Advertisement

Towards Dependable Automation

  • Jari SeppäläEmail author
  • Mikko Salmenperä
Chapter
Part of the Intelligent Systems, Control and Automation: Science and Engineering book series (ISCA, volume 78)

Abstract

Automation runs the modern society and it’s critical systems. It is a networked software product depending on the co-operation of old and new technologies. Information security for automation systems should be regarded in light of the most important quality required from automation—dependability. This chapter focuses on process of developing dependable solutions for the entire lifecycle of automation systems. The approach includes a guideline for securing automation and a dependability model that is a data flow model extended with security and automation requirements. Results of this analysis should be used in final requirement specification for implementation. Dependability model is the key tool in secure development lifecycle. It can be used in new product development, improving an old automation system and also during the active lifecycle of automation to manage inevitable changes occurring during the entire lifespan of automation system.

Keywords

Automation System Information Security Smart Grid Security Requirement Manufacture Execution System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Åström KJ (2008) Event based control. In: Astolfi A, Marconi L (eds) Analysis and design of nonlinear control systems: in honor of Alberto Isidori. Springer, Berlin, pp 127–147CrossRefGoogle Scholar
  2. Bennett S (2011) Insecurity in the supply of electrical energy: an emerging threat. Electr J 24(10):51–69CrossRefGoogle Scholar
  3. Brown D (2008) The how to of essential modelling. IRM Training—White Paper, Melbourne. http://www.irm.com.au/papers/How_To_of_Essential_Modelling.PDF. Accessed 28 Aug 2008
  4. Lee EA (2008) Cyber physical systems: design challenges. In: 11th IEEE international symposium on object oriented real-time distributed computing (ISORC). IEEE Press, New York, pp 363–369Google Scholar
  5. Chappell DA (2004) Enterprise service bus. O’Reilly, SebastopolGoogle Scholar
  6. Douglass BP (2004) Real time UML, 3rd edn. Addison-Wesley, BostonGoogle Scholar
  7. Eerola R (2013) Analysing integration and information security: enterprise service bus for smart grid. Master’s thesis, Tampere University of Technology, TampereGoogle Scholar
  8. Flick T, Morehouse J (2011) Securing the smart grid: next generation power grid security. Syngress, BurlingtonGoogle Scholar
  9. Howard M, LeBlanc D (2003) Writing secure code, 2nd edn. Microsoft Press, BellevueGoogle Scholar
  10. Howard M, Lipner S (2006) The security development lifecycle. Microsoft Press, BellevueGoogle Scholar
  11. Linux K (2013) The most advanced penetration testing distribution. http://www.kali.org
  12. Langner R (2011) Robust control system networks. How to achieve reliable control after Stuxnet. Momentum Press, New YorkCrossRefGoogle Scholar
  13. National Institute of Standards and Technology (2012) NIST framework and roadmap for smart grid interoperability standards, Release 2.0. NIST Special Publication 1108R2Google Scholar
  14. Salmenperä M, Eerola R, Seppälä J, Koivisto H (2013) Design and analysis of secure integration solution for smart grids. In: Proceedings of Automaatio XX-seminaari, automation and systems without borders—beyond future (Helsinki, 2013). Finnish Automation SocietyGoogle Scholar
  15. Sarbanes-Oxley Act of 2002. Corporate responsibility. In: 107th Congress Public Law 204. Accessible from http://www.gpo.gov/fdsys/pkg/PLAW-107publ204/html/PLAW-107publ204.htm
  16. Sterman JD (2000) Business dynamics. Systems thinking and modeling for a complex world. McGraw-Hill, New YorkGoogle Scholar
  17. Stevens WP, Myers GJ, Constantine LL (1974) Structured design. IBM Syst J 13(2):115–139CrossRefGoogle Scholar
  18. Yourdon E, Constantine LL (1979) Structured design: fundamentals of a discipline of computer program and systems design. Prentice Hall, New JerseyGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Automation Science and EngineeringTampere University of TechnologyTampereFinland

Personalised recommendations