Next Article in Journal
What Differentiates Poor and Good Outcome Psychotherapy? A Statistical-Mechanics-Inspired Approach to Psychotherapy Research
Previous Article in Journal
The Theory of Knowledge Fields: A Thermodynamics Approach
Previous Article in Special Issue
Constructing True Model-Based Requirements in SysML
Open AccessArticle

A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems

1
Systems Engineering, University of Virginia, Charlottesville, VA 22904, USA
2
Computer Science and Electrical & Computer Engineering, University of Virginia, Charlottesville, VA 22904, USA
3
Mechanical and Aerospace Engineering, University of Virginia, Charlottesville, VA 22904, USA
*
Author to whom correspondence should be addressed.
Systems 2019, 7(2), 21; https://doi.org/10.3390/systems7020021
Received: 1 February 2019 / Revised: 28 March 2019 / Accepted: 1 April 2019 / Published: 4 April 2019
(This article belongs to the Special Issue Model-Based Systems Engineering)
Despite “cyber” being in the name, cyber–physical systems possess unique characteristics that limit the applicability and suitability of traditional cybersecurity techniques and strategies. Furthermore, vulnerabilities to cyber–physical systems can have significant safety implications. The physical and cyber interactions inherent in these systems require that cyber vulnerabilities not only be defended against or prevented, but that the system also be resilient in the face of successful attacks. Given the complex nature of cyber–physical systems, the identification and evaluation of appropriate defense and resiliency strategies must be handled in a targeted and systematic manner. Specifically, what resiliency strategies are appropriate for a given system, where, and which should be implemented given time and/or budget constraints? This paper presents two methodologies: (1) the cyber security requirements methodology and (2) a systems-theoretic, model-based methodology for identifying and prioritizing appropriate resiliency strategies for implementation in a given system and mission. This methodology is demonstrated using a case study based on a hypothetical weapon system. An assessment and comparison of the results from the two methodologies suggest that the techniques presented in this paper can augment and enhance existing systems engineering approaches with model-based evidence. View Full-Text
Keywords: model-based systems engineering; cyber–physical systems; cyber security; safety; risk model-based systems engineering; cyber–physical systems; cyber security; safety; risk
Show Figures

Figure 1

MDPI and ACS Style

Carter, B.; Adams, S.; Bakirtzis, G.; Sherburne, T.; Beling, P.; Horowitz, B.; Fleming, C. A Preliminary Design-Phase Security Methodology for Cyber–Physical Systems. Systems 2019, 7, 21.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop