DocumentCode
3077083
Title
Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems
Author
Fletcher, K.K. ; Xiaoqing Liu
Author_Institution
Dept. of Comput. Sci., Missouri Univ. of Sci. & Technol., Rolla, MO, USA
fYear
2011
fDate
27-29 June 2011
Firstpage
106
Lastpage
113
Abstract
In recent past, the security of cyber-physical systems (CPSs) has been the subject of major concern. One of the reasons is that, CPSs are often applied to mission-critical processes. Also, the automation CPSs bring in managing physical processes, and the detail of information available to them for carrying out their tasks, make securing them a prime importance. Securing CPSs is a difficult task as systems are interconnected. In order to achieve a continuous secured CPS environment, there is the need for an integrated methodology to analyze, specify and prioritize security requirements and also to develop policies to meet them. First, CPS assets are represented using high-order object models. Second, swim lane diagrams are extended to include malactivities and prevention or mitigation options to decompose use cases. We analyze security threats pertaining to the hardware components, software components and the hardware-software interaction. Security requirements are then specified, and an analytical prioritization approach, based on relative priority analysis is employed to prioritize them. Finally, security policies are then developed to meet the requirements. To demonstrate its effectiveness and evaluate its application, the proposed methodology is applied in a structured approach to a test bed - Ayushman, a Pervasive Health Monitoring System (PHMS).
Keywords
formal specification; health care; medical computing; object-oriented programming; security of data; systems analysis; ubiquitous computing; Ayushman; Pervasive Health Monitoring System; cyber-physical system; hardware components; hardware-software interaction; malactivity; mission-critical process; mitigation options; policy development; prevention options; relative priority analysis; security requirement prioritization; security requirement specification; security requirements analysis; security threat analysis; software components; swim lane diagram; Analytical models; Monitoring; Object oriented modeling; Object recognition; Security; Software; Unified modeling language; CPS security requirements; CPS security requirements prioritization; cyber-physical systems (CPS); hardware-software interaction; high order object oriented modeling technique;
fLanguage
English
Publisher
ieee
Conference_Titel
Secure Software Integration & Reliability Improvement Companion (SSIRI-C), 2011 5th International Conference on
Conference_Location
Jeju Island
Print_ISBN
978-1-4577-0781-0
Type
conf
DOI
10.1109/SSIRI-C.2011.25
Filename
6004511
Link To Document