z-logo
Premium
The integration of diversely redundant designs, dynamic system models, and state estimation technology to the cyber security of physical systems
Author(s) -
Horowitz Barry M.,
Pierce Katherine M.
Publication year - 2013
Publication title -
systems engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.474
H-Index - 50
eISSN - 1520-6858
pISSN - 1098-1241
DOI - 10.1002/sys.21239
Subject(s) - cyber physical system , computer science , computer security , state (computer science) , set (abstract data type) , software , operator (biology) , security controls , systems engineering , control (management) , software engineering , engineering , artificial intelligence , biochemistry , chemistry , repressor , algorithm , transcription factor , gene , programming language , operating system
As exemplified in the 2010 Stuxnet attack on Iranian nuclear facilities, cyber attackers have capabilities to embed disruptive infections into equipment that is employed within physical systems. This paper presents a cyber security design approach that addresses cyber attacks that include modification of operator displays used for support in managing software controlled automated systems. This class of problems is especially important because our nation's critical infrastructures include such systems. In addition, many other systems, such as surveillance systems, navigation systems, and communications systems, are candidates for such solutions as they continue to become more and more automated. The suggested design approach builds upon fault–tolerant and automatic control system techniques that, with important and necessary modifications, are the basis for providing improved cyber security. In particular, the appropriate combination of diversely redundant security designs coupled with system dynamics models and state estimation techniques provide a potential means for detecting purposeful adjustments to operator displays. This paper provides a theoretical approach for designing such solutions and a corresponding set of examples with simulation–based results. In addition, the paper includes a discussion of important implementation requirements for greater assurance of such physical system security solutions. © 2013 Wiley Periodicals, Inc. Syst Eng 16

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here