Skip to main content

A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10242))

Abstract

A Six-Step Model (SSM) is proposed for modeling and analysis of Cyber-Physical System (CPS) safety and security. SSM incorporates six dimensions (hierarchies) of a CPS, namely, functions, structure, failures, safety countermeasures, cyber-attacks, and security countermeasures. The inter-dependencies between these dimensions are defined using a set of relationship matrices. SSM enables comprehensive analysis of CPS safety and security, as it uses system functions and structure as a knowledge-base for understanding what effect the failures, cyber-attacks, and selected safety and security countermeasures might have on the system. A water treatment system is used as an example to illustrate how the proposed model could serve as a useful tool in the safety and security modeling and analysis of critical infrastructures.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Adepu, S., Mathur, A.: Distributed detection of single-stage multipoint cyber attacks in a water treatment plant. In: The 11th ACM Asia Conference on Computer and Communications Security, May 2016, in Press

    Google Scholar 

  2. Brissaud, F., Barros, A., Bérenguer, C., Charpentier, D.: Reliability study of an intelligent transmitter. In: 15th ISSAT International Conference on Reliability and Quality in Design, pp. 224–233. International Society of Science and Applied Technologies (2009)

    Google Scholar 

  3. Brissaud, F., Barros, A., Bérenguer, C., Charpentier, D.: Reliability analysis for new technology-based transmitters. Reliab. Eng. Syst. Saf. 96(2), 299–313 (2011)

    Article  Google Scholar 

  4. Kim, I., Modarres, M.: Application of goal tree-success tree model as the knowledge-base of operator advisory systems. Nucl. Eng. Des. 104(1), 67–81 (1987)

    Article  Google Scholar 

  5. Kornecki, A.J., Subramanian, N., Zalewski, J.: Studying interrelationships of safety and security for software assurance in cyber-physical systems: approach based on Bayesian belief networks. In: 2013 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 1393–1399. IEEE (2013)

    Google Scholar 

  6. Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., Halgand, Y.: A survey of approaches combining safety and security for industrial control systems. Reliab. Eng. Syst. Saf. 139, 156–178 (2015)

    Article  Google Scholar 

  7. Modarres, M., Roush, M., Hunt, R.: Application of goal trees for nuclear power plant hardware protection. In: Proceedings of the Eight International Conference on Structural Mechanics in Reactor Technology, Brussels, Belgium (1985)

    Google Scholar 

  8. Modarres, M., Cheon, S.W.: Function-centered modeling of engineering systems using the goal tree-success tree technique and functional primitives. Reliab. Eng. Syst. Saf. 64(2), 181–200 (1999)

    Article  Google Scholar 

  9. Novak, T., Treytl, A.: Functional safety and system security in automation systems-a life cycle model. In: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2008, pp. 311–318. IEEE (2008)

    Google Scholar 

  10. Piètre-Cambacédès, L., Bouissou, M.: Modeling safety and security interdependencies with BDMP (boolean logic driven markov processes). In: 2010 IEEE International Conference on Systems Man and Cybernetics (SMC), pp. 2852–2861. IEEE (2010)

    Google Scholar 

  11. Piètre-Cambacédès, L., Bouissou, M.: Cross-fertilization between safety and security engineering. Reliab. Eng. Syst. Saf. 110, 110–126 (2013)

    Article  Google Scholar 

  12. Simon, H.A.: The architecture of complexity. In: Proceedings of the American Philosophical Society, pp. 467–482 (1962)

    Google Scholar 

  13. SWaT: Secure Water Treatment Testbed (2015). http://itrust.sutd.edu.sg/research/testbeds/

  14. Weinberger, S.: Computer security: is this the start of cyberwarfare? Nature 174, 142–145 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giedre Sabaliauskaite .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sabaliauskaite, G., Adepu, S., Mathur, A. (2017). A Six-Step Model for Safety and Security Analysis of Cyber-Physical Systems. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds) Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science(), vol 10242. Springer, Cham. https://doi.org/10.1007/978-3-319-71368-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-71368-7_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-71367-0

  • Online ISBN: 978-3-319-71368-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics