Abstract
Many cyber physical systems have little or no cybersecurity mechanisms due to their limited computing capabilities or their history of running on isolated networks. As these systems have become interconnected and connected to corporate networks, they have become more vulnerable to cyberattacks. Providing cyber physical systems with autonomic properties will allow them to become more self-aware and react in near real time to attacks and failures. Testing these systems for their susceptibility to intelligent attacks is also needed to provide assurance of their resilience. This paper describes two approaches to providing assurances to cyber physical systems. The first approach retrofits industrial control systems with autonomic properties that will allow them to automatically detect and recover from cyberattacks and other failures through the use of microservices that reconfigure the systems dynamically during attacks or failures. The second approach uses intelligent agents in a modeling and simulation framework to test the resiliency of autonomous unmanned aerial systems. Agents are orchestrated using a range of algorithms and subjected to stressful environments to measure the efficiency and safety of their operations in a simulate multi-UAS air-traffic control problem.










Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Altawy R, Youssef AM (2016) Security, privacy, and safety aspects of civilian drones: a survey. ACM Trans Cyber-Phys Syst 1(2):1–25
AlTawy R, Youssef AM (2016) Security tradeoffs in cyber physical systems: a case study survey on implantable medical devices. IEEE Access 4:959–979
Borenstein J, Koren Y et al (1991) The vector field histogram-fast obstacle avoidance for mobile robots. IEEE Trans Robot Autom 7(3):278–288
Case DU (2016) Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC) 388
Dai W, Dubinin VN, Christensen JH, Vyatkin V, Guan X (2017) Toward self-manageable and adaptive industrial cyber-physical systems with knowledge-driven autonomic service management. IEEE Trans Ind Inf 13(2):725–736. https://doi.org/10.1109/TII.2016.2595401
Denzel M, Ryan M, Ritter E (2017) A malware-tolerant, self-healing industrial control system framework. In: IFIP international conference on ICT systems security and privacy protection. Springer, pp 46–60
Giraldo J, Sarkar E, Cardenas AA, Maniatakos M, Kantarcioglu M (2017) Security and privacy in cyber-physical systems: a survey of surveys. IEEE Des Test 34(4):7–17
Griffioen P, Weerakkody S, Sinopoli B, Ozel O, Mo Y (2019) A tutorial on detecting security attacks on cyber-physical systems. In: 2019 18th European control conference (ECC). IEEE, pp 979–984
Griffor ER, Greer C, Wollman DA, Burns MJ (2017) Framework for cyber-physical systems: volume 1, overview. Technical report NIST Special Publication 1500-201, National Institute of Standards and Technology. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1500-201.pdf
Group CPSPW (2016) Framework for cyber-physical systems. Technical report, National Institute of Standards and Technology. http://www.pages.nist.gov/cpspwg/
Halperin D, Heydt-Benjamin TS, Ransford B, Clark SS, Defend B, Morgan W, Fu K, Kohno T, Maisel WH (2008) Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In: 2008 IEEE symposium on security and privacy (sp 2008). IEEE, pp 129–142
HARTING IT Software Development (2018) Mica security. https://www.harting.com/sites/default/files/2019-06/MICA%20Security.pdf
Hladik PE, Cambazard H, Déplanche AM, Jussien N (2008) Solving a real-time allocation problem with constraint programming. J Syst Softw 81(1):132–149
Hooper M, Tian Y, Zhou R, Cao B, Lauf AP, Watkins L, Robinson WH, Alexis W (2016) Securing commercial WiFi-based UAVS from common security attacks. In: MILCOM 2016-2016 IEEE military communications conference. IEEE, pp 1213–1218
Horn P (2001) Autonomic computing: IBM’s perspective on the state of information technology. Technical report, IBM T. J. Watson Laboratory
Kephart JO, Chess DM (2003) The vision of autonomic computing. Computer 36(1):41–50
Kim KD, Kumar PR (2012) Cyber-physical systems: a perspective at the centennial. Proc IEEE 100(Special Centennial Issue):1287–1308
Kochenderfer MJ, Holland JE, Chryssanthacopoulos JP (2012) Next-generation airborne collision avoidance system. Technical report, Massachusetts Institute of Technology-Lincoln Laboratory Lexington United States
Kopardekar PH (2014) Unmanned aerial system (UAS) traffic management (UTM): enabling low-altitude airspace and UAS operations. Technical report NASA/TM-2014-218299, National Aeronautics and Space Administration, Ames Research Center
Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur Priv 9(3):49–51
LaValle SM (1998) Rapidly-exploring random trees: a new tool for path planning. Technical report no. TR 98-11, Computer Science Department, Iowa State University
Lewandowski SM, Van Hook DJ, O’Leary GC, Haines JW, Rossey LM (2001) SARA: survivable autonomic response architecture. In: Proceedings DARPA information survivability conference and exposition II. DISCEX’01. IEEE, vol 1, pp 77–88
Montero FDLP, Hariri SA (2017) Autonomic and integrated management for proactive cyber security (AIM-PSC). In: 10th IEEE/ACM international conference on utility and cloud computing, UCC 2017. Association for Computing Machinery, Inc, pp 107–112
Neuman C (2009) Challenges in security for cyber-physical systems. In: Workshop on future directions in cyber-physical systems security. Department of Homeland Security, pp 22–24
Oriol M, Gamer T, de Gooijer T, Wahler M, Ferranti E (2013) Fault-tolerant fault tolerance for component-based automation systems. In: Proceedings of the 4th international ACM SIGSOFT symposium on architecting critical systems, pp 49–58
Oriol M, Wahler M, Steiger R, Stoeter S, Vardar E, Koziolek H, Kumar A (2012) FASA: a scalable software framework for distributed control systems. In: Proceedings of the 3rd international ACM SIGSOFT symposium on architecting critical systems, pp 51–60
Patel S, Patel D (2017) Autonomic computing architecture for scada cyber security. Int J Cogn Inf Nat Intell 11(4):66–79
Riedmiller M (2005) Neural fitted q iteration—first experiences with a data efficient neural reinforcement learning method. In: European conference on machine learning. Springer, pp 317–328
Rueher M (2016) Principles and practice of constraint programming: 22nd international conference, CP 2016, Toulouse, France, September 5–9, 2016, Proceedings, vol 9892. Springer
Rushanan M, Rubin AD, Kune DF, Swanson CM (2014) SOK: security and privacy in implantable medical devices and body area networks. In: 2014 IEEE symposium on security and privacy. IEEE, pp 524–539
Slay J, Miller M (2007) Lessons learned from the Maroochy water breach. In: International conference on critical infrastructure protection. Springer, pp 73–82
Sterritt R (2005) Autonomic computing. Innov Syst Softw Eng NASA J 1(1):79–88
Sterritt R, Hanna E, O’Hagan P (2005) Autonomic agents for survivable security systems. In: International conference on embedded and ubiquitous computing. Springer, pp 1235–1244
Sterritt R, Hinchey MG (2005) Why computer based systems Should be autonomic. In: Proceedings of the 12th IEEE international conference on engineering of computer based systems (ECBS 2005), Greenbelt, MD, pp 406–414
Tanenbaum A, Steen M (2002) Distributed systems principles and paradigms. Prentice Hall, Hoboken
Truszkowski W, Hallock H, Rouff C, Karlin J, Rash J, Hinchey M, Sterritt R (2009) Autonomous and autonomic systems: with applications to NASA intelligent spacecraft operations and exploration systems. Springer, New York
United States Federal Aviation Administration (2020) Unmanned aircraft systems (UAS) traffic management (UTM) concept of operations. Version 2
Vieira K, Koch FL, Sobral JBM, Westphall CB, de Souza Leão JL (2019) Autonomic intrusion detection and response using big data. IEEE Syst J
Wahler M, Gamer T, Kumar A, Oriol M (2015) FASA: a software architecture and runtime framework for flexible distributed automation systems. J Syst Archit 61(2):82–111
Watkins L, Ramos J, Snow G, Vallejo J, Robinson WH, Rubin AD, Ciocco J, Jedrzejewski F, Liu J, Li C (2018) Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems. In: Proceedings of the 1st ACM MobiHoc workshop on mobile IoT sensing, security, and privacy, pp 1–6
Watkins L, Sartalamacchia S, Bradt R, Dhareshwar K, Bagga H, Robinson WH, Rubin A (2020) Defending against consumer drone privacy attacks: A blueprint for a counter autonomous drone tool. In: Workshop on decentralized IoT systems and security (DISS 2020). Network and distributed system security symposium (NDSS)
Zetter K (2014) Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. Broadway Books, Portland
Acknowledgements
The KAIROS and CAAS projects were supported by Johns Hopkins University Applied Physics Laboratory Internal Research and Development (IRAD) funding.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Maurio, J., Wood, P., Zanlongo, S. et al. Agile services and analysis framework for autonomous and autonomic critical infrastructure. Innovations Syst Softw Eng 19, 145–156 (2023). https://doi.org/10.1007/s11334-021-00411-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11334-021-00411-9