Incremental Security Enforcement for Cyber-Physical Systems

Cyber-Physical attacks (CP-attacks) are launched either from the cyber-space or from the physical-space to take control of a Cyber-Physical System (CPS). Unlike conventional cyber-attacks, which are prevented through new security patches as new attacks emerge, there are no known mechanisms for incre...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE access Ročník 11; s. 1
Hlavní autoři: Panda, Abhinandan, Baird, Alex, Pinisetty, Srinivas, Roop, Partha
Médium: Journal Article
Jazyk:angličtina
Vydáno: Piscataway IEEE 01.01.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Témata:
ISSN:2169-3536, 2169-3536
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Cyber-Physical attacks (CP-attacks) are launched either from the cyber-space or from the physical-space to take control of a Cyber-Physical System (CPS). Unlike conventional cyber-attacks, which are prevented through new security patches as new attacks emerge, there are no known mechanisms for incrementally patching CPS in the event of new attacks. To this end, we develop a novel approach based on recent advances in mitigating CP-attacks using run-time enforcement (RE). RE-methods have been developed for CPS, such as industrial processes and pacemakers. However, the proposed solutions are not developed considering the need for future patching as new attacks emerge. To this end, we develop the first compositional RE framework, which is specifically developed to be able to add new security patches as new security policies are added. We illustrate our approach using the case study of a drone swarm. The experimental results show that the proposed compositional/incremental approach does not suffer from the state space explosion, unlike the monolithic composition. We demonstrate a linear relationship between compile time, compile size, and execution time as the number of policies increases in the proposed compositional scheme.
AbstractList Cyber-Physical attacks (CP-attacks) are launched either from the cyber-space or from the physical-space to take control of a Cyber-Physical System (CPS). Unlike conventional cyber-attacks, which are prevented through new security patches as new attacks emerge, there are no known mechanisms for incrementally patching CPS in the event of new attacks. To this end, we develop a novel approach based on recent advances in mitigating CP-attacks using run-time enforcement (RE). RE-methods have been developed for CPS, such as industrial processes and pacemakers. However, the proposed solutions are not developed considering the need for future patching as new attacks emerge. To this end, we develop the first compositional RE framework, which is specifically developed to be able to add new security patches as new security policies are added. We illustrate our approach using the case study of a drone swarm. The experimental results show that the proposed compositional/incremental approach does not suffer from the state space explosion, unlike the monolithic composition. We demonstrate a linear relationship between compile time, compile size, and execution time as the number of policies increases in the proposed compositional scheme.
Author Baird, Alex
Roop, Partha
Pinisetty, Srinivas
Panda, Abhinandan
Author_xml – sequence: 1
  givenname: Abhinandan
  orcidid: 0000-0001-5469-7032
  surname: Panda
  fullname: Panda, Abhinandan
  organization: School of Electrical Sciences, IIT Bhubaneswar, Bhubaneswar, India
– sequence: 2
  givenname: Alex
  surname: Baird
  fullname: Baird, Alex
  organization: Dept. of Electr. & Comput. Eng, University of Auckland, Auckland, New Zealand
– sequence: 3
  givenname: Srinivas
  orcidid: 0000-0001-7779-8231
  surname: Pinisetty
  fullname: Pinisetty, Srinivas
  organization: School of Electrical Sciences, IIT Bhubaneswar, Bhubaneswar, India
– sequence: 4
  givenname: Partha
  surname: Roop
  fullname: Roop, Partha
  organization: Dept. of Electr. & Comput. Eng, University of Auckland, Auckland, New Zealand
BookMark eNqFUE1rGzEQFSWFJql_QXsw5LyOZvWxEj2FxWkNgRTcnsWsVmpl7FUqyYf991lnTQi9ZC4zPN7H8K7IxRAHR8gXoCsAqm_v2na93a5qWrMVq7mEGj6Qyxqkrphg8uLN_Yksct7RadQEieaSfNsMNrmDGwrul1tnjymUcbkefEz2BV5O17IdO5eqn3_HHOyJN-biDvkz-ehxn93ivK_J7_v1r_ZH9fD4fdPePVSWU12q3slaCkktWMk7br10XEnutOai6wG9YgqVpb4G1Oi1Z70Fjz1DL2gnJbsmm9m3j7gzTykcMI0mYjAvQEx_DKYS7N4ZBlJ6rqFXvOHYuQ49YG-VEBx6aJrJ62b2ekrx39HlYnbxmIbpfVM3imoFuhETi80sm2LOyfnXVKDmVLqZSzen0s259Eml_1PZULCEOJSEYf-O9uusDc65N2mUNxoEewal5pE-
CODEN IAECCG
CitedBy_id crossref_primary_10_1109_ACCESS_2024_3357714
crossref_primary_10_1109_JSYST_2023_3303361
crossref_primary_10_1109_ACCESS_2024_3450631
Cites_doi 10.1007/978-3-662-46681-0_51
10.1016/j.trip.2019.100088
10.1016/j.arcontrol.2019.03.010
10.1007/s10703-022-00401-y
10.1109/TII.2017.2676005
10.1007/978-3-030-47218-4_3
10.1109/MEMOCODE57689.2022.9954593
10.1016/j.iot.2020.100218
10.1145/353323.353382
10.1109/JPROC.2002.805826
10.1145/2461446.2461465
10.1109/TII.2017.2656905
10.1109/MIC.2016.104
10.1109/QRS-C.2017.91
10.1109/TII.2019.2956474
10.1007/s10207-014-0239-8
10.1109/UVS.2019.8658279
10.1109/TII.2019.2945520
10.1109/JIOT.2019.2899492
10.1145/2676726.2676978
10.1109/TII.2019.2963294
10.1109/JIOT.2017.2703172
10.1016/j.jlap.2008.08.004
10.1109/SECPRI.2000.848455
10.1109/MCOM.2017.1600799CM
10.1109/SECPRI.1999.766714
10.1109/JIOT.2019.2919066
10.1145/3359986.3361200
10.1007/978-3-319-40648-0_7
10.1145/1455526.1455532
10.1145/1525880.1525882
10.1007/978-1-4471-3227-1_8
10.2197/ipsjjip.19.292
10.1007/s10703-014-0215-y
10.1145/1357054.1357285
10.1145/3092282.3092291
10.1007/s10703-011-0114-4
10.1109/TMC.2021.3062225
10.1109/ISORC.2008.25
10.1007/978-0-387-75462-8_6
10.1109/ICIoT48696.2020.9089515
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2023.3246121
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library Online
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList Materials Research Database


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 1
ExternalDocumentID oai_doaj_org_article_3166f491d8474abebaf1adc85541d177
10_1109_ACCESS_2023_3246121
10047915
Genre orig-research
GrantInformation_xml – fundername: The Ministry of Human Resource Development, Government of India
  grantid: SPARC~P#701
GroupedDBID 0R~
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
4.4
AAYXX
AGSQL
CITATION
EJD
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c409t-de626560c1c64b4cf6e4864e9945bd1af838a8c0f21a9af9f3dc1fad3af50b663
IEDL.DBID RIE
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000942291100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2169-3536
IngestDate Fri Oct 03 12:51:52 EDT 2025
Mon Jun 30 03:23:10 EDT 2025
Tue Nov 18 21:22:39 EST 2025
Sat Nov 29 04:02:25 EST 2025
Wed Aug 27 02:21:21 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by-nc-nd/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c409t-de626560c1c64b4cf6e4864e9945bd1af838a8c0f21a9af9f3dc1fad3af50b663
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-5469-7032
0000-0001-7779-8231
0000-0001-5504-8683
OpenAccessLink https://ieeexplore.ieee.org/document/10047915
PQID 2780981975
PQPubID 4845423
PageCount 1
ParticipantIDs crossref_citationtrail_10_1109_ACCESS_2023_3246121
doaj_primary_oai_doaj_org_article_3166f491d8474abebaf1adc85541d177
proquest_journals_2780981975
crossref_primary_10_1109_ACCESS_2023_3246121
ieee_primary_10047915
PublicationCentury 2000
PublicationDate 2023-01-01
PublicationDateYYYYMMDD 2023-01-01
PublicationDate_xml – month: 01
  year: 2023
  text: 2023-01-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2023
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
ref11
ref10
ref17
ref16
ref19
ref18
ref46
ref45
ref48
ref47
ref41
ref43
(ref44) 2022
ref8
ref9
ref3
ref6
ref40
ref35
ref34
ref37
(ref4) 2022
ref36
Hambling (ref42) 2021
ref31
ref30
ref33
ref32
Lee (ref7) 2014; 30
ref1
Loukas (ref2) 2015
Langner (ref5) 2013
ref39
ref38
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
(ref49) 2022
ref29
References_xml – ident: ref34
  doi: 10.1007/978-3-662-46681-0_51
– ident: ref43
  doi: 10.1016/j.trip.2019.100088
– ident: ref16
  doi: 10.1016/j.arcontrol.2019.03.010
– ident: ref20
  doi: 10.1007/s10703-022-00401-y
– ident: ref26
  doi: 10.1109/TII.2017.2676005
– ident: ref48
  doi: 10.1007/978-3-030-47218-4_3
– ident: ref33
  doi: 10.1109/MEMOCODE57689.2022.9954593
– ident: ref8
  doi: 10.1016/j.iot.2020.100218
– ident: ref9
  doi: 10.1145/353323.353382
– volume-title: Cyber-Physical Attacks: A Growing Invisible Threat
  year: 2015
  ident: ref2
– ident: ref40
  doi: 10.1109/JPROC.2002.805826
– ident: ref18
  doi: 10.1145/2461446.2461465
– ident: ref27
  doi: 10.1109/TII.2017.2656905
– ident: ref24
  doi: 10.1109/MIC.2016.104
– ident: ref25
  doi: 10.1109/QRS-C.2017.91
– volume-title: Predatory Sparrow Massively Disrupts Steel Factories While Keeping Workers Safe
  year: 2022
  ident: ref4
– ident: ref29
  doi: 10.1109/TII.2019.2956474
– volume-title: Wing
  year: 2022
  ident: ref44
– ident: ref32
  doi: 10.1007/s10207-014-0239-8
– ident: ref45
  doi: 10.1109/UVS.2019.8658279
– ident: ref23
  doi: 10.1109/TII.2019.2945520
– ident: ref31
  doi: 10.1109/JIOT.2019.2899492
– ident: ref13
  doi: 10.1145/2676726.2676978
– ident: ref28
  doi: 10.1109/TII.2019.2963294
– ident: ref3
  doi: 10.1109/JIOT.2017.2703172
– ident: ref15
  doi: 10.1016/j.jlap.2008.08.004
– volume: 30
  start-page: 1
  issue: 62
  year: 2014
  ident: ref7
  article-title: German steel mill cyber attack
  publication-title: Ind. Control Syst.
– volume-title: This Record-Breaking Shanghai Drone Display is a Show of Technological Strength
  year: 2021
  ident: ref42
– ident: ref38
  doi: 10.1109/SECPRI.2000.848455
– ident: ref17
  doi: 10.1109/MCOM.2017.1600799CM
– ident: ref39
  doi: 10.1109/SECPRI.1999.766714
– ident: ref30
  doi: 10.1109/JIOT.2019.2919066
– ident: ref14
  doi: 10.1145/3359986.3361200
– ident: ref19
  doi: 10.1007/978-3-319-40648-0_7
– ident: ref21
  doi: 10.1007/978-3-319-40648-0_7
– ident: ref11
  doi: 10.1145/1455526.1455532
– ident: ref35
  doi: 10.1145/1525880.1525882
– ident: ref41
  doi: 10.1007/978-1-4471-3227-1_8
– ident: ref36
  doi: 10.2197/ipsjjip.19.292
– ident: ref12
  doi: 10.1007/s10703-014-0215-y
– ident: ref37
  doi: 10.1145/1357054.1357285
– volume-title: EMAX MT2213 935 kV Multicopter Brushless Motor
  year: 2022
  ident: ref49
– year: 2013
  ident: ref5
  article-title: To kill a centrifuge: A technical analysis of what stuxnet’s creators tried to achieve
– ident: ref22
  doi: 10.1145/3092282.3092291
– ident: ref10
  doi: 10.1007/s10703-011-0114-4
– ident: ref47
  doi: 10.1109/TMC.2021.3062225
– ident: ref1
  doi: 10.1109/ISORC.2008.25
– ident: ref6
  doi: 10.1007/978-0-387-75462-8_6
– ident: ref46
  doi: 10.1109/ICIoT48696.2020.9089515
SSID ssj0000816957
Score 2.2986195
Snippet Cyber-Physical attacks (CP-attacks) are launched either from the cyber-space or from the physical-space to take control of a Cyber-Physical System (CPS)....
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Bidirectional control
Cyber-physical systems
Cyberattack
Cybersecurity
Drones
Monitoring
Policies
Runtime
Runtime Enforcement
Security
Synchronous Programming
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NSwMxEA1SPOhB_KhYrbIHj26b7GbzgadaWjyVggq9hSSbgCBV2ir4751k01IR9OJtCclmM28nmQnJewhdMy2wN5znhfMsp5qXuaEOg-OZsrASFiFXR7EJPpmI2UxOt6S-wpmwhh64MVy_JIx5KkkN0yjVxhntia5tOF1FasLjPXKIeraSqTgHC8JkxRPNEMGyPxgOYUS9oBbeKwOJWkG-LUWRsT9JrPyYl-NiMz5EBylKzAbN1x2hHTc_Rvtb3IEn6BY8u9nbg4oPSYUuG4XbRTYWZ_CUDT-NW-TTBEaW-Mnb6Gk8ehze50kJIbeQf63y2kHeAbGJJZZRQ61njgpGnZS0MjXRXpRCC4t9QbTUXvqytsTrutS-wgaCilPUmr_O3RnKRMUhymFGSscpBTgshRQR3ldojrGlHVSsjaJsogkPahUvKqYLWKrGkipYUiVLdtDNptFbw5Lxe_W7YO1N1UBxHQsAeJWAV38B30HtgNVWf4Etn1Qd1F2Dp5I_LlXBBZYQ_PDq_D_6vkB7YTzNVkwXtVaLd3eJdu3H6nm5uIq_4hduIt47
  priority: 102
  providerName: Directory of Open Access Journals
Title Incremental Security Enforcement for Cyber-Physical Systems
URI https://ieeexplore.ieee.org/document/10047915
https://www.proquest.com/docview/2780981975
https://doaj.org/article/3166f491d8474abebaf1adc85541d177
Volume 11
WOSCitedRecordID wos000942291100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: DOA
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: M~E
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEA4qHvTgc8XqKj14tLtJmzYJnnRZ8aIIKuwt5AmCrLIPwYu_3UkaF0UUvJQQkjad6XQeyXyD0EmjOPaasaJ0vimoYlWhqcMgeLoqjQAl5GwsNsFubvhoJG5TsnrMhXHOxcNnrheacS_fPpt5CJX1SQREDynly4yxNllrEVAJFSREzRKyEMGifz4YwEv0QoHwXhVw00ryTftEkP5UVeXHrzjql8vNf65sC20kQzI_bzm_jZbceAetf4EX3EVnIPxt-A8G3qVCdfkwJCCZ2J1DKx-8aTcpbhO_8gRh3kEPl8P7wVWRiiUUBly0WWEduCZgvhhiGqqp8Y2jvKFOCFprS5TnFVfcYF8SJZQXvrKGeGUr5Wuswe7YQyvj57HbRzmvGRhCjRbCMUqBY4aCFwn3KxXD2NAMlZ9ElCYhiYeCFk8yehRYyJbyMlBeJspn6HQx6aUF0vh7-EXgzmJoQMGOHUB2mYRKVqRpPBXEgoqlSjutPFHWhJN3xBLGMtQJrPryvJZLGep-MlsmkZ3KknEswD5i9cEv0w7RWlhiG4DpopXZZO6O0Kp5nT1OJ8fRm4fr9fvwOH6ZHy-83eg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB5EBfXgW1yfPXi0a9KmTYMnXRRFXQQVvIU8QZBV1lXw3ztJ46KIgrcQJm060-k8mvkGYK9WDfGa87xwvs6Z4mWumSOoeLosjEAj5GxsNsH7_eb-XlynYvVYC-Oci4fPXDcM4798-2ReQ6rsgEZA9FBSPlUxVtC2XGucUgk9JETFE7YQJeLgqNfDx-iGFuHdMiCnFfSb_Ykw_amvyo-PcbQwpwv_3NsizCdXMjtqZb8EE26wDHNfAAZX4BDVv00AIuFNalWXnYQSJBOnMxxlvXfthvl1kliWQMxX4e705LZ3lqd2CbnBIG2UW4fBCTowhpqaaWZ87VhTMycEq7SlyjdloxpDfEGVUF740hrqlS2Vr4hGz2MNJgdPA7cOWVNxdIVqLYTjyGgjDMM4Eq9XKE6IYR0oPpkoTcISDy0tHmWMKYiQLedl4LxMnO_A_njRcwul8Tf5cZDOmDTgYMcJZLtMaiVLWteeCWrRyDKlnVaeKmvC2TtqKecdWA2i-nK_Vkod2PoUtkxK-yIL3hCBHhKvNn5ZtgszZ7dXl_LyvH-xCbNhu206ZgsmR8NXtw3T5m308DLciW_mB2xK3wk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Incremental+Security+Enforcement+for+Cyber-Physical+Systems&rft.jtitle=IEEE+access&rft.au=Panda%2C+Abhinandan&rft.au=Baird%2C+Alex&rft.au=Pinisetty%2C+Srinivas&rft.au=Roop%2C+Partha&rft.date=2023-01-01&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=11&rft.spage=18475&rft.epage=18498&rft_id=info:doi/10.1109%2FACCESS.2023.3246121&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2023_3246121
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon