Skip to main content

Advertisement

Log in

Agile services and analysis framework for autonomous and autonomic critical infrastructure

  • Original Article
  • Published:
Innovations in Systems and Software Engineering Aims and scope Submit manuscript

Abstract

Many cyber physical systems have little or no cybersecurity mechanisms due to their limited computing capabilities or their history of running on isolated networks. As these systems have become interconnected and connected to corporate networks, they have become more vulnerable to cyberattacks. Providing cyber physical systems with autonomic properties will allow them to become more self-aware and react in near real time to attacks and failures. Testing these systems for their susceptibility to intelligent attacks is also needed to provide assurance of their resilience. This paper describes two approaches to providing assurances to cyber physical systems. The first approach retrofits industrial control systems with autonomic properties that will allow them to automatically detect and recover from cyberattacks and other failures through the use of microservices that reconfigure the systems dynamically during attacks or failures. The second approach uses intelligent agents in a modeling and simulation framework to test the resiliency of autonomous unmanned aerial systems. Agents are orchestrated using a range of algorithms and subjected to stressful environments to measure the efficiency and safety of their operations in a simulate multi-UAS air-traffic control problem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Altawy R, Youssef AM (2016) Security, privacy, and safety aspects of civilian drones: a survey. ACM Trans Cyber-Phys Syst 1(2):1–25

    Article  Google Scholar 

  2. AlTawy R, Youssef AM (2016) Security tradeoffs in cyber physical systems: a case study survey on implantable medical devices. IEEE Access 4:959–979

    Article  Google Scholar 

  3. Borenstein J, Koren Y et al (1991) The vector field histogram-fast obstacle avoidance for mobile robots. IEEE Trans Robot Autom 7(3):278–288

    Article  Google Scholar 

  4. Case DU (2016) Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC) 388

  5. Dai W, Dubinin VN, Christensen JH, Vyatkin V, Guan X (2017) Toward self-manageable and adaptive industrial cyber-physical systems with knowledge-driven autonomic service management. IEEE Trans Ind Inf 13(2):725–736. https://doi.org/10.1109/TII.2016.2595401

    Article  Google Scholar 

  6. Denzel M, Ryan M, Ritter E (2017) A malware-tolerant, self-healing industrial control system framework. In: IFIP international conference on ICT systems security and privacy protection. Springer, pp 46–60

  7. Giraldo J, Sarkar E, Cardenas AA, Maniatakos M, Kantarcioglu M (2017) Security and privacy in cyber-physical systems: a survey of surveys. IEEE Des Test 34(4):7–17

    Article  Google Scholar 

  8. Griffioen P, Weerakkody S, Sinopoli B, Ozel O, Mo Y (2019) A tutorial on detecting security attacks on cyber-physical systems. In: 2019 18th European control conference (ECC). IEEE, pp 979–984

  9. Griffor ER, Greer C, Wollman DA, Burns MJ (2017) Framework for cyber-physical systems: volume 1, overview. Technical report NIST Special Publication 1500-201, National Institute of Standards and Technology. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-201.pdf

  10. Group CPSPW (2016) Framework for cyber-physical systems. Technical report, National Institute of Standards and Technology. http://www.pages.nist.gov/cpspwg/

  11. Halperin D, Heydt-Benjamin TS, Ransford B, Clark SS, Defend B, Morgan W, Fu K, Kohno T, Maisel WH (2008) Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In: 2008 IEEE symposium on security and privacy (sp 2008). IEEE, pp 129–142

  12. HARTING IT Software Development (2018) Mica security. https://www.harting.com/sites/default/files/2019-06/MICA%20Security.pdf

  13. Hladik PE, Cambazard H, Déplanche AM, Jussien N (2008) Solving a real-time allocation problem with constraint programming. J Syst Softw 81(1):132–149

    Article  Google Scholar 

  14. Hooper M, Tian Y, Zhou R, Cao B, Lauf AP, Watkins L, Robinson WH, Alexis W (2016) Securing commercial WiFi-based UAVS from common security attacks. In: MILCOM 2016-2016 IEEE military communications conference. IEEE, pp 1213–1218

  15. Horn P (2001) Autonomic computing: IBM’s perspective on the state of information technology. Technical report, IBM T. J. Watson Laboratory

  16. Kephart JO, Chess DM (2003) The vision of autonomic computing. Computer 36(1):41–50

    Article  MathSciNet  Google Scholar 

  17. Kim KD, Kumar PR (2012) Cyber-physical systems: a perspective at the centennial. Proc IEEE 100(Special Centennial Issue):1287–1308

    Article  Google Scholar 

  18. Kochenderfer MJ, Holland JE, Chryssanthacopoulos JP (2012) Next-generation airborne collision avoidance system. Technical report, Massachusetts Institute of Technology-Lincoln Laboratory Lexington United States

  19. Kopardekar PH (2014) Unmanned aerial system (UAS) traffic management (UTM): enabling low-altitude airspace and UAS operations. Technical report NASA/TM-2014-218299, National Aeronautics and Space Administration, Ames Research Center

  20. Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur Priv 9(3):49–51

    Article  Google Scholar 

  21. LaValle SM (1998) Rapidly-exploring random trees: a new tool for path planning. Technical report no. TR 98-11, Computer Science Department, Iowa State University

  22. Lewandowski SM, Van Hook DJ, O’Leary GC, Haines JW, Rossey LM (2001) SARA: survivable autonomic response architecture. In: Proceedings DARPA information survivability conference and exposition II. DISCEX’01. IEEE, vol 1, pp 77–88

  23. Montero FDLP, Hariri SA (2017) Autonomic and integrated management for proactive cyber security (AIM-PSC). In: 10th IEEE/ACM international conference on utility and cloud computing, UCC 2017. Association for Computing Machinery, Inc, pp 107–112

  24. Neuman C (2009) Challenges in security for cyber-physical systems. In: Workshop on future directions in cyber-physical systems security. Department of Homeland Security, pp 22–24

  25. Oriol M, Gamer T, de Gooijer T, Wahler M, Ferranti E (2013) Fault-tolerant fault tolerance for component-based automation systems. In: Proceedings of the 4th international ACM SIGSOFT symposium on architecting critical systems, pp 49–58

  26. Oriol M, Wahler M, Steiger R, Stoeter S, Vardar E, Koziolek H, Kumar A (2012) FASA: a scalable software framework for distributed control systems. In: Proceedings of the 3rd international ACM SIGSOFT symposium on architecting critical systems, pp 51–60

  27. Patel S, Patel D (2017) Autonomic computing architecture for scada cyber security. Int J Cogn Inf Nat Intell 11(4):66–79

    Article  Google Scholar 

  28. Riedmiller M (2005) Neural fitted q iteration—first experiences with a data efficient neural reinforcement learning method. In: European conference on machine learning. Springer, pp 317–328

  29. Rueher M (2016) Principles and practice of constraint programming: 22nd international conference, CP 2016, Toulouse, France, September 5–9, 2016, Proceedings, vol 9892. Springer

  30. Rushanan M, Rubin AD, Kune DF, Swanson CM (2014) SOK: security and privacy in implantable medical devices and body area networks. In: 2014 IEEE symposium on security and privacy. IEEE, pp 524–539

  31. Slay J, Miller M (2007) Lessons learned from the Maroochy water breach. In: International conference on critical infrastructure protection. Springer, pp 73–82

  32. Sterritt R (2005) Autonomic computing. Innov Syst Softw Eng NASA J 1(1):79–88

    Article  Google Scholar 

  33. Sterritt R, Hanna E, O’Hagan P (2005) Autonomic agents for survivable security systems. In: International conference on embedded and ubiquitous computing. Springer, pp 1235–1244

  34. Sterritt R, Hinchey MG (2005) Why computer based systems Should be autonomic. In: Proceedings of the 12th IEEE international conference on engineering of computer based systems (ECBS 2005), Greenbelt, MD, pp 406–414

  35. Tanenbaum A, Steen M (2002) Distributed systems principles and paradigms. Prentice Hall, Hoboken

    MATH  Google Scholar 

  36. Truszkowski W, Hallock H, Rouff C, Karlin J, Rash J, Hinchey M, Sterritt R (2009) Autonomous and autonomic systems: with applications to NASA intelligent spacecraft operations and exploration systems. Springer, New York

    Google Scholar 

  37. United States Federal Aviation Administration (2020) Unmanned aircraft systems (UAS) traffic management (UTM) concept of operations. Version 2

  38. Vieira K, Koch FL, Sobral JBM, Westphall CB, de Souza Leão JL (2019) Autonomic intrusion detection and response using big data. IEEE Syst J

  39. Wahler M, Gamer T, Kumar A, Oriol M (2015) FASA: a software architecture and runtime framework for flexible distributed automation systems. J Syst Archit 61(2):82–111

    Article  Google Scholar 

  40. Watkins L, Ramos J, Snow G, Vallejo J, Robinson WH, Rubin AD, Ciocco J, Jedrzejewski F, Liu J, Li C (2018) Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems. In: Proceedings of the 1st ACM MobiHoc workshop on mobile IoT sensing, security, and privacy, pp 1–6

  41. Watkins L, Sartalamacchia S, Bradt R, Dhareshwar K, Bagga H, Robinson WH, Rubin A (2020) Defending against consumer drone privacy attacks: A blueprint for a counter autonomous drone tool. In: Workshop on decentralized IoT systems and security (DISS 2020). Network and distributed system security symposium (NDSS)

  42. Zetter K (2014) Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. Broadway Books, Portland

    Google Scholar 

Download references

Acknowledgements

The KAIROS and CAAS projects were supported by Johns Hopkins University Applied Physics Laboratory Internal Research and Development (IRAD) funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christopher Rouff.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Maurio, J., Wood, P., Zanlongo, S. et al. Agile services and analysis framework for autonomous and autonomic critical infrastructure. Innovations Syst Softw Eng 19, 145–156 (2023). https://doi.org/10.1007/s11334-021-00411-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11334-021-00411-9

Keywords