http://iet.metastore.ingenta.com
1887

access icon openaccess Modelling and evaluation of the security of cyber-physical systems using stochastic Petri nets

  • XML
    105.3427734375Kb
  • HTML
    118.775390625Kb
  • PDF
    2.465348243713379MB
Loading full text...

Full text loading...

/deliver/fulltext/10.1049/iet-cps.2018.0008/IET-CPS.2018.0008.html;jsessionid=2hd33209duj6a.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-cps.2018.0008&mimeType=html&fmt=ahah

References

    1. 1)
      • 1. Burmester, M., Magkos, E., Chrissikopoulos, V.: ‘Modeling security in cyber-physical systems’, Int. J. Crit. Infrastruct. Prot., 2012, 5, (3–4), pp. 118126.
    2. 2)
      • 2. Nguyen, H.P., Shaukat, A., Yue, T.: ‘Model-based security engineering for cyber-physical systems: a systematic mapping study’, Inf. Softw. Technol., 2017, 83, pp. 116135.
    3. 3)
      • 3. Lee, E.A., Seshia, S.A.: ‘Introduction to embedded systems – a cyber-physical systems approach’ (MIT Press, Cambridge, Massachusetts, USA, 2017, 2nd edn.).
    4. 4)
      • 4. Krotofil, M., Larsen, J., Gollmann, D.: ‘The process matters: ensuring data veracity in cyber-physical systems’. Proc. of the 10th ACM Symp. on Information, Computer and Communications Security (ASIA CCS ‘15), Singapore, April 2015, pp. 133144.
    5. 5)
      • 5. Krotofil, M., Larsen, J.: ‘Are you threatening my hazards?’. Proc. of 9th Int. Workshop on Security (IWSEC'14), Hirosaki, Japan, August 2014, pp. 1732.
    6. 6)
      • 6. Ashibani, Y., Mahmoud, Q.H.: ‘Cyber physical systems security: analysis, challenges and solutions’, Comput. Secur., 2017, 68, pp. 8197.
    7. 7)
      • 7. Molloy, M.K.: ‘Performance analysis using stochastic Petri nets’, IEEE Trans. Comput., 1982, 31, (9), pp. 913917.
    8. 8)
      • 8. Marsan, M.A., Balbo, G., Conte, G., et al: ‘Modelling with generalized stochastic Petri nets’ (John Wiley & Sons Inc., New York, NY, USA, 1994).
    9. 9)
      • 9. Sharma, A.B., Ivančić, F., Niculescu-Mizil, A., et al: ‘Modeling and analytics for cyber-physical systems in the age of big data’, ACM SIGMETRICS Perform. Eval. Rev., 2014, 41, pp. 7477.
    10. 10)
      • 10. Mitchell, R., Chen, I.R.: ‘Effect of intrusion detection and response on reliability of cyber physical systems’, IEEE Trans. Rel., 2013, 62, (1), pp. 199210.
    11. 11)
      • 11. Rahimi, S., Zargham, M.: ‘Analysis of the security of VPN configurations in industrial control environments’, J. Crit. Infrastruct. Prot., 2012, 5, (1), pp. 313.
    12. 12)
      • 12. Ni, S., Zhuang, Y., Gu, J., et al: ‘A formal model and risk assessment method for security-critical real-time embedded systems’, Comput. Secur., 2016, 58, pp. 199215.
    13. 13)
      • 13. Mitchell, R., Chen, I.R.: ‘Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems’, IEEE Trans. Reliab., 2015, 65, pp. 350358.
    14. 14)
      • 14. Krotofil, M., Cárdenas, A.A., Larsen, J., et al: ‘Vulnerabilities of cyber-physical systems to stale data-determining the optimal time to launch attacks’, Int. J. Crit. Infrastruct. Prot., 2014, 7, pp. 213232.
    15. 15)
      • 15. Genge, B., Siaterlis, C., Hohenadel, M.: ‘Impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems’, Int. J. Comput. Commun. Control, 2014, 7, pp. 674687.
    16. 16)
      • 16. Zhu, Q., Başar, T.: ‘A dynamic game-theoretic approach to resilient control system design for cascading failures’. Proc. of the 1st int. Conf. on High Confidence Networked Systems, Beijing, China, 2012, pp. 4146.
    17. 17)
      • 17. Marin, A., Balsamo, S., Harrison, P.G.: ‘Analysis of stochastic Petri nets with signals’, Perform. Eval., 2012, 69, (11), pp. 551572.
    18. 18)
      • 18. Horváth, A., Paolieri, M., Ridi, L., et al: ‘Transient analysis of non-Markovian models using stochastic state classes’, Perform. Eval., 2012, 69, (7–8), pp. 315335.
    19. 19)
      • 19. Gallina, L., Dei Rossi, G.L., Marin, A., et al: ‘Evaluating resistance to jamming and casual interception in mobile wireless networks’. Proc. of the 15th ACM Int. Conf. on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Paphos, Cyprus, 2012, pp. 151158.
    20. 20)
      • 20. Orojloo, H., Abdollahi Azgomi, M.: ‘A method for evaluating the consequence propagation of security attacks in cyber–physical systems’, Future Gener. Comput. Syst., 2017, 67, pp. 5771.
    21. 21)
      • 21. Kopetz, H.: ‘Real-time systems: design principles for distributed embedded applications’, Real-Time Systems Series (Springer, Berlin, Germany, 2011, 2nd edn.).
    22. 22)
      • 22. Mitchell, R., Chen, I.R.: ‘A survey of intrusion detection techniques in cyber physical systems’, ACM Comput. Surv., 2014, 46, pp. 129.
    23. 23)
      • 23. Chen, T.M., Sanchez-Aarnoutse, J.C., Buford, J.: ‘Petri net modeling of cyber-physical attacks on smart grid’, IEEE Trans. Smart Grid, 2011, 2, (4), pp. 741749.
    24. 24)
      • 24. Madan, B., Goševa-Popstojanova, K., Vaidyanathan, K., et al: ‘A method for modeling and quantifying the security attributes of intrusion tolerant systems’, Perform. Eval., 2004, 56, (1), pp. 167186.
    25. 25)
      • 25. Trivedi, K.S.: ‘Probability and statistics with reliability, queuing, and computer science applications’ (John Wiley & Sons Ltd., Chichester, UK, 2001, 2nd edn.).
    26. 26)
      • 26. Kowalewski, S., Stursberg, O., Fritz, M., et al: ‘A case study in tool-aided analysis of discretely controlled continuous systems: the two tanks problem’. Proc. of the 15th Int. Workshop on Hybrid Systems (HS V), Grenoble, France, 1997, pp. 163185.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2018.0008
Loading

Related content

content/journals/10.1049/iet-cps.2018.0008
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address