commun. Control, 2014, 7, pp. 674–687.
-
-
16)
-
16. Zhu, Q., Başar, T.: ‘A dynamic game-theoretic approach to resilient control system design for cascading failures’. Proc. of the 1st int. Conf. on High Confidence Networked Systems, Beijing, China, 2012, pp. 41–46.
-
-
17)
-
17. Marin, A., Balsamo, S., Harrison, P.G.: ‘Analysis of stochastic Petri nets with signals’, Perform. Eval., 2012, 69, (11), pp. 551–572.
-
-
18)
-
18. Horváth, A., Paolieri, M., Ridi, L., et al: ‘Transient analysis of non-Markovian models using stochastic state classes’, Perform. Eval., 2012, 69, (7–8), pp. 315–335.
-
-
19)
-
19. Gallina, L., Dei Rossi, G.L., Marin, A., et al: ‘Evaluating resistance to jamming and casual interception in mobile wireless networks’. Proc. of the 15th ACM Int. Conf. on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Paphos, Cyprus, 2012, pp. 151–158.
-
-
20)
-
20. Orojloo, H., Abdollahi Azgomi, M.: ‘A method for evaluating the consequence propagation of security attacks in cyber–physical systems’, Future Gener. Comput. Syst., 2017, 67, pp. 57–71.
-
-
21)
-
21. Kopetz, H.: ‘Real-time systems: design principles for distributed embedded applications’, Real-Time Systems Series (Springer, Berlin, Germany, 2011, 2nd edn.).
-
-
22)
-
22. Mitchell, R., Chen, I.R.: ‘A survey of intrusion detection techniques in cyber physical systems’, ACM Comput. Surv., 2014, 46, pp. 1–29.
-
-
23)
-
23. Chen, T.M., Sanchez-Aarnoutse, J.C., Buford, J.: ‘Petri net modeling of cyber-physical attacks on smart grid’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 741–749.
-
-
24)
-
24. Madan, B., Goševa-Popstojanova, K., Vaidyanathan, K., et al: ‘A method for modeling and quantifying the security attributes of intrusion tolerant systems’, Perform. Eval., 2004, 56, (1), pp. 167–186.
-
-
25)
-
25. Trivedi, K.S.: ‘Probability and statistics with reliability, queuing, and computer science applications’ (John Wiley & Sons Ltd., Chichester, UK, 2001, 2nd edn.).
-
-
26)
-
26. Kowalewski, S., Stursberg, O., Fritz, M., et al: ‘A case study in tool-aided analysis of discretely controlled continuous systems: the two tanks problem’. Proc. of the 15th Int. Workshop on Hybrid Systems (HS V), Grenoble, France, 1997, pp. 163–185.
-
-
1)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2018.0008

Related content
content/journals/10.1049/iet-cps.2018.0008
pub_keyword,iet_inspecKeyword,pub_concept
6
6
