• DocumentCode
    3077083
  • Title

    Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems

  • Author

    Fletcher, K.K. ; Xiaoqing Liu

  • Author_Institution
    Dept. of Comput. Sci., Missouri Univ. of Sci. & Technol., Rolla, MO, USA
  • fYear
    2011
  • fDate
    27-29 June 2011
  • Firstpage
    106
  • Lastpage
    113
  • Abstract
    In recent past, the security of cyber-physical systems (CPSs) has been the subject of major concern. One of the reasons is that, CPSs are often applied to mission-critical processes. Also, the automation CPSs bring in managing physical processes, and the detail of information available to them for carrying out their tasks, make securing them a prime importance. Securing CPSs is a difficult task as systems are interconnected. In order to achieve a continuous secured CPS environment, there is the need for an integrated methodology to analyze, specify and prioritize security requirements and also to develop policies to meet them. First, CPS assets are represented using high-order object models. Second, swim lane diagrams are extended to include malactivities and prevention or mitigation options to decompose use cases. We analyze security threats pertaining to the hardware components, software components and the hardware-software interaction. Security requirements are then specified, and an analytical prioritization approach, based on relative priority analysis is employed to prioritize them. Finally, security policies are then developed to meet the requirements. To demonstrate its effectiveness and evaluate its application, the proposed methodology is applied in a structured approach to a test bed - Ayushman, a Pervasive Health Monitoring System (PHMS).
  • Keywords
    formal specification; health care; medical computing; object-oriented programming; security of data; systems analysis; ubiquitous computing; Ayushman; Pervasive Health Monitoring System; cyber-physical system; hardware components; hardware-software interaction; malactivity; mission-critical process; mitigation options; policy development; prevention options; relative priority analysis; security requirement prioritization; security requirement specification; security requirements analysis; security threat analysis; software components; swim lane diagram; Analytical models; Monitoring; Object oriented modeling; Object recognition; Security; Software; Unified modeling language; CPS security requirements; CPS security requirements prioritization; cyber-physical systems (CPS); hardware-software interaction; high order object oriented modeling technique;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Secure Software Integration & Reliability Improvement Companion (SSIRI-C), 2011 5th International Conference on
  • Conference_Location
    Jeju Island
  • Print_ISBN
    978-1-4577-0781-0
  • Type

    conf

  • DOI
    10.1109/SSIRI-C.2011.25
  • Filename
    6004511