Abstract

Cyber-attacks threaten the safety of cyber physical systems (CPSs) as a result of the existence of weaknesses in the multiple structural units constituting them. In this paper, three cyber physical systems case studies of a pressurized water nuclear power plant (NPP), an industrial control system (ICS), and a vehicular network system (VNS) are examined, formally presented, and implemented utilizing Architecture Analysis and Design Language, determining system design, links, weaknesses, resources, potential attack instances, and their pre-and post-conditions. Then, the developed plant models are checked with a security property using JKind model checker embedded software. The attack graphs causing plants disruptions for the three applications are graphically visualized using a new graphical user interface (GUI) windows application.

Highlights

  • Modeling cyber-attack is an important issue for securing cyber physical systems (CPSs).The pervasive smart environment in Internet of Things (IoTs) has the potential to monitor various human activities by using smart devices

  • The analysis shows that individual medical device safety does not equate to interoperable medical devices (IMDs) safety, despite having a trusted coordinator

  • The results show that HS with trace-based semantics is equivalent to linear temporal logic (LTL), HS with computation-tree-based semantics is equivalent to finitary computation tree logic (CTL)∗, and HS with state-based semantics is incomparable with LTL, CTL, and CTL∗

Read more

Summary

Introduction

The pervasive smart environment in Internet of Things (IoTs) has the potential to monitor various human activities by using smart devices. The integration of wireless body area networks (WBANs) with recent cloud and sensor technologies offers significant improvement in the efficiency and the functionality of medical and health care systems [2]. This integration can preserve the cost of medical services and allow a wide distribution of medical knowledge to nonmedical personnel [3]. Deploying IoT devices in organizations can greatly affect their security, bringing down or disrupting their business operations

Objectives
Methods
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call