Skip to main content

Towards Dependable Automation

  • Chapter
  • First Online:
Cyber Security: Analytics, Technology and Automation

Abstract

Automation runs the modern society and it’s critical systems. It is a networked software product depending on the co-operation of old and new technologies. Information security for automation systems should be regarded in light of the most important quality required from automation—dependability. This chapter focuses on process of developing dependable solutions for the entire lifecycle of automation systems. The approach includes a guideline for securing automation and a dependability model that is a data flow model extended with security and automation requirements. Results of this analysis should be used in final requirement specification for implementation. Dependability model is the key tool in secure development lifecycle. It can be used in new product development, improving an old automation system and also during the active lifecycle of automation to manage inevitable changes occurring during the entire lifespan of automation system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Åström KJ (2008) Event based control. In: Astolfi A, Marconi L (eds) Analysis and design of nonlinear control systems: in honor of Alberto Isidori. Springer, Berlin, pp 127–147

    Chapter  Google Scholar 

  • Bennett S (2011) Insecurity in the supply of electrical energy: an emerging threat. Electr J 24(10):51–69

    Article  Google Scholar 

  • Brown D (2008) The how to of essential modelling. IRM Training—White Paper, Melbourne. http://www.irm.com.au/papers/How_To_of_Essential_Modelling.PDF. Accessed 28 Aug 2008

  • Lee EA (2008) Cyber physical systems: design challenges. In: 11th IEEE international symposium on object oriented real-time distributed computing (ISORC). IEEE Press, New York, pp 363–369

    Google Scholar 

  • Chappell DA (2004) Enterprise service bus. O’Reilly, Sebastopol

    Google Scholar 

  • Douglass BP (2004) Real time UML, 3rd edn. Addison-Wesley, Boston

    Google Scholar 

  • Eerola R (2013) Analysing integration and information security: enterprise service bus for smart grid. Master’s thesis, Tampere University of Technology, Tampere

    Google Scholar 

  • Flick T, Morehouse J (2011) Securing the smart grid: next generation power grid security. Syngress, Burlington

    Google Scholar 

  • Howard M, LeBlanc D (2003) Writing secure code, 2nd edn. Microsoft Press, Bellevue

    Google Scholar 

  • Howard M, Lipner S (2006) The security development lifecycle. Microsoft Press, Bellevue

    Google Scholar 

  • Linux K (2013) The most advanced penetration testing distribution. http://www.kali.org

  • Langner R (2011) Robust control system networks. How to achieve reliable control after Stuxnet. Momentum Press, New York

    Book  Google Scholar 

  • National Institute of Standards and Technology (2012) NIST framework and roadmap for smart grid interoperability standards, Release 2.0. NIST Special Publication 1108R2

    Google Scholar 

  • Salmenperä M, Eerola R, Seppälä J, Koivisto H (2013) Design and analysis of secure integration solution for smart grids. In: Proceedings of Automaatio XX-seminaari, automation and systems without borders—beyond future (Helsinki, 2013). Finnish Automation Society

    Google Scholar 

  • Sarbanes-Oxley Act of 2002. Corporate responsibility. In: 107th Congress Public Law 204. Accessible from http://www.gpo.gov/fdsys/pkg/PLAW-107publ204/html/PLAW-107publ204.htm

  • Sterman JD (2000) Business dynamics. Systems thinking and modeling for a complex world. McGraw-Hill, New York

    Google Scholar 

  • Stevens WP, Myers GJ, Constantine LL (1974) Structured design. IBM Syst J 13(2):115–139

    Article  Google Scholar 

  • Yourdon E, Constantine LL (1979) Structured design: fundamentals of a discipline of computer program and systems design. Prentice Hall, New Jersey

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jari Seppälä .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Seppälä, J., Salmenperä, M. (2015). Towards Dependable Automation. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Analytics, Technology and Automation. Intelligent Systems, Control and Automation: Science and Engineering, vol 78. Springer, Cham. https://doi.org/10.1007/978-3-319-18302-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18302-2_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18301-5

  • Online ISBN: 978-3-319-18302-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics