SURE: A Modeling and Simulation Integration Platform for Evaluation of SecUre and REsilient Cyber-Physical Systems (original) (raw)
Abstract
The exponential growth of information and communication technologies have caused a profound shift in the way humans engineer systems leading to the emergence of closedloop systems involving strong integration and coordination of physical and cyber components, often referred to as cyber�physical systems (CPSs). Because of these disruptive changes, physical systems can now be attacked through cyberspace and cyberspace can be attacked through physical means. The paper considers
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
References (80)
- R. Baheti and H. Gill, "Cyber-physical systems," Impact Control Technol., vol. 12, pp. 161-166, Mar. 2011.
- J. Sztipanovits et al., "Toward a science of cyber-physical system integration," Proc. IEEE, vol. 100, no. 1, pp. 29-44, Jan. 2012.
- H. Neema et al., "SURE: An experimentation and evaluation testbed for CPS security and resilience: Demo abstract," in Proc. 7th Int. Conf. Cyber-Phys. Syst. (ICCPS), 2016, Art. no. 27.
- R. Langner, "Stuxnet: Dissecting a cyberwarfare weapon," IEEE Security Privacy, vol. 9, no. 3, pp. 49-51, May 2011.
- J. Slay and M. Miller, "Lessons learned from the Maroochy water breach," in Critical Infrastructure Protection. 2007, pp. 73-82.
- M. K. Yoon, B. Liu, N. Hovakimyan, and L. Sha, "VirtualDrone: Virtual sensing, actuation, and communication for attack- resilient unmanned aerial systems," in Proc. 8th ACM/IEEE Int. Conf. Cyber-Phys. Syst., Apr. 2017, pp. 143-154.
- K. Koscher et al., "Experimental security analysis of a modern automobile," in Proc. IEEE Symp. Secur. Privacy (SP), May 2010, pp. 447-462.
- S. Checkoway et al., "Comprehensive experimental analyses of automotive attack surfaces," in Proc. USENIX Secur. Symp., San Francisco, CA, USA, 2011, pp. 1-6.
- J. Reilly, S. Martin, M. Payer, and A. M. Bayen, "On cybersecurity of freeway control systems: Analysis of coordinated ramp metering attacks," in Proc. Transp. Res. Board 94th Annu. Meet., 2015, paper 15-5248.
- J. P. Hubaux, S. Capkun, and J. Luo, "The security and privacy of smart vehicles," IEEE Security Privacy, vol. 2, no. 3, pp. 49-55, May/Jun. 2004.
- D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno, and W. H. Maisel, "Security and privacy for implantable medical devices," IEEE Perv. Comput., vol. 7, no. 1, pp. 30-39, Jan. 2008.
- Y. Mo et al., "Cyber-physical security of a smart grid infrastructure," Proc. IEEE, vol. 100, no. 1, pp. 195-209, Jan. 2012.
- M. Cheminod, L. Durante, and A. Valenzano, "Review of security issues in industrial networks," IEEE Trans. Ind. Informat., vol. 9, no. 1, pp. 277-293, Feb. 2013.
- B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-monitoring systems," IEEE Perv. Comput., vol. 5, no. 4, pp. 38-46, Oct. 2006.
- S. Amin, G. A. Schwartz, and A. Hussain, "In quest of benchmarking security risks to cyber-physical systems," IEEE Network, vol. 27, no. 1, pp. 19-24, Jan. 2013.
- A. A. Cardenas, S. Amin, and S. Sastry, "Secure control: Towards survivable cyber- physical systems," in Proc. 28th Int. Conf. Distrib. Comput. Syst. Workshops, Jun. 2008, pp. 495-500.
- J. Giraldo, E. Sarkar, A. A. Cardenas, M. Maniatakos, and M. Kantarcioglu, "Security and privacy in cyber-physical systems: A survey of surveys," IEEE Des. Test., vol. 34, no. 4, pp. 7-17, Aug. 2017.
- G. Martins, A. Moondra, A. Dubey, A. Bhattacharjee, and X. D. Koutsoukos, "Computation and communication evaluation of an authentication mechanism for time- triggered networked control systems," Sensors, vol. 16, no. 8, p. 1166, 2016.
- L. Pike, J. Sharp, M. Tullsen, P. C. Hickey, and J. Bielman, "Secure automotive software: The next steps," IEEE Software, vol. 34, no. 3, pp. 49-55, May/Jun. 2017.
- A. Banerjee, K. K. Venkatasubramanian, T. Mukherjee, and S. K. S. Gupta, "Ensuring safety, security, and sustainability of mission- critical cyber-physical systems," Proc. IEEE, vol. 100, no. 1, pp. 283-299, Jan. 2012.
- M. W. Whalen, D. Cofer, and A. Gacek, "Requirements and architectures for secure vehicles," IEEE Software, vol. 33, no. 4, pp. 22-25, Jul./Aug. 2016.
- A. A. Cárdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry, "Attacks against process control systems: Risk assessment, detection, and response," in Proc. 6th ACM Symp. Inf., Comput. Commun. Secur., Mar. 2011, pp. 355-366.
- F. Pasqualetti, F. Dörfler, and F. Bullo, "Attack detection and identification in cyber- physical systems," IEEE Trans. Autom. Control, vol. 58, no. 11, pp. 2715-2729, Nov. 2013.
- A. Ghafouri, W. Abbas, A. Laszka, Y. Vorobeychik, and X. Koutsoukos, "Optimal thresholds for anomaly-based intrusion detection in dynamical environments," in Proc. Int. Conf. Decision Game Theory Secur., 2016, pp. 415-434.
- D. I. Urbina et al., "Limiting the impact of stealthy attacks on industrial control systems," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Oct. 2016, pp. 1092-1105.
- Q. Zhu and T. Bas ¸ar, "Robust and resilient control design for cyber-physical systems with an application to power systems," in Proc. 50th IEEE Conf. Decision Control Eur. Control Conf. (CDC-ECC), Dec. 2011, pp. 4066-4071.
- M. Zhu and S. Martínez, "Attack-resilient distributed formation control via online adaptation," in Proc. 50th IEEE Conf. Decision Control Eur. Control Conf. (CDC-ECC), Dec. 2011, pp. 6624-6629.
- H. J. LeBlanc, H. Zhang, X. Koutsoukos, and S. Sundaram, "Resilient asymptotic consensus in robust networks," IEEE J. Sel. Areas Commun., vol. 31, no. 4, pp. 766-781, Apr. 2013.
- Y. Shoukry et al., "SMT-based observer design for cyber-physical systems under sensor attacks," in Proc. 7th ACM/IEEE Int. Conf. Cyber-Phys. Syst. (ICCPS), Apr. 2016, pp. 1-10.
- S. Mohan, S. Bak, E. Betti, H. Yun, L. Sha, and M. Caccamo, "S3A: Secure system simplex architecture for enhanced security and robustness of cyber-physical systems," in Proc. 2nd ACM Int. Conf. High Confidence Netw. Syst., Apr. 2013, pp. 65-74.
- M. Pajic, J. Weimer, N. Bezzo, O. Sokolsky, G. J. Pappas, and I. Lee, "Design and implementation of attack-resilient cyberphysical systems: With a focus on attack-resilient state estimators," IEEE Control Syst., vol. 37, no. 2, pp. 66-81, Apr. 2017.
- C. M. Davis, J. E. Tate, H. Okhravi, C. Grier, T. J. Overbye, and D. Nicol, "SCADA cyber security testbed development," in Proc. 38th North Amer. Power Symp. (NAPS), Sep. 2006, pp. 483-488.
- T. Kropp, "System threats and vulnerabilities [power system protection]," IEEE Power Energy Mag., vol. 4, no. 2, pp. 46-50, Mar. 2006.
- M. Mallouhi, Y. Al-Nashif, D. Cox, T. Chadaga, and S. Hariri, "A testbed for analyzing security of SCADA control systems (TASSCS)," in Proc. IEEE PES Innov. Smart Grid Technol. (ISGT), Jan. 2011, pp. 1-7.
- S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
- A. Ashok, P. Wang, M. Brown, and M. Govindarasu, "Experimental evaluation of cyber attacks on automatic generation control using a CPS security testbed," in Proc. IEEE Power Energy Soc. Gen. Meet., Jul. 2015, pp. 1-5.
- B. Ghena, W. Beyer, A. Hillaker, J. Pevarnek, and J. A. Halderman, "Green lights forever: Analyzing the security of traffic infrastructure," in Proc. 8th USENIX Workshop Offensive Technol. (WOOT), 2014, pp. 1-10.
- M. Maroti, R. Kereskényi, T. Kecskés, P. Völgyesi, and A. Lédeczi, "Online collaborative environment for designing complex computational systems," in Proc. Int. Conf. Comput. Sci. (ICCS), 2014.
- G. Hemingway, H. Neema, H. Nine, J. Sztipanovits, and G. Karsai, "Rapid synthesis of high-level architecture-based heterogeneous simulation: A model-based integration approach," Simulation, vol. 88, no. 2, pp. 217-232, 2012.
- IEEE Standard for Modeling and Simulation (M&S) High Level Architecture (HLA)- Framework and Rules, IEEE Standard 15162010, 2010, pp. 1-38.
- A. Varga, "The OMNeT++ discrete event simulation system," in Proc. Eur. Simulation Multiconf. (ESM), Prague, Czech Republic, 2001.
- D. Krajzewicz, J. Erdmann, M. Behrisch, and L. Bieker, "Recent development and applications of SUMO-Simulation of Urban MObility," Int. J. Adv. Syst. Meas., vol. 5, nos. 3-4, pp. 128-138, Dec. 2012.
- Matlab/Simulink. [Online]. Available: https://www.mathworks.com/products/ simulink.html
- A. Lédeczi et al., "Composing domain- specific design environments," IEEE Comput., vol. 34, no. 11, pp. 44-51, Nov. 2001.
- E. Long, A. Misra, and J. Sztipanovits, "Increasing productivity at Saturn," Computer, vol. 31, no. 8, pp. 35-43, Aug. 1998.
- J. L. Mathe et al., "A model-integrated, guideline-driven, clinical decision-support system," IEEE Software, vol. 26, no. 4, pp. 54-61, Jul. 2009.
- S. Shetty, S. Neema, and T. Bapty, "Model based self adaptive behavior language for large scale real time embedded systems," in Proc. 11th IEEE Int. Conf. Workshop Eng. Comput.-Based Syst., May 2004, pp. 478-483.
- H. Bagheri and K. Sullivan, "Monarch: Model-based development of software architectures," in Model Driven Engineering Languages and Systems. 2010, pp. 376-390.
- J. Bézivin, C. Brunette, R. Chevrel, F. Jouault, and I. Kurtev, "Bridging the generic modeling environment (GME) and the eclipse modeling framework (EMF)," in Proc. Best Pract. Model Driven Softw. Develop. (OOPSLA), vol. 5. 2005.
- P. Bunus, "A simulation and decision framework for selection of numerical solvers in scientific computing," in Proc. 39th Annu. Symp. Simulation, Washington, DC, USA, Apr. 2006, pp. 178-187.
- J. A. Stankovic et al., "VEST: An aspect- based composition tool for real-time systems," in Proc. 9th IEEE Real-Time Embedded Technol. Appl. Symp., May 2003, pp. 58-69.
- S. Chacon and B. Straub, Pro Git, 2nd ed. Berkely, CA, USA: Apress, 2014.
- Amazon Simple Storage Service (Amazon S3). [Online]. Available: https://aws.amazon. com/s3/
- Apr. 2017). Openstreetmap. [Online]. Available: http://openstreetmap. org
- " The JSON data interchange format," ECMA, Geneva, Switzerland, Tech. Rep. Standard ECMA-404 1st ed., Oct. 2013. [Online]. Available: http://www.ecma- international.org/publications/files/ECMA- ST/ECMA-404.pdf
- H. Neema et al., "Model-based integration platform for FMI co-simulation and heterogeneous simulations of cyber-physical systems," in Proc. 10 th Int. Modelica Conf., Lund, Sweden, 2014, no. 096, pp. 235-245.
- K. Jensen, L. M. Kristensen, and L. Wells, "Coloured Petri nets and CPN tools for modelling and validation of concurrent systems," Int. J. Softw. Tools Technol. Transfer, vol. 9, nos. 3-4, pp. 213-254, 2007.
- M. Behrisch, L. Bieker, J. Erdmann, and D. Krajzewicz, "SUMO-Simulation of Urban MObility: An overview," in Proc. 3rd Int. Conf. Adv. Syst. Simulation (SIMUL), 2011, pp. 63-68.
- Traindirector. [Online]. Available: http:// www.backerstreet.com/traindir/
- D. P. Chassin, J. C. Fuller, and N. Djilali, "GridLAB-D: An agent-based simulation framework for smart grids," J. Appl. Math., vol. 2014, 2014, Art. no. 492320.
- Inet Framework. [Online]. Available: http:// inet.omnetpp.org/
- C. F. Daganzo, "The cell transmission model: A dynamic representation of highway traffic consistent with the hydrodynamic theory," Transp. Res. B, Methodol., vol. 28, no. 4, pp. 269-287, Aug. 1994.
- A. Laszka, B. Potteiger, Y. Vorobeychik, S. Amin, and X. Koutsoukos, "Vulnerability of transportation networks to traffic-signal tampering," in Proc. 7th ACM/IEEE Int. Conf. Cyber-Phys. Syst. (ICCPS), Apr. 2016, pp. 1-10.
- C. E. Rasmussen and C. K. I. Williams, Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning).
- Cambridge, MA, USA: MIT Press, 2005.
- Y. Xie, K. Zhao, Y. Sun, and D. Chen, "Gaussian processes for short-term traffic volume forecasting," Transp. Res. Rec., J. Transp. Res. Board, vol. 2165, no. 1, pp. 69-78, 2010.
- J. Chen et al., "Decentralized data fusion and active sensing with mobile sensors for modeling and predicting spatiotemporal traffic phenomena," in Proc. 28th Conf. Uncertainty Artif. Intell. (UAI), 2012, pp. 163-173.
- P. Kou, F. Gao, and X. Guan, "Sparse online warped Gaussian process for wind power probabilistic forecasting," Appl. Energy, vol. 108, pp. 410-428, Aug. 2013.
- Y. Bazi, N. Alajlan, and F. Melgani, "Improved estimation of water chlorophyll concentration with semisupervised Gaussian process regression," IEEE Trans. Geosci. Remote Sens., vol. 50, no. 7, pp. 2733-2743, Jul. 2012.
- I. Nevat, G. W. Peters, and I. B. Collings, "Location-aware cooperative spectrum sensing via Gaussian processes," in Proc. 13th Austral. Commun. Theory Work. (AusCTW), Jan. 2012, pp. 19-24.
- A. Laszka, Y. Vorobeychik, and X. Koutsoukos, "Resilient observation selection in adversarial settings," in Proc. IEEE 54th Annu. Conf. Decision Control (CDC), Dec. 2015, pp. 7416-7421.
- D. Helbing, J. Siegmeier, and S. Lämmer, "Self-organized network flows," in Proc. NHM, 2007, vol. 2. no. 2, pp. 193-210.
- M. E. Fouladvand, M. R. Shaebani, and Z. Sadjadi, "Intelligent controlling simulation of traffic flow in a small city network," J. Phys. Soc. Jpn, vol. 73, no. 11, pp. 3209-3214, 2004.
- C. Gershenson and D. A. Rosenblueth, "Self- organizing traffic lights at multiple-street intersections," Complexity, vol. 17, no. 4, pp. 23-39, 2012.
- S. Lämmer, H. Kori, K. Peters, and D. Helbing, "Decentralised control of material or traffic flows in networks using phase-synchronisation," Phys. A, Stat. Mech. Appl., vol. 363, no. 1, pp. 39-47, Apr. 2006.
- M. Zhong, S. Sharma, and P. Lingras, "Genetically-designed time delay neural networks for multiple-interval urban freeway traffic flow forecasting," Neural Inf. Process. Lett. Rev., vol. 10, nos. 8-9, pp. 201-209, 2006.
- S. Mikami and Y. Kakazu, "Genetic reinforcement learning for cooperative traffic signal control," in Proc. 1st IEEE Conf. Evol. Comput., IEEE World Congr. Comput. Intell., vol. 1. Jun. 1994, pp. 223-228.
- T. Royani, J. Haddadnia, and M. Alipoor, "Traffic signal control for isolated intersections based on fuzzy neural network and genetic algorithm," in Proc. 10th WSEAS Int. Conf. Signal Process., Comput. Geometry Artif. Vis., 2010, pp. 87-91.
- R. Hoar, J. Penner, and C. Jacob, "Evolutionary swarm traffic: If ant roads had traffic lights," in Proc. Congr. Evol. Comput. (CEC), vol. 2. May 2002, pp. 1910-1915.
- J. Lou and Y. Vorobeychik, "Decentralization and security in dynamic traffic light control," in Proc. Symp. Bootcamp Sci. Secur., 2016, pp. 90-92.