DocumentCode :
3077083
Title :
Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems
Author :
Fletcher, K.K. ; Xiaoqing Liu
Author_Institution :
Dept. of Comput. Sci., Missouri Univ. of Sci. & Technol., Rolla, MO, USA
fYear :
2011
fDate :
27-29 June 2011
Firstpage :
106
Lastpage :
113
Abstract :
In recent past, the security of cyber-physical systems (CPSs) has been the subject of major concern. One of the reasons is that, CPSs are often applied to mission-critical processes. Also, the automation CPSs bring in managing physical processes, and the detail of information available to them for carrying out their tasks, make securing them a prime importance. Securing CPSs is a difficult task as systems are interconnected. In order to achieve a continuous secured CPS environment, there is the need for an integrated methodology to analyze, specify and prioritize security requirements and also to develop policies to meet them. First, CPS assets are represented using high-order object models. Second, swim lane diagrams are extended to include malactivities and prevention or mitigation options to decompose use cases. We analyze security threats pertaining to the hardware components, software components and the hardware-software interaction. Security requirements are then specified, and an analytical prioritization approach, based on relative priority analysis is employed to prioritize them. Finally, security policies are then developed to meet the requirements. To demonstrate its effectiveness and evaluate its application, the proposed methodology is applied in a structured approach to a test bed - Ayushman, a Pervasive Health Monitoring System (PHMS).
Keywords :
formal specification; health care; medical computing; object-oriented programming; security of data; systems analysis; ubiquitous computing; Ayushman; Pervasive Health Monitoring System; cyber-physical system; hardware components; hardware-software interaction; malactivity; mission-critical process; mitigation options; policy development; prevention options; relative priority analysis; security requirement prioritization; security requirement specification; security requirements analysis; security threat analysis; software components; swim lane diagram; Analytical models; Monitoring; Object oriented modeling; Object recognition; Security; Software; Unified modeling language; CPS security requirements; CPS security requirements prioritization; cyber-physical systems (CPS); hardware-software interaction; high order object oriented modeling technique;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Secure Software Integration & Reliability Improvement Companion (SSIRI-C), 2011 5th International Conference on
Conference_Location :
Jeju Island
Print_ISBN :
978-1-4577-0781-0
Type :
conf
DOI :
10.1109/SSIRI-C.2011.25
Filename :
6004511
Link To Document :
بازگشت