Skip to main content
Log in

Systematization and security assessment of cyber-physical systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

In this paper, the features of cyber-physical systems (CPSs) from the point of view of information security have been considered and CPSs have been classified. The authors have analyzed approaches to security assessments and identified the requirements to indicators of CPS information security. A system of specific assessment indicators based on the system stability criterion and homeostatic approach is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. NSF Workshop on Cyber-Physical Systems, Austin, TX, 2006, pp. 6–17.

  2. Zanero, S., Cyber-physical systems, Computer, 2017, vol. 50, no. 4, pp. 14–16.

    Article  Google Scholar 

  3. Schneider, F.B., Enforceable security policies, ACM Trans. Inf. Syst. Secur., 2000, vol. 3, no. 1, pp. 30–50. doi 10.1145/353323.353382

    Article  Google Scholar 

  4. Mulligan, D.K. and Schneider, F.B., Doctrine for cybersecurity, Daedalus, 2011, vol. 140, no. 4, pp. 70–92.

    Article  Google Scholar 

  5. Ashibani, Y. and Mahmoud, Q.H., Cyber physical systems security: Analysis, challenges and solutions, Comput. Secur., 2017, vol. 68, pp. 81–97.

    Article  Google Scholar 

  6. GOST (State Standard) R ISO/MEK 17799-2005: Information Technology: Practical Rules for Information Security Management.

  7. GOST (State Standard) R ISO/MEK 27032-2012: Information Technology. Security Techniques. Guidelines for Cybersecurity.

  8. Dukhvalov, A., IIoT–Industrial Internet of Threats?, IoT Summit, St. Petersburg, 2016. http://unicongress.ru/wp-content/uploads/iot16/s2-5.pdf.

    Google Scholar 

  9. Zegzhda, P.D., Zegzhda, D.P., and Stepanova, T.V., Approach to the construction of the generalized functional-semantic cyber security model, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 627–633.

    Article  Google Scholar 

  10. Zegzhda, P.D., Zegzhda, D.P., Pechenkin, A.I., and Poltavtseva, M.A., Modeling information systems for solving the problem of security management, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 3, pp. 7–16.

    Google Scholar 

  11. Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.

    Article  Google Scholar 

  12. Zegzhda, D.P. and Stepanova, T.V., Applying large-scale adaptive graphs to modeling internet of things security, Proceedings of the 7th International Conference on Security of Information and Networks, SIN 2014, 2014, pp. 479–482.

    Google Scholar 

  13. Zegzhda, D.P., Sustainability as a criterion for information security in cyber-physical systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 813–819.

    Article  Google Scholar 

  14. Gaaze-Rapoport, M.G. and Pospelov, D.A., Ot ameby do robota–modeli povedeniya (From Amoeba to Robot: Models of Behavior), Moscow: Nauka, 1987.

    Google Scholar 

  15. Gerostathopoulos, I., Skoda, D., Plasil, F., Bures, T., and Knauss, A., Architectural homeostasis in self-adaptive software-intensive cyber-physical systems, Lect. Notes Comput. Sci., 2016, vol. 9839, pp. 113–128.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. P. Zegzhda.

Additional information

Original Russian Text © D.P. Zegzhda, M.A. Poltavtseva, D.S. Lavrova, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zegzhda, D.P., Poltavtseva, M.A. & Lavrova, D.S. Systematization and security assessment of cyber-physical systems. Aut. Control Comp. Sci. 51, 835–843 (2017). https://doi.org/10.3103/S0146411617080272

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411617080272

Keywords

Navigation