Incremental Security Enforcement for Cyber-Physical Systems
Cyber-Physical attacks (CP-attacks) are launched either from the cyber-space or from the physical-space to take control of a Cyber-Physical System (CPS). Unlike conventional cyber-attacks, which are prevented through new security patches as new attacks emerge, there are no known mechanisms for incre...
Uloženo v:
| Vydáno v: | IEEE access Ročník 11; s. 1 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Piscataway
IEEE
01.01.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Témata: | |
| ISSN: | 2169-3536, 2169-3536 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Cyber-Physical attacks (CP-attacks) are launched either from the cyber-space or from the physical-space to take control of a Cyber-Physical System (CPS). Unlike conventional cyber-attacks, which are prevented through new security patches as new attacks emerge, there are no known mechanisms for incrementally patching CPS in the event of new attacks. To this end, we develop a novel approach based on recent advances in mitigating CP-attacks using run-time enforcement (RE). RE-methods have been developed for CPS, such as industrial processes and pacemakers. However, the proposed solutions are not developed considering the need for future patching as new attacks emerge. To this end, we develop the first compositional RE framework, which is specifically developed to be able to add new security patches as new security policies are added. We illustrate our approach using the case study of a drone swarm. The experimental results show that the proposed compositional/incremental approach does not suffer from the state space explosion, unlike the monolithic composition. We demonstrate a linear relationship between compile time, compile size, and execution time as the number of policies increases in the proposed compositional scheme. |
|---|---|
| AbstractList | Cyber-Physical attacks (CP-attacks) are launched either from the cyber-space or from the physical-space to take control of a Cyber-Physical System (CPS). Unlike conventional cyber-attacks, which are prevented through new security patches as new attacks emerge, there are no known mechanisms for incrementally patching CPS in the event of new attacks. To this end, we develop a novel approach based on recent advances in mitigating CP-attacks using run-time enforcement (RE). RE-methods have been developed for CPS, such as industrial processes and pacemakers. However, the proposed solutions are not developed considering the need for future patching as new attacks emerge. To this end, we develop the first compositional RE framework, which is specifically developed to be able to add new security patches as new security policies are added. We illustrate our approach using the case study of a drone swarm. The experimental results show that the proposed compositional/incremental approach does not suffer from the state space explosion, unlike the monolithic composition. We demonstrate a linear relationship between compile time, compile size, and execution time as the number of policies increases in the proposed compositional scheme. |
| Author | Baird, Alex Roop, Partha Pinisetty, Srinivas Panda, Abhinandan |
| Author_xml | – sequence: 1 givenname: Abhinandan orcidid: 0000-0001-5469-7032 surname: Panda fullname: Panda, Abhinandan organization: School of Electrical Sciences, IIT Bhubaneswar, Bhubaneswar, India – sequence: 2 givenname: Alex surname: Baird fullname: Baird, Alex organization: Dept. of Electr. & Comput. Eng, University of Auckland, Auckland, New Zealand – sequence: 3 givenname: Srinivas orcidid: 0000-0001-7779-8231 surname: Pinisetty fullname: Pinisetty, Srinivas organization: School of Electrical Sciences, IIT Bhubaneswar, Bhubaneswar, India – sequence: 4 givenname: Partha surname: Roop fullname: Roop, Partha organization: Dept. of Electr. & Comput. Eng, University of Auckland, Auckland, New Zealand |
| BookMark | eNqFUE1rGzEQFSWFJql_QXsw5LyOZvWxEj2FxWkNgRTcnsWsVmpl7FUqyYf991lnTQi9ZC4zPN7H8K7IxRAHR8gXoCsAqm_v2na93a5qWrMVq7mEGj6Qyxqkrphg8uLN_Yksct7RadQEieaSfNsMNrmDGwrul1tnjymUcbkefEz2BV5O17IdO5eqn3_HHOyJN-biDvkz-ehxn93ivK_J7_v1r_ZH9fD4fdPePVSWU12q3slaCkktWMk7br10XEnutOai6wG9YgqVpb4G1Oi1Z70Fjz1DL2gnJbsmm9m3j7gzTykcMI0mYjAvQEx_DKYS7N4ZBlJ6rqFXvOHYuQ49YG-VEBx6aJrJ62b2ekrx39HlYnbxmIbpfVM3imoFuhETi80sm2LOyfnXVKDmVLqZSzen0s259Eml_1PZULCEOJSEYf-O9uusDc65N2mUNxoEewal5pE- |
| CODEN | IAECCG |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3357714 crossref_primary_10_1109_JSYST_2023_3303361 crossref_primary_10_1109_ACCESS_2024_3450631 |
| Cites_doi | 10.1007/978-3-662-46681-0_51 10.1016/j.trip.2019.100088 10.1016/j.arcontrol.2019.03.010 10.1007/s10703-022-00401-y 10.1109/TII.2017.2676005 10.1007/978-3-030-47218-4_3 10.1109/MEMOCODE57689.2022.9954593 10.1016/j.iot.2020.100218 10.1145/353323.353382 10.1109/JPROC.2002.805826 10.1145/2461446.2461465 10.1109/TII.2017.2656905 10.1109/MIC.2016.104 10.1109/QRS-C.2017.91 10.1109/TII.2019.2956474 10.1007/s10207-014-0239-8 10.1109/UVS.2019.8658279 10.1109/TII.2019.2945520 10.1109/JIOT.2019.2899492 10.1145/2676726.2676978 10.1109/TII.2019.2963294 10.1109/JIOT.2017.2703172 10.1016/j.jlap.2008.08.004 10.1109/SECPRI.2000.848455 10.1109/MCOM.2017.1600799CM 10.1109/SECPRI.1999.766714 10.1109/JIOT.2019.2919066 10.1145/3359986.3361200 10.1007/978-3-319-40648-0_7 10.1145/1455526.1455532 10.1145/1525880.1525882 10.1007/978-1-4471-3227-1_8 10.2197/ipsjjip.19.292 10.1007/s10703-014-0215-y 10.1145/1357054.1357285 10.1145/3092282.3092291 10.1007/s10703-011-0114-4 10.1109/TMC.2021.3062225 10.1109/ISORC.2008.25 10.1007/978-0-387-75462-8_6 10.1109/ICIoT48696.2020.9089515 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
| DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
| DOI | 10.1109/ACCESS.2023.3246121 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library Online CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Materials Research Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2169-3536 |
| EndPage | 1 |
| ExternalDocumentID | oai_doaj_org_article_3166f491d8474abebaf1adc85541d177 10_1109_ACCESS_2023_3246121 10047915 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: The Ministry of Human Resource Development, Government of India grantid: SPARC~P#701 |
| GroupedDBID | 0R~ 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS 4.4 AAYXX AGSQL CITATION EJD 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c409t-de626560c1c64b4cf6e4864e9945bd1af838a8c0f21a9af9f3dc1fad3af50b663 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 4 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000942291100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2169-3536 |
| IngestDate | Fri Oct 03 12:51:52 EDT 2025 Mon Jun 30 03:23:10 EDT 2025 Tue Nov 18 21:22:39 EST 2025 Sat Nov 29 04:02:25 EST 2025 Wed Aug 27 02:21:21 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://creativecommons.org/licenses/by-nc-nd/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c409t-de626560c1c64b4cf6e4864e9945bd1af838a8c0f21a9af9f3dc1fad3af50b663 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-5469-7032 0000-0001-7779-8231 0000-0001-5504-8683 |
| OpenAccessLink | https://ieeexplore.ieee.org/document/10047915 |
| PQID | 2780981975 |
| PQPubID | 4845423 |
| PageCount | 1 |
| ParticipantIDs | crossref_citationtrail_10_1109_ACCESS_2023_3246121 doaj_primary_oai_doaj_org_article_3166f491d8474abebaf1adc85541d177 proquest_journals_2780981975 crossref_primary_10_1109_ACCESS_2023_3246121 ieee_primary_10047915 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-01-01 |
| PublicationDateYYYYMMDD | 2023-01-01 |
| PublicationDate_xml | – month: 01 year: 2023 text: 2023-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE access |
| PublicationTitleAbbrev | Access |
| PublicationYear | 2023 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ref15 ref14 ref11 ref10 ref17 ref16 ref19 ref18 ref46 ref45 ref48 ref47 ref41 ref43 (ref44) 2022 ref8 ref9 ref3 ref6 ref40 ref35 ref34 ref37 (ref4) 2022 ref36 Hambling (ref42) 2021 ref31 ref30 ref33 ref32 Lee (ref7) 2014; 30 ref1 Loukas (ref2) 2015 Langner (ref5) 2013 ref39 ref38 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 (ref49) 2022 ref29 |
| References_xml | – ident: ref34 doi: 10.1007/978-3-662-46681-0_51 – ident: ref43 doi: 10.1016/j.trip.2019.100088 – ident: ref16 doi: 10.1016/j.arcontrol.2019.03.010 – ident: ref20 doi: 10.1007/s10703-022-00401-y – ident: ref26 doi: 10.1109/TII.2017.2676005 – ident: ref48 doi: 10.1007/978-3-030-47218-4_3 – ident: ref33 doi: 10.1109/MEMOCODE57689.2022.9954593 – ident: ref8 doi: 10.1016/j.iot.2020.100218 – ident: ref9 doi: 10.1145/353323.353382 – volume-title: Cyber-Physical Attacks: A Growing Invisible Threat year: 2015 ident: ref2 – ident: ref40 doi: 10.1109/JPROC.2002.805826 – ident: ref18 doi: 10.1145/2461446.2461465 – ident: ref27 doi: 10.1109/TII.2017.2656905 – ident: ref24 doi: 10.1109/MIC.2016.104 – ident: ref25 doi: 10.1109/QRS-C.2017.91 – volume-title: Predatory Sparrow Massively Disrupts Steel Factories While Keeping Workers Safe year: 2022 ident: ref4 – ident: ref29 doi: 10.1109/TII.2019.2956474 – volume-title: Wing year: 2022 ident: ref44 – ident: ref32 doi: 10.1007/s10207-014-0239-8 – ident: ref45 doi: 10.1109/UVS.2019.8658279 – ident: ref23 doi: 10.1109/TII.2019.2945520 – ident: ref31 doi: 10.1109/JIOT.2019.2899492 – ident: ref13 doi: 10.1145/2676726.2676978 – ident: ref28 doi: 10.1109/TII.2019.2963294 – ident: ref3 doi: 10.1109/JIOT.2017.2703172 – ident: ref15 doi: 10.1016/j.jlap.2008.08.004 – volume: 30 start-page: 1 issue: 62 year: 2014 ident: ref7 article-title: German steel mill cyber attack publication-title: Ind. Control Syst. – volume-title: This Record-Breaking Shanghai Drone Display is a Show of Technological Strength year: 2021 ident: ref42 – ident: ref38 doi: 10.1109/SECPRI.2000.848455 – ident: ref17 doi: 10.1109/MCOM.2017.1600799CM – ident: ref39 doi: 10.1109/SECPRI.1999.766714 – ident: ref30 doi: 10.1109/JIOT.2019.2919066 – ident: ref14 doi: 10.1145/3359986.3361200 – ident: ref19 doi: 10.1007/978-3-319-40648-0_7 – ident: ref21 doi: 10.1007/978-3-319-40648-0_7 – ident: ref11 doi: 10.1145/1455526.1455532 – ident: ref35 doi: 10.1145/1525880.1525882 – ident: ref41 doi: 10.1007/978-1-4471-3227-1_8 – ident: ref36 doi: 10.2197/ipsjjip.19.292 – ident: ref12 doi: 10.1007/s10703-014-0215-y – ident: ref37 doi: 10.1145/1357054.1357285 – volume-title: EMAX MT2213 935 kV Multicopter Brushless Motor year: 2022 ident: ref49 – year: 2013 ident: ref5 article-title: To kill a centrifuge: A technical analysis of what stuxnet’s creators tried to achieve – ident: ref22 doi: 10.1145/3092282.3092291 – ident: ref10 doi: 10.1007/s10703-011-0114-4 – ident: ref47 doi: 10.1109/TMC.2021.3062225 – ident: ref1 doi: 10.1109/ISORC.2008.25 – ident: ref6 doi: 10.1007/978-0-387-75462-8_6 – ident: ref46 doi: 10.1109/ICIoT48696.2020.9089515 |
| SSID | ssj0000816957 |
| Score | 2.2986195 |
| Snippet | Cyber-Physical attacks (CP-attacks) are launched either from the cyber-space or from the physical-space to take control of a Cyber-Physical System (CPS).... |
| SourceID | doaj proquest crossref ieee |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Bidirectional control Cyber-physical systems Cyberattack Cybersecurity Drones Monitoring Policies Runtime Runtime Enforcement Security Synchronous Programming |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NSwMxEA1SPOhB_KhYrbIHj26b7GbzgadaWjyVggq9hSSbgCBV2ir4751k01IR9OJtCclmM28nmQnJewhdMy2wN5znhfMsp5qXuaEOg-OZsrASFiFXR7EJPpmI2UxOt6S-wpmwhh64MVy_JIx5KkkN0yjVxhntia5tOF1FasLjPXKIeraSqTgHC8JkxRPNEMGyPxgOYUS9oBbeKwOJWkG-LUWRsT9JrPyYl-NiMz5EBylKzAbN1x2hHTc_Rvtb3IEn6BY8u9nbg4oPSYUuG4XbRTYWZ_CUDT-NW-TTBEaW-Mnb6Gk8ehze50kJIbeQf63y2kHeAbGJJZZRQ61njgpGnZS0MjXRXpRCC4t9QbTUXvqytsTrutS-wgaCilPUmr_O3RnKRMUhymFGSscpBTgshRQR3ldojrGlHVSsjaJsogkPahUvKqYLWKrGkipYUiVLdtDNptFbw5Lxe_W7YO1N1UBxHQsAeJWAV38B30HtgNVWf4Etn1Qd1F2Dp5I_LlXBBZYQ_PDq_D_6vkB7YTzNVkwXtVaLd3eJdu3H6nm5uIq_4hduIt47 priority: 102 providerName: Directory of Open Access Journals |
| Title | Incremental Security Enforcement for Cyber-Physical Systems |
| URI | https://ieeexplore.ieee.org/document/10047915 https://www.proquest.com/docview/2780981975 https://doaj.org/article/3166f491d8474abebaf1adc85541d177 |
| Volume | 11 |
| WOSCitedRecordID | wos000942291100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: DOA dateStart: 20130101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: M~E dateStart: 20130101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEA4qHvTgc8XqKj14tLtJmzYJnnRZ8aIIKuwt5AmCrLIPwYu_3UkaF0UUvJQQkjad6XQeyXyD0EmjOPaasaJ0vimoYlWhqcMgeLoqjQAl5GwsNsFubvhoJG5TsnrMhXHOxcNnrheacS_fPpt5CJX1SQREDynly4yxNllrEVAJFSREzRKyEMGifz4YwEv0QoHwXhVw00ryTftEkP5UVeXHrzjql8vNf65sC20kQzI_bzm_jZbceAetf4EX3EVnIPxt-A8G3qVCdfkwJCCZ2J1DKx-8aTcpbhO_8gRh3kEPl8P7wVWRiiUUBly0WWEduCZgvhhiGqqp8Y2jvKFOCFprS5TnFVfcYF8SJZQXvrKGeGUr5Wuswe7YQyvj57HbRzmvGRhCjRbCMUqBY4aCFwn3KxXD2NAMlZ9ElCYhiYeCFk8yehRYyJbyMlBeJspn6HQx6aUF0vh7-EXgzmJoQMGOHUB2mYRKVqRpPBXEgoqlSjutPFHWhJN3xBLGMtQJrPryvJZLGep-MlsmkZ3KknEswD5i9cEv0w7RWlhiG4DpopXZZO6O0Kp5nT1OJ8fRm4fr9fvwOH6ZHy-83eg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB5EBfXgW1yfPXi0a9KmTYMnXRRFXQQVvIU8QZBV1lXw3ztJ46KIgrcQJm060-k8mvkGYK9WDfGa87xwvs6Z4mWumSOoeLosjEAj5GxsNsH7_eb-XlynYvVYC-Oci4fPXDcM4798-2ReQ6rsgEZA9FBSPlUxVtC2XGucUgk9JETFE7YQJeLgqNfDx-iGFuHdMiCnFfSb_Ykw_amvyo-PcbQwpwv_3NsizCdXMjtqZb8EE26wDHNfAAZX4BDVv00AIuFNalWXnYQSJBOnMxxlvXfthvl1kliWQMxX4e705LZ3lqd2CbnBIG2UW4fBCTowhpqaaWZ87VhTMycEq7SlyjdloxpDfEGVUF740hrqlS2Vr4hGz2MNJgdPA7cOWVNxdIVqLYTjyGgjDMM4Eq9XKE6IYR0oPpkoTcISDy0tHmWMKYiQLedl4LxMnO_A_njRcwul8Tf5cZDOmDTgYMcJZLtMaiVLWteeCWrRyDKlnVaeKmvC2TtqKecdWA2i-nK_Vkod2PoUtkxK-yIL3hCBHhKvNn5ZtgszZ7dXl_LyvH-xCbNhu206ZgsmR8NXtw3T5m308DLciW_mB2xK3wk |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Incremental+Security+Enforcement+for+Cyber-Physical+Systems&rft.jtitle=IEEE+access&rft.au=Panda%2C+Abhinandan&rft.au=Baird%2C+Alex&rft.au=Pinisetty%2C+Srinivas&rft.au=Roop%2C+Partha&rft.date=2023-01-01&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=11&rft.spage=18475&rft.epage=18498&rft_id=info:doi/10.1109%2FACCESS.2023.3246121&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2023_3246121 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |